IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS 2022-06-16
10:00
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
Secure Precoded OFDM Transmission Using Randomized Unitary Matrix
Naoki Isono, Kengo Ando, Koji Ishibashi (UEC) RCS2022-42
This paper considers a network consisting of a base station (BS), a legitimate user equipment (UE), and an eavesdropper ... [more] RCS2022-42
pp.108-113
PN 2021-08-30
10:35
Online Online On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography
Takehisa Iwakoshi (Mie Univ.) PN2021-12
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] PN2021-12
pp.1-6
OPE, LQE 2020-11-20
15:30
Online Online Feasibility confirmation of high-security wireless communication using high-directivity THz Waves -- Realization of AND operation by homodyne detection and heterodyne detection --
Yusuke Kawai, Kenta Yamauchi, Kazutoshi Kato (Kyushu Univ.) OPE2020-55 LQE2020-35
We have been inventing a new encrypted methods to improve physical-layer security of wireless communication. As one of c... [more] OPE2020-55 LQE2020-35
pp.53-57
IT, ISEC, WBS 2019-03-08
14:20
Tokyo University of Electro-Communications On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more]
IT2018-124 ISEC2018-130 WBS2018-125
pp.297-302
RCS, SAT
(Joint)
2015-08-18
10:55
Fukuoka Fukuoka Univ. Wireless Security Schemes using Random Phases for MISO-OFDM Communications
Kaikai Huang, Kazuhiko Fukawa, Yuyuan Chang (Tokyo Tech) RCS2015-150
This report proposes new physical-layer security schemes for multiple-input single-output (MISO)-OFDM wireless communica... [more] RCS2015-150
pp.109-114
RCS, AP
(Joint)
2013-11-22
14:55
Shimane Matsue Terrsa Stochastic Resonance and The Secrecy Capacity of Wiretap Channels
Oussama Souihli (KDDI R&D Labs), Tomoaki Ohtsuki (Keio Univ.) RCS2013-204
Traditionally, physical-layer security is achieved by providing the legitimate receiver a physical-layer advantage over ... [more] RCS2013-204
pp.177-182
RCS, SIP 2012-01-27
13:55
Fukuoka Fukuoka Univ. OPTIMIZATION OF INTERFERENCE SIGNALS TO AN EAVESDROPPER WITH MULTIPLE ANTENNAS
Shuiqiang Yan, Shuichi Ohno (Hiroshima Univ.), Yuji Wakasa (Yamaguchi Univ.) SIP2011-110 RCS2011-299
Wireless communications are susceptible to eavesdropping. To interfere the eavesdropper having multiple antennas,secret ... [more] SIP2011-110 RCS2011-299
pp.183-186
RCS 2011-04-21
16:05
Kanagawa Keio University [Invited Talk] Information Security in Wireless Communication at Physical Layer Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.) RCS2011-10
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] RCS2011-10
pp.53-58
ISEC, IT, WBS 2011-03-03
13:00
Osaka Osaka University [Invited Talk] Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] IT2010-72 ISEC2010-76 WBS2010-51
pp.31-36
IT 2008-07-24
16:20
Chiba University of Tokyo, Kashiwa Campus [Invited Talk] Information Security Schemes in Wireless Communications Based on Radio Propagation Characteristics
Hideichi Sasaoka (Doshisha Univ.) IT2008-15
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] IT2008-15
pp.39-44
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan