IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2017)

Search Results: Keywords 'from:2018-03-08 to:2018-03-08'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 50  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2018-03-08
09:00
Tokyo Katsusika Campas, Tokyo University of Science Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2017-103 ISEC2017-91 WBS2017-84
In this paper, we discuss a problem to estimate the conditional distribution of $Y_{N+1}$ given $x_{N+1}$ and ${(x_t,y_t... [more] IT2017-103 ISEC2017-91 WBS2017-84
pp.1-6
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.) IT2017-104 ISEC2017-92 WBS2017-85
In learning algorithms for Boltzmann machines, it is necessary but very hard to calculate the expectation of units with ... [more] IT2017-104 ISEC2017-92 WBS2017-85
pp.7-12
WBS, IT, ISEC 2018-03-08
09:50
Tokyo Katsusika Campas, Tokyo University of Science Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior -- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC) IT2017-105 ISEC2017-93 WBS2017-86
Bayesian mixture with non-discrete prior has an asymptotic redundancy proportional to the half of log data length, with ... [more] IT2017-105 ISEC2017-93 WBS2017-86
pp.13-18
WBS, IT, ISEC 2018-03-08
10:15
Tokyo Katsusika Campas, Tokyo University of Science Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.) IT2017-106 ISEC2017-94 WBS2017-87
The universality of some variations of two-step lossless source codes using asymptotically sufficient statistics were pr... [more] IT2017-106 ISEC2017-94 WBS2017-87
pp.19-24
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba) IT2017-108 ISEC2017-96 WBS2017-89
In Shamir's (k, n)-threshold scheme, given a secret S
a dealer generates n shares by using a random polynomial
of de... [more]
IT2017-108 ISEC2017-96 WBS2017-89
pp.31-36
WBS, IT, ISEC 2018-03-08
11:40
Tokyo Katsusika Campas, Tokyo University of Science Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-109 ISEC2017-97 WBS2017-90
A $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS) is a kind of secret sharing schemes for digital images.
In... [more]
IT2017-109 ISEC2017-97 WBS2017-90
pp.37-42
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech) IT2017-110 ISEC2017-98 WBS2017-91
In a two-user interference channel for simultaneous information and energy transfer, there are an ID (Information Decodi... [more] IT2017-110 ISEC2017-98 WBS2017-91
pp.43-48
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Optimality for the Iterative Construction Scheme of AIFV-$m$ codes
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) IT2017-111 ISEC2017-99 WBS2017-92
Yamamoto, Tsuchihashi, and Honda proposed binary AIFV (almost instantaneous fixed-to-variable length) codes, which allow... [more] IT2017-111 ISEC2017-99 WBS2017-92
pp.49-54
WBS, IT, ISEC 2018-03-08
13:50
Tokyo Katsusika Campas, Tokyo University of Science Optimal Coded Caching using Linear Programming
Shota Kamiya, Hiroki Koga (Univ. Tsukuba) IT2017-112 ISEC2017-100 WBS2017-93
Caching is a method of reducing the network traffic by prefetching some part of contents into memories of users. In this... [more] IT2017-112 ISEC2017-100 WBS2017-93
pp.55-60
WBS, IT, ISEC 2018-03-08
14:15
Tokyo Katsusika Campas, Tokyo University of Science Shifted Coded Slotted ALOHA
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.) IT2017-113 ISEC2017-101 WBS2017-94
In the random access scheme, each user randomly transmits packets in accordance with a predetermined rule.
In this sche... [more]
IT2017-113 ISEC2017-101 WBS2017-94
pp.61-66
WBS, IT, ISEC 2018-03-08
15:00
Tokyo Katsusika Campas, Tokyo University of Science [Invited Talk] On Traitor Tracings and Related Topics
Shota Yamada (AIST) IT2017-114 ISEC2017-102 WBS2017-95
 [more] IT2017-114 ISEC2017-102 WBS2017-95
p.67
WBS, IT, ISEC 2018-03-08
16:00
Tokyo Katsusika Campas, Tokyo University of Science [Invited Talk] Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK) IT2017-115 ISEC2017-103 WBS2017-96
 [more] IT2017-115 ISEC2017-103 WBS2017-96
p.69
WBS, IT, ISEC 2018-03-08
17:00
Tokyo Katsusika Campas, Tokyo University of Science [Invited Talk] On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute) IT2017-116 ISEC2017-104 WBS2017-97
 [more] IT2017-116 ISEC2017-104 WBS2017-97
p.71
WBS, IT, ISEC 2018-03-08
09:00
Tokyo Katsusika Campas, Tokyo University of Science Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-117 ISEC2017-105 WBS2017-98
This paper examines randomizing components in Minalpher, where the randomizing components are Shift Rows (SR) and Mix C... [more] IT2017-117 ISEC2017-105 WBS2017-98
pp.73-79
WBS, IT, ISEC 2018-03-08
09:25
Tokyo Katsusika Campas, Tokyo University of Science A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC) IT2017-118 ISEC2017-106 WBS2017-99
Hierarchical secret sharing schemes are known for how they share a secret among a group of participants partitioned into... [more] IT2017-118 ISEC2017-106 WBS2017-99
pp.81-88
WBS, IT, ISEC 2018-03-08
09:50
Tokyo Katsusika Campas, Tokyo University of Science Succinct Oblivious RAM
Taku Onodera, Tetsuo Shibuya (IMSUT) IT2017-119 ISEC2017-107 WBS2017-100
As online storage services become increasingly common, it is important that users’ private information is protected from... [more] IT2017-119 ISEC2017-107 WBS2017-100
pp.89-96
WBS, IT, ISEC 2018-03-08
10:15
Tokyo Katsusika Campas, Tokyo University of Science High Efficient Scalar Multiplication in Elliptic Curve Cryptography
Noboru Takeuchi, Toshiyuki Kinoshita (TUT) IT2017-120 ISEC2017-108 WBS2017-101
(To be available after the conference date) [more] IT2017-120 ISEC2017-108 WBS2017-101
pp.97-101
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science Digital watermark using deep-learning classification
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) IT2017-121 ISEC2017-109 WBS2017-102
Digital watermarking is a technique of embedding information in an original image without being noticed or disclosed to ... [more] IT2017-121 ISEC2017-109 WBS2017-102
pp.103-106
WBS, IT, ISEC 2018-03-08
11:15
Tokyo Katsusika Campas, Tokyo University of Science Evaluation of deep learning method for detection of intrusion packets
Tomoki Ueno, Mitiko Harayama (GIFU Univ) IT2017-122 ISEC2017-110 WBS2017-103
 [more] IT2017-122 ISEC2017-110 WBS2017-103
pp.107-113
 Results 1 - 20 of 50  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan