Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, IT, RCS |
2024-01-18 17:35 |
Miyagi |
(Primary: On-site, Secondary: Online) |
A Study on Decoding Performance Improvement by Using Non-binary LDPC Codes in Outer Channel Coding-Concatenated Chaos Coded Modulation Ryo Tozawa, Seiya Yamashita, Eiji Okamoto (NITech), Horiike Naoto, Tetsuya Yamamoto (Panasonic) IT2023-55 SIP2023-88 RCS2023-230 |
With the rapid expansion of the Internet of Things (IoT) in recent years, the need to improve the confidentiality of wir... [more] |
IT2023-55 SIP2023-88 RCS2023-230 pp.133-138 |
AP, SANE, SAT (Joint) |
2023-07-12 14:40 |
Hokkaido |
The Citizen Activity Center (Primary: On-site, Secondary: Online) |
Improvement of key generation efficiency of free-space optical physical layer cryptography using polar code Ryuto Terada (Nitech), Hiroyuki Endo (NICT), Kensuke Yamaura, Eiji Okamoto (Nitech), Mitsuo Kitamura (NICT), Ryosuke Shimizu (UEC), Morio Toyoshima, Mikio Hujiwara, Masahide Sasaki (NICT) SAT2023-12 |
Quantum key distribution is known as a secure key sharing technology against all physically possible attacks. However, t... [more] |
SAT2023-12 pp.13-18 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-13 09:25 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
A Study on Complexity Reduction of Bit Assignment and Performance Improvement by Channel Code Concatenation in Chaos Modulation Ryo Tozawa, Yuuki Mori, Seiya Yamashita, Eiji Okamoto (NITech), Tetsuya Yamamoto (Panasonic) RCS2023-86 |
In recent years, with the rapid increase of Internet of Things (IoT) devices in industries, healthcare, and other fields... [more] |
RCS2023-86 pp.33-38 |
IT, RCS, SIP |
2023-01-24 10:25 |
Gunma |
Maebashi Terrsa (Primary: On-site, Secondary: Online) |
A Study on Bit Error Rate Improvement of Chaos Modulation By Bit Assignment Using Nonlinear Optimization Algorithm Ryo Tozawa, Keisuke Asano, Takumi Abe, Kenta Kato, Eiji Okamoto (NIT) IT2022-30 SIP2022-81 RCS2022-209 |
In recent years, the number of Internet of things (IoT) devices has increased and they are used in industrial and medica... [more] |
IT2022-30 SIP2022-81 RCS2022-209 pp.7-12 |
RCS |
2021-10-22 13:50 |
Online |
Online |
Study on Performance Improvement of Radio-Wave Encrypted Modulation by LLR Clipping Mamoru Okumura, Keisuke Asano, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-137 |
In recent years, physical layer security technologies that encrypt the physical layer using information theory have attr... [more] |
RCS2021-137 pp.100-105 |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
RCS |
2021-06-23 10:20 |
Online |
Online |
A Study on Performance Improvement of Polar Coded-Radio Wave Encrypted Modulation by CRC Code Concatenation Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-34 |
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the number of Internet of thi... [more] |
RCS2021-34 pp.31-36 |
RCS |
2021-06-23 10:30 |
Online |
Online |
A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35 |
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] |
RCS2021-35 pp.37-42 |
IA, ICSS |
2021-06-21 16:25 |
Online |
Online |
[Invited Talk]
An Authentication Scheme for WLAN Physical Layer Miyuki Hirose (KIT) IA2021-8 ICSS2021-8 |
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] |
IA2021-8 ICSS2021-8 p.43 |
SIP, IT, RCS |
2021-01-21 10:15 |
Online |
Online |
Improvement of Encoding Gain in Radio-Wave Encrypted Modulation Using Logistic Map Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2020-72 SIP2020-50 RCS2020-163 |
In recent years, fifth-generation mobile communications system (5G) has been promoted around the world, and the markets ... [more] |
IT2020-72 SIP2020-50 RCS2020-163 pp.52-57 |
SAT, RCS (Joint) |
2020-08-21 09:25 |
Online |
Online |
A study on encrypted hybrid modulation scheme using chaos modulation and QAM Tomoki Kaga, Mamoru Okumura, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-83 |
In the fifth generation mobile communications system (5G), it is important to ensure wireless security as well as to rea... [more] |
RCS2020-83 pp.23-28 |
RCS |
2020-06-24 16:10 |
Online |
Online |
Study on Applying Radio -Wave Encryption to Interleave Division Multiple Access Scheme Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-30 |
One of the main use cases of the fifth-generation mobile communications system (5G) is massive machine-type communicatio... [more] |
RCS2020-30 pp.43-48 |
RCS |
2018-06-20 14:20 |
Nagasaki |
Nagasaki University |
Study on Non-Orthogonal Multiple Access Scheme having Physical Layer Security Yoshihiro Masuda, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic), Keita Ito (NIT) RCS2018-40 |
Recently, the fifth generation mobile communication system (5G) that enables over 10 Gbps transmission is standardized a... [more] |
RCS2018-40 pp.31-36 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
PN |
2013-03-12 14:10 |
Okinawa |
Okinawa-ken Seinen-Kaikan |
Prevention Properties of Optical-CDMA and Y-00 Quantum Stream Cipher against Signal Altenation Attacks Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.) PN2012-89 |
In the modern society, mathematical ciphers are often used to protect transmitted data. However, there are possibilities... [more] |
PN2012-89 pp.65-69 |
RECONF |
2005-12-01 10:20 |
Fukuoka |
Kitakyushu International Conference Center |
A solution for perfect classified networks Charlotte Roesener, Hidetaka Kojou, Hiroaki Nishi (Keio Univ.) |
This paper deals with a new solution for secure networks that shall be encrypted completely at all times and is against ... [more] |
RECONF2005-61 pp.13-18 |