Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS |
2022-06-16 10:00 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
Secure Precoded OFDM Transmission Using Randomized Unitary Matrix Naoki Isono, Kengo Ando, Koji Ishibashi (UEC) RCS2022-42 |
This paper considers a network consisting of a base station (BS), a legitimate user equipment (UE), and an eavesdropper ... [more] |
RCS2022-42 pp.108-113 |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
OPE, LQE |
2020-11-20 15:30 |
Online |
Online |
Feasibility confirmation of high-security wireless communication using high-directivity THz Waves
-- Realization of AND operation by homodyne detection and heterodyne detection -- Yusuke Kawai, Kenta Yamauchi, Kazutoshi Kato (Kyushu Univ.) OPE2020-55 LQE2020-35 |
We have been inventing a new encrypted methods to improve physical-layer security of wireless communication. As one of c... [more] |
OPE2020-55 LQE2020-35 pp.53-57 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
RCS, SAT (Joint) |
2015-08-18 10:55 |
Fukuoka |
Fukuoka Univ. |
Wireless Security Schemes using Random Phases for MISO-OFDM Communications Kaikai Huang, Kazuhiko Fukawa, Yuyuan Chang (Tokyo Tech) RCS2015-150 |
This report proposes new physical-layer security schemes for multiple-input single-output (MISO)-OFDM wireless communica... [more] |
RCS2015-150 pp.109-114 |
RCS, AP (Joint) |
2013-11-22 14:55 |
Shimane |
Matsue Terrsa |
Stochastic Resonance and The Secrecy Capacity of Wiretap Channels Oussama Souihli (KDDI R&D Labs), Tomoaki Ohtsuki (Keio Univ.) RCS2013-204 |
Traditionally, physical-layer security is achieved by providing the legitimate receiver a physical-layer advantage over ... [more] |
RCS2013-204 pp.177-182 |
RCS, SIP |
2012-01-27 13:55 |
Fukuoka |
Fukuoka Univ. |
OPTIMIZATION OF INTERFERENCE SIGNALS TO AN EAVESDROPPER WITH MULTIPLE ANTENNAS Shuiqiang Yan, Shuichi Ohno (Hiroshima Univ.), Yuji Wakasa (Yamaguchi Univ.) SIP2011-110 RCS2011-299 |
Wireless communications are susceptible to eavesdropping. To interfere the eavesdropper having multiple antennas,secret ... [more] |
SIP2011-110 RCS2011-299 pp.183-186 |
RCS |
2011-04-21 16:05 |
Kanagawa |
Keio University |
[Invited Talk]
Information Security in Wireless Communication at Physical Layer Based on Radio Propagation Hideichi Sasaoka (Doshisha Univ.) RCS2011-10 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
RCS2011-10 pp.53-58 |
ISEC, IT, WBS |
2011-03-03 13:00 |
Osaka |
Osaka University |
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
IT2010-72 ISEC2010-76 WBS2010-51 pp.31-36 |
IT |
2008-07-24 16:20 |
Chiba |
University of Tokyo, Kashiwa Campus |
[Invited Talk]
Information Security Schemes in Wireless Communications Based on Radio Propagation Characteristics Hideichi Sasaoka (Doshisha Univ.) IT2008-15 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
IT2008-15 pp.39-44 |