IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, IT, RCS 2018-01-23
10:00
Kagawa Sunport Hall Takamatsu Evaluation of Eavesdropping Resistance in Secret Information Transmission Scheme Using Signal Decomposition and Spatial Vector Composition
Kazuki Tsuji, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) IT2017-85 SIP2017-93 RCS2017-299
As a countermeasure against eavesdropping in mobile communications, secret information transmission scheme using signal ... [more] IT2017-85 SIP2017-93 RCS2017-299
pp.177-182
SANE 2017-05-22
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. Measurement deception and its countermeasure in a navigation satellite system
Takashi Iwamoto (Mitsubishi Electric Corp.) SANE2017-4
Broadened applications of navigation satellite systems as social bases have been revealing vulnerabilities of being inte... [more] SANE2017-4
pp.19-22
ISEC, WBS, IT 2017-03-09
11:25
Tokyo TOKAI University [Invited Talk] Recent Advances in Whitebox Cryptgraphy -- Efficient and Robust Constructions and New Attacks --
Takanori Isobe (Sony Global M&O Corp.) IT2016-102 ISEC2016-92 WBS2016-78
Whitebox cryptography is a technique to protect software implementations of cryptographic algorithms
in untrusted envir... [more]
IT2016-102 ISEC2016-92 WBS2016-78
p.23
EMM 2015-01-29
10:00
Miyagi Tohoku University Study on Audio Watermarking Scheme based on Singular-Spectrum Analysis
Jessada Karnjana, Masashi Unoki (JAIST), Pakinee Aimmanee (Thammasat Univ.), Chai Wuthiwiwatchai (NECTEC) EMM2014-71
This paper proposes a blind audio watermarking scheme based on singular-spectrum analysis (SSA) which relates to several... [more] EMM2014-71
pp.27-32
ISEC, IT, WBS 2011-03-04
15:20
Osaka Osaka University Robust image hashing against geometric attacks using image normalization and SVD decomposition
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX) IT2010-102 ISEC2010-106 WBS2010-81
This paper uses SVD decomposition and image normalization algorithm to generate a hash value of a digital image. SVD dec... [more] IT2010-102 ISEC2010-106 WBS2010-81
pp.221-226
ISEC 2008-12-17
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Knapsack Cryptosystem Resisting Wellknown Attacks
Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] ISEC2008-96
pp.41-44
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan