IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 61 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, SIP, RCS 2017-01-19
13:05
Osaka Osaka City Univ. A study on application of one time pad to enhance information secrecy in wireless distributed transmission
Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] IT2016-60 SIP2016-98 RCS2016-250
pp.81-86
IA, IN
(Joint)
2016-12-15
16:45
Hiroshima Hiroshima city university The Reconstruction System of Partial Information by using Partial Restoring Method in Secret Sharing Scheme
Asami Tanaka, Masahiro Fukumoto (KUT) IA2016-70
Recently to prevent medical data from loss and leak, there is the distributed backup project using secret sharing scheme... [more] IA2016-70
pp.41-46
RCS 2016-10-20
11:35
Kanagawa YRP (Yokosuka) Study on Secret Information Sharing with Propagation Coefficient and Public Transmission of Antenna Weight
Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2016-164
In recent years, as a countermeasure against eavesdropping in wireless communication, physical layer security draw atten... [more] RCS2016-164
pp.65-70
IN, IA
(Joint)
2015-12-17
16:10
Hiroshima Hiroshima City University The Reconstruction of Partial Information by using Partial Restoring Method in Secret Sharing Scheme
Asami Tanaka, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2015-74
Recently the medical data which backup and distributed in outside area using the secret sharing scheme (SSS) when the di... [more] IA2015-74
pp.31-36
RCS, IN
(Joint)
2015-05-22
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Using Signal Strength to prevent sessinon hijacking in IEEE 802.11
Nariaki Tamaki, Takehiro Kawata (NTT) IN2015-12
We propose a method for detecting malicious frames used to disconnect legitimate sessions, and preventing session hijack... [more] IN2015-12
pp.55-60
EMM, IT 2015-05-22
13:40
Kyoto Kyoto International Community House An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] IT2015-14 EMM2015-14
pp.75-80
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Generation Methods of Secret Sharing QR Codes
Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] EMM2014-92
pp.91-96
CAS, SIP, MSS, VLD, SIS [detail] 2014-07-11
14:30
Hokkaido Hokkaido University Tamper resistance PUF ID based on secret sharing schemes
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42
In recently years, semiconductor counterfeiting has become a serious problem. To prevent the problem, Physical Unclonabl... [more] CAS2014-42 VLD2014-51 SIP2014-63 MSS2014-42 SIS2014-42
pp.225-230
SWIM 2014-05-23
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services
Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] SWIM2014-4
pp.19-24
ISEC, IT, WBS 2014-03-11
14:35
Aichi Nagoya Univ., Higashiyama Campus On a secret sharing scheme with systematic Reed-Solomon codes and its applications
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] IT2013-88 ISEC2013-117 WBS2013-77
pp.215-220
LOIS 2014-03-07
14:00
Okinawa   On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values
Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT) LOIS2013-61
When one treats confidential data such as personal information on a life log or an office information system, fulfilling... [more] LOIS2013-61
pp.41-46
SIS 2013-12-13
13:10
Tottori Torigin Bunka Kaikan (Tottori) A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] SIS2013-51
pp.131-136
SIS, IPSJ-AVM 2013-09-13
11:35
Tokyo Waseda Univ. A study on encoding scheme of secret sharing information
Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) SIS2013-26
A secret sharing is attracting attention as an algorithm in cryptography. It is a method in which the source data is div... [more] SIS2013-26
pp.77-82
LOIS 2013-03-07
14:30
Okinawa   Medical Consumer Controllable Information Disclosing Method by Secret Sharing for Personal Health Record
Wataru Mizoguchi, Taichi Tatsuda, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-81
There is a need for self-management of medical and health information by medical consumers themselves using PHR(Personal... [more] LOIS2012-81
pp.71-76
SIP, RCS 2013-02-01
11:40
Hiroshima Viewport-Kure-Hotel (Kure) A Study on Distributed Transmission in Wireless Space for Secret Communication Based on a Joint Transmitter-Receiver Beamforming
Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) SIP2012-118 RCS2012-275
The authors have proposed a secure wireless link creation scheme based on a distributed transmission by providing multip... [more] SIP2012-118 RCS2012-275
pp.219-224
EMM 2013-01-30
11:10
Miyagi Tohoku Univ. A Secret Sharing Method for String Data Incorporating Their Transformation
Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more]
EMM2012-100
pp.53-58
ISEC, LOIS 2012-11-22
13:15
Shizuoka Shizuoka City Industry-University Exchange Center Secret sharing using the Chinese remainder theorem and its application
Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.) ISEC2012-66 LOIS2012-41
This paper presents a method of secret sharing using Chinese remainder theorem. In particular, we develop a system whic... [more] ISEC2012-66 LOIS2012-41
pp.61-68
EMM 2012-10-04
14:00
Chiba Makuhari Messe Secret Sharing Suitable for Cloud Computing
Satoshi Takahashi, Keiichi Iwamura (TUS) EMM2012-57
Recently, secret sharing has been attracting attention of applying to loud computing. For this reason is secret sharing ... [more] EMM2012-57
pp.11-16
IT 2011-07-22
09:55
Okayama Okayama University On ramp secret sharing schemes for distributed storage systems under repair dynamics -- Ramp Secret Sharing Schemes based on MBR Codes --
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe Univ.) IT2011-17
In this paper, a construction method of ramp secret sharing systems based on minimum bandwidth regenerating(MBR) codes f... [more] IT2011-17
pp.41-46
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.) IT2010-114 ISEC2010-118 WBS2010-93
In this paper, an extended version of Rashmi-Shah-Kumar Minimum Storage Regenerating(MSR) codes is proposed. In Rashmi-S... [more] IT2010-114 ISEC2010-118 WBS2010-93
pp.303-310
 Results 21 - 40 of 61 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan