Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2014-03-10 15:45 |
Aichi |
Nagoya Univ., Higashiyama Campus |
[Invited Talk]
Information-Theoretic Cryptography
-- Survey and Challenge -- Junji Shikata (Yokohama National Univ.) IT2013-74 ISEC2013-103 WBS2013-63 |
[more] |
IT2013-74 ISEC2013-103 WBS2013-63 p.127 |
ISEC, IT, WBS |
2014-03-10 16:40 |
Aichi |
Nagoya Univ., Higashiyama Campus |
[Invited Talk]
Approaches from Queueing Theory for Wireless Mesh Networks Hiraku Okada (Nagoya Univ.) IT2013-75 ISEC2013-104 WBS2013-64 |
This talk presents two approaches from queueing theory for wireless mesh
networks. One is performance comparison of wir... [more] |
IT2013-75 ISEC2013-104 WBS2013-64 pp.129-134 |
ISEC, IT, WBS |
2014-03-11 10:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Numerical analysis of optimal quantum cloning machines for trine states Akira Koyama, Jun Suzuki (Univ. of Electro-Comm.) IT2013-76 ISEC2013-105 WBS2013-65 |
We study optimal quantum cloning machines for trine qubit states numerically.
In this work, we address the problem of ... [more] |
IT2013-76 ISEC2013-105 WBS2013-65 pp.135-140 |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Information Geometry for Markov Chains Masahito Hayashi (Nagoya Univ.), Shun Watanabe (Tokushima Univ.) |
[more] |
|
ISEC, IT, WBS |
2014-03-11 11:25 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Conditional additive channel with Markovian memory Masahito Hayashi (Nagoya Univ.), Shun Watanabe (Tokushima Univ.) |
[more] |
|
ISEC, IT, WBS |
2014-03-11 09:55 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Study of Data Communication using Spread Spectrum Modulation in Magnetic Field Resonance Wireless Power Transfer Shouhei Ueno, Kazuki Sugeno, Motoki Iida, Yukitoshi Sanada (Keio Univ.) IT2013-77 ISEC2013-106 WBS2013-66 |
This report investigated a data transmission system with spread spectrum modulation in a magnetic field resonance wirele... [more] |
IT2013-77 ISEC2013-106 WBS2013-66 pp.141-146 |
ISEC, IT, WBS |
2014-03-11 10:20 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Data Transmission using Transmitter Side Channel Estimation in Wireless Power Transfer System Kazuki Sugeno, Yukitoshi Sanada (Keio Univ.), Mamiko Inamori (Tokai Univ.) IT2013-78 ISEC2013-107 WBS2013-67 |
In recent years, wireless power transfer has been attracting a great deal of attention.In order to achieve efficient pow... [more] |
IT2013-78 ISEC2013-107 WBS2013-67 pp.147-153 |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
ISEC, IT, WBS |
2014-03-11 11:25 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Distribution Related to The Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion 2 Problem over Barreto-Naehrig Curve Shoichi Akagi, Yasuyuki Nogami (Okayama Univ.) IT2013-80 ISEC2013-109 WBS2013-69 |
As one of problems that guarantee the security of pairing--based cryptography, {em pairing inversion} problem is studied... [more] |
IT2013-80 ISEC2013-109 WBS2013-69 pp.163-168 |
ISEC, IT, WBS |
2014-03-11 13:20 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime Bai Ro, Tomohiko Uyematsu, Ryutaroh Matsumoto, Tetsunao Matsuta (Tokyo Inst. of Tech.) IT2013-81 ISEC2013-110 WBS2013-70 |
This paper deals with the energy effiency of energy-constrained terminals in the wireless duocast relay multiple access ... [more] |
IT2013-81 ISEC2013-110 WBS2013-70 pp.169-174 |
ISEC, IT, WBS |
