IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 80 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2017-09-04
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings
Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] ISEC2017-46
pp.35-42
SS 2017-03-09
11:50
Okinawa   Equivalence Checking for Methods in Java and Its Applications
Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.), Takeshi Obara (Shinshu Univ.) SS2016-65
A programmer sometimes implements both of equals method and hashCode method in a class of Java. The programmer should ob... [more] SS2016-65
pp.31-36
TL 2016-12-17
14:00
Tokyo Room 303/304/305, Building #8, Waseda University From Twitter to Mainstream Usage -- The Electronic Origins of A New Use of "Can" in Colloquial Singapore English --
Lan Yingjie (Cambridge Univ.) TL2016-52
In Standard English, can functions as a modal auxiliary. However, it has also been documented to have other functions in... [more] TL2016-52
pp.81-86
ISEC 2015-09-04
10:55
Tokyo Kikai-Shinko-Kaikan Bldg. Improvement of RainbowCrack Reduction Function
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-26
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] ISEC2015-26
pp.9-14
ISEC 2015-09-04
11:20
Tokyo Kikai-Shinko-Kaikan Bldg. High speed implementation of Hash function on GPU
Nguyen Dat Thuong, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-27
In order to protect the personal information and high confidential information, encryption technology and hash function ... [more] ISEC2015-27
pp.15-19
IA, ICSS 2015-06-11
14:35
Fukuoka Kyushu Institute of Technology Univ. An Efficient Rainbow Table Compression
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] IA2015-3 ICSS2015-3
pp.9-14
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] A tamper detection scheme for JPEG2000 coded images using reversible data hiding
Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-82
This paper proposes an efficient tamper detection scheme for JPEG2000 coded images.
Marker codes that delimit a JPEG20... [more]
EMM2014-82
pp.31-36
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Generation Methods of Secret Sharing QR Codes
Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] EMM2014-92
pp.91-96
NS, IN
(Joint)
2015-03-03
13:00
Okinawa Okinawa Convention Center Implementation of Data Access Function for Distributed Key-Value Stores Using OpenFlow Switches
Hiroyuki Sugimura, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ) NS2014-245
This paper proposes implementation of data access functions for distributed key-value store based on consistent hashing.... [more] NS2014-245
pp.397-402
ICD, CPSY 2014-12-01
15:15
Tokyo Kikai-Shinko-Kaikan Bldg. [Poster Presentation] A Scalable Hardware Architecture of Locality-Sesitive Hashing for similarity Search
Tsunaki Sadahisa, Kasho Yamamoto, Dahoo Kim, Eric S. Fukuda, Tetsuya Asai, Masato Motomura (Hokkaido Univ.) ICD2014-83 CPSY2014-95
Locality-Sensitive Hashing (LSH) is a hash function that projects similar data into memory closely. In similarity search... [more] ICD2014-83 CPSY2014-95
p.45
SIS, IPSJ-AVM 2014-09-11
10:45
Yamagata SHONAI INDUSTRIAL PROMOTION CENTER A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images
Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] SIS2014-53
pp.13-18
RCC, ASN, NS, RCS, SR
(Joint)
2014-08-01
10:25
Kyoto Kyoto Terrsa A Study on Bit-Interleaved Spinal Codes
Shun Ogata, Koji Ishibashi (Univ. of Electro-Comm.) RCS2014-127
In this paper, we analyze the bit error rate (BER) performance of a new rateless code named {em spinal code} and reveal ... [more] RCS2014-127
pp.203-208
CPSY, DC
(Joint)
2014-07-29
15:40
Niigata Toki Messe, Niigata Evaluation of Large-scale Graph Rewriting Model Checking Using Hash Compaction
Taketo Yoshida, Masaru Onuma, Kazunori Ueda (Waseda Univ.) DC2014-19
Graph rewriting model checking is a verification method that determines whether a model described in a graph rewriting s... [more] DC2014-19
pp.9-16
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:45
Hokkaido San-Refure Hakodate Data authentication scheme suitable for broadcast in the sensor networks
Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
pp.155-162
IT 2014-05-16
09:50
Oita Beppu International Convention Center Efficiency Tricks for Hashing and Blooming in Streaming Algorithms
Marat Zhanikeev (Kyushu Inst. of Tech.) IT2014-1
Streaming algorithms, also known as data streaming, are a realtime/online alternative to offline processing of data stor... [more] IT2014-1
pp.1-4
ISEC 2014-05-09
17:05
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Limited-Birthday Distinguishers for Hash Functions -- Collisions beyond the Birthday Bound Can Be Meaningful --
Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) ISEC2014-9
In this talk, we explain the paper, with the same title of this talk, appeared at the international cryptographic confer... [more] ISEC2014-9
p.49
IN 2014-04-17
13:00
Kyoto Kyotofu-Chusho-Kigyo-Kaikan Elastic and strict load balancing via consistent hashing
Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] IN2014-1
pp.1-6
ISEC, IT, WBS 2014-03-11
14:10
Aichi Nagoya Univ., Higashiyama Campus On Dynamic Cooperative Diversity Based on Dual-Spinal Codes
Shun Ogata, Koji Ishibashi (The Univ. of Electro-Comm.) IT2013-83 ISEC2013-112 WBS2013-72
Spinal codes, a new class of rateless codes proposed recently, have gathered much attention due to its capacity-achievin... [more] IT2013-83 ISEC2013-112 WBS2013-72
pp.181-186
LOIS 2014-03-07
14:00
Okinawa   On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values
Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT) LOIS2013-61
When one treats confidential data such as personal information on a life log or an office information system, fulfilling... [more] LOIS2013-61
pp.41-46
IT 2013-09-27
10:55
Okinawa Culture Resort Festone (Okinawa) Performance Analysis on Invertible Bloom Lookup Tables with Erasure Errors
Daichi Yugawa, Tadashi Wadayama (Nagoya Inst. of Tech.) IT2013-35
The Invertible Bloom Lookup Tables (IBLT) is a data structure which supports insertion, deletion, retrieval and listing ... [more] IT2013-35
pp.19-24
 Results 21 - 40 of 80 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan