|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SSS |
2013-05-23 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Safety Analysis of Train Control System with On-board Interlocking Using RFID Devices Takayasu Kitano, Tatsuya Sasaki (RTRI) SSS2013-3 |
[more] |
SSS2013-3 pp.9-12 |
RCS, MoNA, SR (Joint) |
2011-03-04 09:20 |
Kanagawa |
YRP |
Secret Information Transmission Scheme Using Information Dispersal in MIMO System Satoshi Tanaka, Takayuki Shimizu, Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2010-282 |
[more] |
RCS2010-282 pp.195-200 |
AP |
2011-01-20 11:20 |
Saga |
Saga Univ. |
Development of Secret Key Agreement and Radio Source Localization Experimental System Based on Radio Propagation Characteristics Using Array Antennas Naoki Otani, Takayasu Kitano, Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2010-138 |
As a countermeasure for eavesdropping and spoofing attack in wireless communications, new secret key agreement schemes a... [more] |
AP2010-138 pp.31-36 |
RCS |
2010-06-17 15:55 |
Kyoto |
Kyoto Univ. |
Secret Information Transmission in MIMO Eigenbeam-Space Division Multiplexing Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2010-32 |
As a radio-layer security technique, we propose a new secret information transmission scheme in a MIMO system. The propo... [more] |
RCS2010-32 pp.85-90 |
AP |
2009-09-04 15:15 |
Aomori |
Hachinohe Inst. of Tech. |
A Study on Signal Hiding in Secret Communication System Using Multi-Antenna Transmission Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
As a communication hiding scheme for wireless systems, we have proposed wireless steganography in which the secret infor... [more] |
AP2009-101 pp.125-130 |
AP, SAT (Joint) |
2009-07-08 15:40 |
Hokkaido |
Otaru city, Hokkaido |
Improvement of Tolerance for Eavesdropping in Wireless Key Agreement Scheme using ESPAR Antenna based on Interference Transmission Masahiro Onishi, Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-54 |
As a countermeasure scheme against an eavesdropper in wireless communications, a key agreement scheme using an ESPAR ant... [more] |
AP2009-54 pp.59-64 |
AP |
2009-01-21 13:25 |
Fukuoka |
Fukuoka University |
Security Evaluation of Secret Communication System using Multi-Antenna Interference Transmission Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2008-151 |
As a countermeasure scheme against an eavesdropper in wireless communications, a secret communication system using multi... [more] |
AP2008-151 pp.7-12 |
AP, RCS (Joint) |
2008-11-21 09:20 |
Ishikawa |
Kanazawa Institute of Technology |
A Study on Secret Communication System utilizing Multi-Antenna Interference Transmission Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2008-145 |
In this paper, we propose a new wireless secret communication system utilizing multi-antenna interference transmission. ... [more] |
RCS2008-145 pp.89-94 |
RCS |
2007-10-19 10:15 |
Nagano |
Tokyo Uni. of Science, Suwa |
Wireless Steganography by Embedded MC-CDMA Signals for OFDM Systems Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2007-88 |
[more] |
RCS2007-88 pp.49-54 |
IT, ISEC, WBS |
2007-03-15 16:55 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Wireless Steganography by Embed Predistortion Spectrum Spread Signal in Digital Mobile Communication Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
As the countermeasure for eavesdropping in wireless communication, this paper proposes a new scheme of wireless steganog... [more] |
IT2006-83 ISEC2006-138 WBS2006-80 pp.129-134 |
RCS, AP, WBS, SR, MW, MoNA (Joint) |
2006-03-03 15:40 |
Kanagawa |
YRP |
A scheme of Private Key Agreement Based on Fluctuations of BER in Land Mobile Radio Takayasu Kitano, Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
This paper proposes a private key sharing scheme using the fluctuations of BER (Bit Error Rate). It utilizes the receive... [more] |
RCS2005-217 pp.235-240 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|