2014-03-11 13:45 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Performance Analysis of Amplify-and-Forward Cooperative Diversity with RF Energy Harvesting Hiroki Kawabata, Koji Ishibashi (The Univ. of Electro-Comm.) IT2013-82 ISEC2013-111 WBS2013-71 |
Typical wireless channels suffer from a multipath fading which significantly reduces communication capacity for a given ... [more] |
IT2013-82 ISEC2013-111 WBS2013-71 pp.175-180 |
ISEC, IT, WBS |
2014-03-11 14:10 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On Dynamic Cooperative Diversity Based on Dual-Spinal Codes Shun Ogata, Koji Ishibashi (The Univ. of Electro-Comm.) IT2013-83 ISEC2013-112 WBS2013-72 |
Spinal codes, a new class of rateless codes proposed recently, have gathered much attention due to its capacity-achievin... [more] |
IT2013-83 ISEC2013-112 WBS2013-72 pp.181-186 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A QAM Classification based on Two Amplitude Moments in the Presence of Symbol Timing Error Yasuhiro Matsumura, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2013-84 ISEC2013-113 WBS2013-73 |
In cognitive radios, signal detection and modulation classification are becoming more and more important to recognize wi... [more] |
IT2013-84 ISEC2013-113 WBS2013-73 pp.187-192 |
ISEC, IT, WBS |
2014-03-11 13:20 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Construction of an Efficient Linear Ramp Threshold Secret Sharing Scheme Using an LT code Mitsuteru Sakashita, Hiroki Koga, Shuntaro Honjo (Univ.of Tsukuba) IT2013-85 ISEC2013-114 WBS2013-74 |
[more] |
IT2013-85 ISEC2013-114 WBS2013-74 pp.193-200 |
ISEC, IT, WBS |
2014-03-11 13:45 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security Shuntaro Honjo, Hiroki Koga, Mitsuteru Sakashita (Univ. of Tsukuba) IT2013-86 ISEC2013-115 WBS2013-75 |
[more] |
IT2013-86 ISEC2013-115 WBS2013-75 pp.201-207 |
ISEC, IT, WBS |
2014-03-11 14:10 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Secret Sharing Schemes Secure against Rushing Adversaries Satoshi Obana (Hosei Univ.) IT2013-87 ISEC2013-116 WBS2013-76 |
[more] |
IT2013-87 ISEC2013-116 WBS2013-76 pp.209-214 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2013-88 ISEC2013-117 WBS2013-77 pp.215-220 |
ISEC, IT, WBS |
2014-03-11 15:15 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on the Complex Modulation with Zero Point from Constant-Weight and Multi-Valued Sequences Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.), Keiichi Takahashi (Kinki Univ.) IT2013-89 ISEC2013-118 WBS2013-78 |
For transmission of information, a method using the values in the constant-weight and multi-valued sequence that is prop... [more] |
IT2013-89 ISEC2013-118 WBS2013-78 pp.221-226 |
ISEC, IT, WBS |
2014-03-11 15:40 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Performance Evaluation of Single Carrier Transmission Using Frequency Domain Equalization Shinichiro Miyazaki, Shoichiro Yamasaki (Polytechnic Univ.), Ryuji Kohno (Yokohama National Univ.) IT2013-90 ISEC2013-119 WBS2013-79 |
Single carrier(SC) method using frequency domain equalization(FDE) is a promising technique to cope with multipath chann... [more] |
IT2013-90 ISEC2013-119 WBS2013-79 pp.227-232 |
ISEC, IT, WBS |
2014-03-11 16:05 |
Aichi |
Nagoya Univ., Higashiyama Campus |
Constructions of Time-Space Constrained Codes by Flipping 1 Bit Shohei Takeyama, Hiroshi Kamabe (Gifu Univ.) IT2013-91 ISEC2013-120 WBS2013-80 |
Phase-change memory(PCM) is a promising non-volatile solid-state memory.
The cell changes between these two states usin... [more] |
IT2013-91 ISEC2013-120 WBS2013-80 pp.233-240 |