|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, IT, RCS |
2018-01-23 10:00 |
Kagawa |
Sunport Hall Takamatsu |
Evaluation of Eavesdropping Resistance in Secret Information Transmission Scheme Using Signal Decomposition and Spatial Vector Composition Kazuki Tsuji, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) IT2017-85 SIP2017-93 RCS2017-299 |
As a countermeasure against eavesdropping in mobile communications, secret information transmission scheme using signal ... [more] |
IT2017-85 SIP2017-93 RCS2017-299 pp.177-182 |
SANE |
2017-05-22 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Measurement deception and its countermeasure in a navigation satellite system Takashi Iwamoto (Mitsubishi Electric Corp.) SANE2017-4 |
Broadened applications of navigation satellite systems as social bases have been revealing vulnerabilities of being inte... [more] |
SANE2017-4 pp.19-22 |
ISEC, WBS, IT |
2017-03-09 11:25 |
Tokyo |
TOKAI University |
[Invited Talk]
Recent Advances in Whitebox Cryptgraphy
-- Efficient and Robust Constructions and New Attacks -- Takanori Isobe (Sony Global M&O Corp.) IT2016-102 ISEC2016-92 WBS2016-78 |
Whitebox cryptography is a technique to protect software implementations of cryptographic algorithms
in untrusted envir... [more] |
IT2016-102 ISEC2016-92 WBS2016-78 p.23 |
EMM |
2015-01-29 10:00 |
Miyagi |
Tohoku University |
Study on Audio Watermarking Scheme based on Singular-Spectrum Analysis Jessada Karnjana, Masashi Unoki (JAIST), Pakinee Aimmanee (Thammasat Univ.), Chai Wuthiwiwatchai (NECTEC) EMM2014-71 |
This paper proposes a blind audio watermarking scheme based on singular-spectrum analysis (SSA) which relates to several... [more] |
EMM2014-71 pp.27-32 |
ISEC, IT, WBS |
2011-03-04 15:20 |
Osaka |
Osaka University |
Robust image hashing against geometric attacks using image normalization and SVD decomposition Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX) IT2010-102 ISEC2010-106 WBS2010-81 |
This paper uses SVD decomposition and image normalization algorithm to generate a hash value of a digital image. SVD dec... [more] |
IT2010-102 ISEC2010-106 WBS2010-81 pp.221-226 |
ISEC |
2008-12-17 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Knapsack Cryptosystem Resisting Wellknown Attacks Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96 |
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] |
ISEC2008-96 pp.41-44 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|