IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 49 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2016-03-10
14:30
Tokyo The University of Electro-Communications A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers
Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) IT2015-116 ISEC2015-75 WBS2015-99
Bilinear Pairing is a major tool to realize advanced cryptographic functionality such as searchable encryption, aggregat... [more] IT2015-116 ISEC2015-75 WBS2015-99
pp.95-100
ICSS 2015-03-03
13:25
Okinawa Meio Univiersity Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation
Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.) ICSS2014-64
There is a lot of attacks over the Internet,intrusion detection systems(IDSs) are an active area of research.IDSs are cl... [more] ICSS2014-64
pp.7-12
NS, IN
(Joint)
2015-03-03
16:40
Okinawa Okinawa Convention Center Identity-Based Aggregate Signatures Applied to NDN for Short Message Transfers
Byambajav Namsraijav, Tohru Asami, Yoshihiro Kawahara (UTokyo), Jun Kurihara, Kohei Sugiyama, Atsushi Tagami (KDDI R&D Labs.), Tomohiko Yagyu (NEC), Toru Hasegawa (Osaka Univ.) IN2014-175
In Named Data Networking (NDN), security is imposed on contents instead of end-to-end connections; therefore, every cont... [more] IN2014-175
pp.319-324
AP, SANE
(Joint)
2014-08-29
10:25
Niigata Niigata University Satellite campus Development of speckle filter based on the four-component scattering power decomposition
Takuya Ochiai, Yoshio Yamaguchi, Hiroyoshi Yamada, Cui Yi (Niigata Univ.) SANE2014-56
Speckle noise in SAR images makes the image interpretation difficult and reduces the accuracy of terrain classification.... [more] SANE2014-56
pp.47-52
ISEC 2013-12-11
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on An Analysis Prevention Scheme for Embedded System Firmware
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-81
There are increasing attacks against embedded system software as well as PC software. Software of embedded system is cal... [more] ISEC2013-81
pp.53-57
IA, SITE, IPSJ-IOT [detail] 2013-03-14
10:40
Nara Todaiji Total Cultural Center A Study of the Anomaly Detection Method Characteristics based on the Traffic Parameter Clustering
Kouhei Tatsumi, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-49 IA2012-87
The ”targeted attacks” especially to the government and the companies increase in recent years. Such unknown
attacks ar... [more]
SITE2012-49 IA2012-87
pp.25-30
SANE 2011-10-19
10:15
Overseas Udayana University, Bali, Indonesia Assessment of Variability in Target Scattering Mechanism Contribution in SAR Polarimetric Decomposition
Bindi Pradip Shastri (CEPT University), Ram Lal Mehta, Dr. Shiv Mohan (SAC, ISRO), Professor Anjana Vyas (CEPT University) SANE2011-111
In the present study, full polarimetric L-band ALOS PALSAR cata covering parts of Nagaur distric in Rajasthan, has been ... [more] SANE2011-111
pp.259-268
ISEC, IT, WBS 2011-03-04
11:40
Osaka Osaka University Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-123 ISEC2010-127 WBS2010-102
This paper proposes an digital watermark method using extended smear-desmearing transform and high-pass filter.In this m... [more] IT2010-123 ISEC2010-127 WBS2010-102
pp.367-372
ISEC, LOIS 2009-11-12
13:55
Gifu Gifu Univ. A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme
Masaki Inamura, Ryu Watanabe, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-52 LOIS2009-41
We first propose a hierarchical structured multisignature scheme based on the Gap Diffie-Hellman(GDH) problem. We have e... [more] ISEC2009-52 LOIS2009-41
pp.9-14
ISEC, LOIS 2009-11-12
14:20
Gifu Gifu Univ. A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings
Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2009-53 LOIS2009-42
Group signature scheme is the digital signature scheme enhancing the privacy of the user,and efficient pairing-based sch... [more] ISEC2009-53 LOIS2009-42
pp.15-22
ISEC 2009-05-22
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check
Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.) ISEC2009-6
A group signature scheme with efficient verifier-local revocation check has been proposed. This scheme provides a more e... [more] ISEC2009-6
pp.37-42
ICSS 2009-05-15
14:20
Hyogo Kobe University Notes on Malware Detection System Based on Process Monitoring
Yuko Ozasa, Kengo Kuniyoshi, Akira Morikawa, Masakatu Morii (Kobe Univ.) ICSS2009-3
Due to the increase of malwares and its variants, such as bots, worms,
spywares and adwares, both personal and busines... [more]
ICSS2009-3
pp.9-14
WBS, IT, ISEC 2009-03-10
17:30
Hokkaido Hakodate Mirai Univ. Detecting anomalies by monitoring terminals in Home Network
Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.) IT2008-94 ISEC2008-152 WBS2008-107
The system like IDS and IPS based on the handcrafted signatures which represent the illegal characteristics is effective... [more] IT2008-94 ISEC2008-152 WBS2008-107
pp.329-334
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. An ID-Based 2-Functional Proxy Cryptosystem
Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] IT2008-130 ISEC2008-188 WBS2008-143
pp.563-568
IA, SITE 2009-03-05
14:40
Kumamoto   String Matching Algorithms specialized for IDS
Takashi Imaizumi (Chiba Univ.), Keisuke Mizuno (Nara Inst. of S and T) SITE2008-62 IA2008-85
While we use intrusion detection system, we can not be free from false positive alerts. In other words, there is little... [more] SITE2008-62 IA2008-85
pp.107-112
IN, NS
(Joint)
2009-03-03
09:20
Okinawa Okinawa-Zanpamisaki Royal Hotel PrBL: Probabilistic BlackList for E-mail Spammers
Tatsuya Mori (NTT) NS2008-146
Recent drastic increase in the number of spam messages has caused
significant overload on e-mail delivery systems.
IP... [more]
NS2008-146
pp.15-20
ISEC, LOIS 2008-11-13
16:05
Aichi Nagoya Noh Theater A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing
Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-80 OIS2008-56
Group signature scheme is one of signature schemes which keep signer’s identity information secret. To prevent a problem... [more] ISEC2008-80 OIS2008-56
pp.47-54
DE 2008-09-21
14:45
Fukushima   [Invited Talk] Approximate Queries on String Collections
Xiaochun Yang, Bin Wang (Northeastern Univ., China), Chen Li (UC Irvine) DE2008-31
Approximate queries on a collection of strings are important in many applications such as record linkage, spell checking... [more] DE2008-31
pp.3-4
ISEC 2008-09-12
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying
Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] ISEC2008-68
pp.33-38
ISEC, IT, WBS 2008-02-29
14:15
Tokyo   A proposal of modified multi ring signature
Mitsuaki Ikeda, Yutaka Kawai, Kazuo Ohta (UEC) IT2007-58 ISEC2007-155 WBS2007-89
The $k$-out-of-$n$ signature is a signature scheme where $k$ real signers
among $n$ signers corporate in signature gene... [more]
IT2007-58 ISEC2007-155 WBS2007-89
pp.65-71
 Results 21 - 40 of 49 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan