IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2013)

Search Results: Keywords 'from:2014-03-10 to:2014-03-10'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 41 - 44 of 44 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2014-03-11
16:30
Aichi Nagoya Univ., Higashiyama Campus Reduction of Error-Trellises for Tail-Biting Convolutional Codes Using Shifted Error-Subsequences
Masato Tajima, Koji Okino, Tatsuto Murayama (Univ. of Toyama) IT2013-92 ISEC2013-121 WBS2013-81
In this paper, we discuss the reduction of error-trellises for tail-biting convolutional codes. In the case where a spec... [more] IT2013-92 ISEC2013-121 WBS2013-81
pp.241-248
ISEC, IT, WBS 2014-03-11
15:15
Aichi Nagoya Univ., Higashiyama Campus Identification Capacity of a Biometrical Identification System Using List Decording
Marika Mori, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2013-93 ISEC2013-122 WBS2013-82
The biometrical identification system using list decorder is a system which outputs candidates from the observed biometr... [more] IT2013-93 ISEC2013-122 WBS2013-82
pp.249-254
ISEC, IT, WBS 2014-03-11
15:40
Aichi Nagoya Univ., Higashiyama Campus On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more]
IT2013-94 ISEC2013-123 WBS2013-83
pp.255-260
ISEC, IT, WBS 2014-03-11
16:05
Aichi Nagoya Univ., Higashiyama Campus Coding Theorems for Shannon's Cipher System under Two New Secrecy Criteria
Shun Kikuchi, Hiroki Koga (Univ. of Tsukuba) IT2013-95 ISEC2013-124 WBS2013-84
In this paper we consider the situation where $n$ plaintexts generated from a stationary memoryless source are encoded t... [more] IT2013-95 ISEC2013-124 WBS2013-84
pp.261-268
 Results 41 - 44 of 44 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan