IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 44 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2017-09-04
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings
Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] ISEC2017-46
pp.35-42
RCS, SAT
(Joint)
2017-08-17
09:00
Niigata Niigata Univ. Performance Evaluation of a Successive Interference Cancellation Scheme Dealing with Asynchronous Signal Collision in Space-based AIS
Shunsuke Uehashi, Yasunori Nouda, Akira Kurita, Katsuyuki Motoyoshi, Atsushi Okamura (Mitsubishi Electric) RCS2017-150
Space-based AIS (Automatic Identification System) is used for the purpose of global maritime traffic monitoring and safe... [more] RCS2017-150
pp.43-48
IT, ISEC, WBS 2016-03-10
12:50
Tokyo The University of Electro-Communications Revisiting Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2015-112 ISEC2015-71 WBS2015-95
The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-qua... [more] IT2015-112 ISEC2015-71 WBS2015-95
pp.67-74
ISEC, LOIS 2013-11-29
13:05
Miyagi Tohoku Univ. A Lossy Identification Scheme from the Subgroup Decision
Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] ISEC2013-68 LOIS2013-34
pp.57-63
BioX
(2nd)
2013-08-28
10:00
Osaka The Institute of Scientific and Industrial Research, Osaka Univ. On Optimal Sequential Fusion in Biometric Identification
Takao Murakami, Kenta Takahashi (Hitachi), Kanta Matsuura (Univ. Tokyo)
Biometric identification systems can provide a very convenient way of authentication because they do not require a user ... [more]
NS, IN
(Joint)
2013-03-08
10:30
Okinawa Okinawa Zanpamisaki Royal Hotel Improvement of Tag Node Detection Rate Using Multi-Stage Arrangement of HSN Readers and Notice of Identified Tag Nodes in the Following Stage in Hybrid RFID Sensor Network
Takuya Miyagawa, Shinichiro Hara, Tatsuya Koizumi, Iwao Sasase (Keio Univ.) NS2012-213
In order to collect more data by using cheap and longer operating life tag nodes, HSN(Hybrid rfid/Sensor Node) has been ... [more] NS2012-213
pp.277-282
ISEC 2012-09-21
14:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) ISEC2012-51
The Fiat-Shamir heuristic is a well-known technique for converting commitment-challenge-response identification schemes ... [more] ISEC2012-51
p.39
ISEC 2011-12-14
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public-Key Identification Schemes based on Multivariate Quadratic Polynomials
Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] ISEC2011-72
p.39
DC 2011-06-24
16:20
Tokyo Kikai-Shinko-Kaikan Bldg. Low Power At-Speed Scan Testing for LOS Scheme by Test Vector Modification
Kohei Miyase, Yuta Uchinodan, Kazunari Enokimoto (KIT), Yuta Yamato (NAIST), Xiaoqing Wen, Seiji Kajihara (KIT), Fangmei Wu, Luigi Dilillo, Alberto Bosio, Patrick Girard, Arnaud Verazel (Lirmm) DC2011-13
In this paper, we present a test vector modification method to reduce launch-to-capture power for LOS scheme. The propos... [more] DC2011-13
pp.29-34
SIS 2010-12-02
14:55
Nara   Low Frequency Radio Positioning System using Direct Sequency Spread Spectrum with Loop Antenna Array
Shinichi Watanabe, Ryusuke Miyamoto, Minoru Okada (NAIST) SIS2010-44
Systems with location-aware technique have been attracted recently. Not all of them need to know the
location of receiv... [more]
SIS2010-44
pp.53-57
IT, ISEC, WBS 2010-03-04
11:15
Nagano Nagano-Engineering Campus, Shinshu University A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] IT2009-76 ISEC2009-84 WBS2009-55
pp.31-38
IT, ISEC, WBS 2010-03-04
11:40
Nagano Nagano-Engineering Campus, Shinshu University Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more]
IT2009-77 ISEC2009-85 WBS2009-56
pp.39-43
WBS 2009-10-16
13:00
Osaka   [Poster Presentation] Simple Radio Positioning System Based on LF Direct Sequence Spread Spectrum Signals and Loop Antenna Array
Shinichi Watanabe, Masato Saito, Minoru Okada (NAIST) WBS2009-32
Systems with location-aware technique have been attracted recently. Not all of them need to know the location of receive... [more] WBS2009-32
pp.43-47
SR 2009-07-30
09:55
Tokyo Tokyo institute of technology Modulation Identification with Mean Power Variance in CDMA Wireless Communication System
Narimasa Sugimoto, Osamu Takyu, Yohtaro Umeda (Tokyo Univ. of Science), Takeo Fujii (AWCC), Masao Nakagawa (Keio Univ.) SR2009-39
Cognitive Radio is a wireless communication system which makes it possible to use the channel resources more efficiently... [more] SR2009-39
pp.107-112
DE 2009-07-28
13:50
Hyogo Kobe fashion mart An Efficient Identification and Indexing for Secure RFID with d-Left Hashing
Yasunobu Nohara (Kyushu Univ.), Sozo Inoue (Kyushu Inst. Tech.) DE2009-6
In this paper, we propose a secure identification scheme for RFID with efficient time and memory, and also an efficient ... [more] DE2009-6
pp.31-36
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:35
Akita Akita University Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more]
ISEC2009-30 SITE2009-22 ICSS2009-44
pp.161-168
IN, NS
(Joint)
2009-03-04
11:30
Okinawa Okinawa-Zanpamisaki Royal Hotel A proposal of new ID base identification
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IN2008-172
Kurosawa and Heng proposed a transformation from digital signature scheme to identity-based(ID-based) identification sch... [more] IN2008-172
pp.237-241
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2008-11-17
13:50
Fukuoka Kitakyushu Science and Research Park A Capture-Safe Test Generation Scheme for At-speed Scan Testing
Atsushi Takashima, Yuta Yamato, Hiroshi Furukawa, Kohei Miyase, Xiaoqing Wen, Seiji Kajihara (Kyusyu Institute of Technology) VLD2008-62 DC2008-30
Capture-safety, defined as the avoidance of any timing error due to unduly high switching activity in capture mode durin... [more] VLD2008-62 DC2008-30
pp.13-18
IN 2008-02-14
16:15
Kagawa Kagawa University A Scalable and Efficient Scheme for Privacy-Protected RFID Systems
Le Thi Ngoc Anh, Koki Abe (Univ. of Electro-Comm.) IN2007-147
Radio Frequency Identification (RFID) has become a useful tool and been applied to many systems such as supply chain man... [more] IN2007-147
pp.29-34
MI 2007-11-16
11:25
Ishikawa Kanazawa Univ. High security personal identification system using retinal fundus camera
Keisuke Fukuta, Toshiaki Nakagawa (Gifu Univ.), Yoshinori Hayashi (TAK Co.,Ltd.), Yuji Hatanaka (Gifu National College of Technology), Takeshi Hara, Hiroshi Fujita (Gifu Univ.) MI2007-53
Recently there are many systems which need identification of person automatically. In this paper, we propose a high secu... [more] MI2007-53
pp.25-28
 Results 21 - 40 of 44 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan