IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 62 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SP, EA, SIP 2020-03-02
15:10
Okinawa Okinawa Industry Support Center
(Cancelled but technical report was issued)
A Pattern Recognition Method Using Secure Sparse Representations in L0 Norm Minimization
Takayuki Nakachi, Yitu Wang (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EA2019-130 SIP2019-132 SP2019-79
In this paper, we propose a privacy-preserving pattern recognition method using encrypted sparse representations in L0 n... [more] EA2019-130 SIP2019-132 SP2019-79
pp.169-174
ITE-BCT, SIS 2019-10-25
11:10
Fukui Fukui International Activities Plaza Image Compression in Encryption-then-Compression System Using Secure Sparse Representations
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] SIS2019-21
pp.77-82
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] 2019-09-19
15:10
Niigata Tokimeito, Niigata University Secure sparse representations in L0 norm minimization
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2019-11 IE2019-24 EMM2019-68
In this paper, we propose a method to estimate secure sparse representations in L0 norm minimization, and evaluate the e... [more] LOIS2019-11 IE2019-24 EMM2019-68
pp.25-30
CPSY, DC, IPSJ-ARC [detail] 2019-07-26
17:00
Hokkaido Kitami Civic Hall Secure Distributed Computing using Blockchain
Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] CPSY2019-37 DC2019-37
pp.223-227
ISEC 2019-05-17
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018)
Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] ISEC2019-11
p.49
EMM 2019-03-14
11:30
Okinawa TBD Image Patch Modeling using Secure Computation of Sparse Dictionary Learning
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2018-115
With the advent of the big data era, digital content continues to increase.
Sparse coding is attracting attention as an... [more]
EMM2018-115
pp.129-134
SIS 2019-03-06
15:10
Tokyo Tokyo Univ. Science, Katsushika Campus Secure Computation of Sparse Dictionary Learning
Takayuki Nakachi, Yukihiro Bandoh (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-43
With the advent of the big data era, all digital contents continue to increase. Sparse modeling is drawing attention as ... [more] SIS2018-43
pp.35-40
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2019-02-20
14:45
Hokkaido Hokkaido Univ. Encrypted Image Classification by Using Secure OMP Computation
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) ITS2018-84 IE2018-105
Currently, huge amounts of image/video are being recorded and uploaded every day by surveillance systems or SNS services... [more] ITS2018-84 IE2018-105
pp.227-232
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] 2018-09-27
13:50
Oita Beppu Int'l Convention Ctr. aka B-CON Plaza Image Patch Modeling in Encrypted Domain using Sparse Coding
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2018-12 IE2018-32 EMM2018-51
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] LOIS2018-12 IE2018-32 EMM2018-51
pp.13-18
ISEC 2018-09-07
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
Ryo Kikuchi (NTT) ISEC2018-54
In this invited talk, we introduce the paper ``Fast Large-Scale Honest-Majority MPC for Malicious Adversaries'' by Koji ... [more] ISEC2018-54
p.25
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:15
Hokkaido Sapporo Convention Center Secure Multiparty Computation of Ranking Using a Deck of Cards
Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
(To be available after the conference date) [more] ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
pp.163-169
SIS, IPSJ-AVM, ITE-3DMT [detail] 2018-06-07
10:20
Hokkaido Jozankei View Hotel Secure Computation of Sparse Coding for Privacy Protection
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-2
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] SIS2018-2
pp.7-12
ISEC 2018-05-16
11:30
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] The Minimum Number of Cards in Practical Card-Based Protocols (from ASIACRYPT 2017)
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-4
In this invited talk, we introduce the paper ``The Minimum Number of Cards in Practical Card-Based Protocols'' by J. Kas... [more] ISEC2018-4
p.25
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] IT2017-124 ISEC2017-112 WBS2017-105
pp.121-128
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more]
IT2017-125 ISEC2017-113 WBS2017-106
pp.129-135
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
ISEC 2017-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] ISEC2017-42
pp.7-14
ISEC 2017-09-04
12:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-43
(To be available after the conference date) [more] ISEC2017-43
pp.15-22
ISEC 2017-05-12
10:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Note on the Numbers of Cards Required to Make Copied Commitments
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] ISEC2017-3
pp.15-22
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-09
15:30
Okinawa Kumejima Island Approach to Direct Memory Access for Tamper Resistant System using Secure Processor
Rihito Suzuki, Takuya Kajiwara, Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2016-138 DC2016-84
In an environment using secure processor to support secure program execution, because of its integrity check mechanism, ... [more] CPSY2016-138 DC2016-84
pp.39-44
 Results 21 - 40 of 62 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan