IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, IT, RCS 2024-01-18
17:35
Miyagi
(Primary: On-site, Secondary: Online)
A Study on Decoding Performance Improvement by Using Non-binary LDPC Codes in Outer Channel Coding-Concatenated Chaos Coded Modulation
Ryo Tozawa, Seiya Yamashita, Eiji Okamoto (NITech), Horiike Naoto, Tetsuya Yamamoto (Panasonic) IT2023-55 SIP2023-88 RCS2023-230
With the rapid expansion of the Internet of Things (IoT) in recent years, the need to improve the confidentiality of wir... [more] IT2023-55 SIP2023-88 RCS2023-230
pp.133-138
AP, SANE, SAT
(Joint)
2023-07-12
14:40
Hokkaido The Citizen Activity Center
(Primary: On-site, Secondary: Online)
Improvement of key generation efficiency of free-space optical physical layer cryptography using polar code
Ryuto Terada (Nitech), Hiroyuki Endo (NICT), Kensuke Yamaura, Eiji Okamoto (Nitech), Mitsuo Kitamura (NICT), Ryosuke Shimizu (UEC), Morio Toyoshima, Mikio Hujiwara, Masahide Sasaki (NICT) SAT2023-12
Quantum key distribution is known as a secure key sharing technology against all physically possible attacks. However, t... [more] SAT2023-12
pp.13-18
SeMI, RCS, RCC, NS, SR
(Joint)
2023-07-13
09:25
Osaka Osaka University Nakanoshima Center + Online
(Primary: On-site, Secondary: Online)
A Study on Complexity Reduction of Bit Assignment and Performance Improvement by Channel Code Concatenation in Chaos Modulation
Ryo Tozawa, Yuuki Mori, Seiya Yamashita, Eiji Okamoto (NITech), Tetsuya Yamamoto (Panasonic) RCS2023-86
In recent years, with the rapid increase of Internet of Things (IoT) devices in industries, healthcare, and other fields... [more] RCS2023-86
pp.33-38
IT, RCS, SIP 2023-01-24
10:25
Gunma Maebashi Terrsa
(Primary: On-site, Secondary: Online)
A Study on Bit Error Rate Improvement of Chaos Modulation By Bit Assignment Using Nonlinear Optimization Algorithm
Ryo Tozawa, Keisuke Asano, Takumi Abe, Kenta Kato, Eiji Okamoto (NIT) IT2022-30 SIP2022-81 RCS2022-209
In recent years, the number of Internet of things (IoT) devices has increased and they are used in industrial and medica... [more] IT2022-30 SIP2022-81 RCS2022-209
pp.7-12
RCS 2021-10-22
13:50
Online Online Study on Performance Improvement of Radio-Wave Encrypted Modulation by LLR Clipping
Mamoru Okumura, Keisuke Asano, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-137
In recent years, physical layer security technologies that encrypt the physical layer using information theory have attr... [more] RCS2021-137
pp.100-105
PN 2021-08-30
10:35
Online Online On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography
Takehisa Iwakoshi (Mie Univ.) PN2021-12
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] PN2021-12
pp.1-6
RCS 2021-06-23
10:20
Online Online A Study on Performance Improvement of Polar Coded-Radio Wave Encrypted Modulation by CRC Code Concatenation
Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-34
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the number of Internet of thi... [more] RCS2021-34
pp.31-36
RCS 2021-06-23
10:30
Online Online A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation
Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] RCS2021-35
pp.37-42
IA, ICSS 2021-06-21
16:25
Online Online [Invited Talk] An Authentication Scheme for WLAN Physical Layer
Miyuki Hirose (KIT) IA2021-8 ICSS2021-8
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] IA2021-8 ICSS2021-8
p.43
SIP, IT, RCS 2021-01-21
10:15
Online Online Improvement of Encoding Gain in Radio-Wave Encrypted Modulation Using Logistic Map
Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2020-72 SIP2020-50 RCS2020-163
In recent years, fifth-generation mobile communications system (5G) has been promoted around the world, and the markets ... [more] IT2020-72 SIP2020-50 RCS2020-163
pp.52-57
SAT, RCS
(Joint)
2020-08-21
09:25
Online Online A study on encrypted hybrid modulation scheme using chaos modulation and QAM
Tomoki Kaga, Mamoru Okumura, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-83
In the fifth generation mobile communications system (5G), it is important to ensure wireless security as well as to rea... [more] RCS2020-83
pp.23-28
RCS 2020-06-24
16:10
Online Online Study on Applying Radio -Wave Encryption to Interleave Division Multiple Access Scheme
Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-30
One of the main use cases of the fifth-generation mobile communications system (5G) is massive machine-type communicatio... [more] RCS2020-30
pp.43-48
RCS 2018-06-20
14:20
Nagasaki Nagasaki University Study on Non-Orthogonal Multiple Access Scheme having Physical Layer Security
Yoshihiro Masuda, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic), Keita Ito (NIT) RCS2018-40
Recently, the fifth generation mobile communication system (5G) that enables over 10 Gbps transmission is standardized a... [more] RCS2018-40
pp.31-36
SIS 2013-12-13
13:10
Tottori Torigin Bunka Kaikan (Tottori) A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] SIS2013-51
pp.131-136
PN 2013-03-12
14:10
Okinawa Okinawa-ken Seinen-Kaikan Prevention Properties of Optical-CDMA and Y-00 Quantum Stream Cipher against Signal Altenation Attacks
Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.) PN2012-89
In the modern society, mathematical ciphers are often used to protect transmitted data. However, there are possibilities... [more] PN2012-89
pp.65-69
RECONF 2005-12-01
10:20
Fukuoka Kitakyushu International Conference Center A solution for perfect classified networks
Charlotte Roesener, Hidetaka Kojou, Hiroaki Nishi (Keio Univ.)
This paper deals with a new solution for secure networks that shall be encrypted completely at all times and is against ... [more] RECONF2005-61
pp.13-18
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan