Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-08 16:45 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116 |
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] |
IT2018-115 ISEC2018-121 WBS2018-116 p.249 |
IT, ISEC, WBS |
2019-03-08 09:50 |
Tokyo |
University of Electro-Communications |
Equivalence theorem and comparison of optimal designs in qubit systems Jun Suzuki (UEC) IT2018-116 ISEC2018-122 WBS2018-117 |
In this paper we study the quantum-state estimation problem in the framework of optimal design of experiments. We first ... [more] |
IT2018-116 ISEC2018-122 WBS2018-117 pp.251-256 |
IT, ISEC, WBS |
2019-03-08 10:15 |
Tokyo |
University of Electro-Communications |
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence Minori Ihara, Kazunori Iwata, Kazushi Mimura (Hiroshima City Univ.) IT2018-117 ISEC2018-123 WBS2018-118 |
We evaluate typical performance of compressed sensing in the case where iterative recovery algorithms fail to converge. ... [more] |
IT2018-117 ISEC2018-123 WBS2018-118 pp.257-262 |
IT, ISEC, WBS |
2019-03-08 10:50 |
Tokyo |
University of Electro-Communications |
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC) IT2018-118 ISEC2018-124 WBS2018-119 |
In Wyner's wiretap channel, information leakage is defined as mutual information between transmitter's messages and eave... [more] |
IT2018-118 ISEC2018-124 WBS2018-119 pp.263-268 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120 |
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] |
IT2018-119 ISEC2018-125 WBS2018-120 pp.269-274 |
IT, ISEC, WBS |
2019-03-08 11:40 |
Tokyo |
University of Electro-Communications |
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants Takashi Hisatome, Hiroki Koga (U. Tsukuba) IT2018-120 ISEC2018-126 WBS2018-121 |
A secret sharing scheme is a method to share a secret S among participants. Secret sharing schemes are constructed in su... [more] |
IT2018-120 ISEC2018-126 WBS2018-121 pp.275-280 |
IT, ISEC, WBS |
2019-03-08 12:05 |
Tokyo |
University of Electro-Communications |
Secret Sharing on Evolving Multi-level Access Structure Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122 |
[more] |
IT2018-121 ISEC2018-127 WBS2018-122 pp.281-284 |
IT, ISEC, WBS |
2019-03-08 13:30 |
Tokyo |
University of Electro-Communications |
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123 |
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more] |
IT2018-122 ISEC2018-128 WBS2018-123 pp.285-290 |
IT, ISEC, WBS |
2019-03-08 13:55 |
Tokyo |
University of Electro-Communications |
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling Junta Furukawa, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.) IT2018-123 ISEC2018-129 WBS2018-124 |
In this paper, we propose a filter-and-forward (FF) relay scheme with full-duplex energy harvesting for single-carrier t... [more] |
IT2018-123 ISEC2018-129 WBS2018-124 pp.291-296 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
Performance Evaluations of Iterative Detection for Precoded OFDM with Channel Estimation Tadatomo Sato (NIT, Hiroshima Coll.) IT2018-125 ISEC2018-131 WBS2018-126 |
[more] |
IT2018-125 ISEC2018-131 WBS2018-126 pp.303-306 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.) IT2018-126 ISEC2018-132 WBS2018-127 |
Shifted VT codes correct a single insertion or deletion when the range of positions occurring insertion or deletion is g... [more] |
IT2018-126 ISEC2018-132 WBS2018-127 pp.307-312 |
IT, ISEC, WBS |
2019-03-08 15:45 |
Tokyo |
University of Electro-Communications |
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code Ibuki Tatsuta, Takayuki Nozaki (Yamaguchi Univ.) IT2018-127 ISEC2018-133 WBS2018-128 |
Fountain codes realize reliable communication systems for the multicast with user datagram protocol (UDP).
The zigzag d... [more] |
IT2018-127 ISEC2018-133 WBS2018-128 pp.313-318 |
IT, ISEC, WBS |
2019-03-08 16:10 |
Tokyo |
University of Electro-Communications |
Studies on Ordered Shuffled BP Decoding of LDPC Codes
-- Based on the Loops and Weight Distributions of LDPC Codes -- Ryoma Sakai, Arisa Matsuo, Kazuhiko Yamaguchi (UEC) IT2018-128 ISEC2018-134 WBS2018-129 |
In the Shuffled BP decoding of LDPC codes, the decoding order has a large influence on BER performance. Previous resear... [more] |
IT2018-128 ISEC2018-134 WBS2018-129 pp.319-324 |