Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2017-09-04 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46 |
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] |
ISEC2017-46 pp.35-42 |
RCS, SAT (Joint) |
2017-08-17 09:00 |
Niigata |
Niigata Univ. |
Performance Evaluation of a Successive Interference Cancellation Scheme Dealing with Asynchronous Signal Collision in Space-based AIS Shunsuke Uehashi, Yasunori Nouda, Akira Kurita, Katsuyuki Motoyoshi, Atsushi Okamura (Mitsubishi Electric) RCS2017-150 |
Space-based AIS (Automatic Identification System) is used for the purpose of global maritime traffic monitoring and safe... [more] |
RCS2017-150 pp.43-48 |
IT, ISEC, WBS |
2016-03-10 12:50 |
Tokyo |
The University of Electro-Communications |
Revisiting Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2015-112 ISEC2015-71 WBS2015-95 |
The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-qua... [more] |
IT2015-112 ISEC2015-71 WBS2015-95 pp.67-74 |
ISEC, LOIS |
2013-11-29 13:05 |
Miyagi |
Tohoku Univ. |
A Lossy Identification Scheme from the Subgroup Decision Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34 |
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] |
ISEC2013-68 LOIS2013-34 pp.57-63 |
BioX (2nd) |
2013-08-28 10:00 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
On Optimal Sequential Fusion in Biometric Identification Takao Murakami, Kenta Takahashi (Hitachi), Kanta Matsuura (Univ. Tokyo) |
Biometric identification systems can provide a very convenient way of authentication because they do not require a user ... [more] |
|
NS, IN (Joint) |
2013-03-08 10:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Improvement of Tag Node Detection Rate Using Multi-Stage Arrangement of HSN Readers and Notice of Identified Tag Nodes in the Following Stage in Hybrid RFID Sensor Network Takuya Miyagawa, Shinichiro Hara, Tatsuya Koizumi, Iwao Sasase (Keio Univ.) NS2012-213 |
In order to collect more data by using cheap and longer operating life tag nodes, HSN(Hybrid rfid/Sensor Node) has been ... [more] |
NS2012-213 pp.277-282 |
ISEC |
2012-09-21 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) ISEC2012-51 |
The Fiat-Shamir heuristic is a well-known technique for converting commitment-challenge-response identification schemes ... [more] |
ISEC2012-51 p.39 |
ISEC |
2011-12-14 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public-Key Identification Schemes based on Multivariate Quadratic Polynomials Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72 |
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] |
ISEC2011-72 p.39 |
DC |
2011-06-24 16:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Low Power At-Speed Scan Testing for LOS Scheme by Test Vector Modification Kohei Miyase, Yuta Uchinodan, Kazunari Enokimoto (KIT), Yuta Yamato (NAIST), Xiaoqing Wen, Seiji Kajihara (KIT), Fangmei Wu, Luigi Dilillo, Alberto Bosio, Patrick Girard, Arnaud Verazel (Lirmm) DC2011-13 |
In this paper, we present a test vector modification method to reduce launch-to-capture power for LOS scheme. The propos... [more] |
DC2011-13 pp.29-34 |
SIS |
2010-12-02 14:55 |
Nara |
|
Low Frequency Radio Positioning System using Direct Sequency Spread Spectrum with Loop Antenna Array Shinichi Watanabe, Ryusuke Miyamoto, Minoru Okada (NAIST) SIS2010-44 |
Systems with location-aware technique have been attracted recently. Not all of them need to know the
location of receiv... [more] |
SIS2010-44 pp.53-57 |
IT, ISEC, WBS |
2010-03-04 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55 |
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] |
IT2009-76 ISEC2009-84 WBS2009-55 pp.31-38 |
IT, ISEC, WBS |
2010-03-04 11:40 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Construction of secure Group Identification based on Digital Signature Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56 |
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more] |
IT2009-77 ISEC2009-85 WBS2009-56 pp.39-43 |
WBS |
2009-10-16 13:00 |
Osaka |
|
[Poster Presentation]
Simple Radio Positioning System Based on LF Direct Sequence Spread Spectrum Signals and Loop Antenna Array Shinichi Watanabe, Masato Saito, Minoru Okada (NAIST) WBS2009-32 |
Systems with location-aware technique have been attracted recently. Not all of them need to know the location of receive... [more] |
WBS2009-32 pp.43-47 |
SR |
2009-07-30 09:55 |
Tokyo |
Tokyo institute of technology |
Modulation Identification with Mean Power Variance in CDMA Wireless Communication System Narimasa Sugimoto, Osamu Takyu, Yohtaro Umeda (Tokyo Univ. of Science), Takeo Fujii (AWCC), Masao Nakagawa (Keio Univ.) SR2009-39 |
Cognitive Radio is a wireless communication system which makes it possible to use the channel resources more efficiently... [more] |
SR2009-39 pp.107-112 |
DE |
2009-07-28 13:50 |
Hyogo |
Kobe fashion mart |
An Efficient Identification and Indexing for Secure RFID with d-Left Hashing Yasunobu Nohara (Kyushu Univ.), Sozo Inoue (Kyushu Inst. Tech.) DE2009-6 |
In this paper, we propose a secure identification scheme for RFID with efficient time and memory, and also an efficient ... [more] |
DE2009-6 pp.31-36 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:35 |
Akita |
Akita University |
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44 |
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more] |
ISEC2009-30 SITE2009-22 ICSS2009-44 pp.161-168 |
IN, NS (Joint) |
2009-03-04 11:30 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A proposal of new ID base identification Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IN2008-172 |
Kurosawa and Heng proposed a transformation from digital signature scheme to identity-based(ID-based) identification sch... [more] |
IN2008-172 pp.237-241 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2008-11-17 13:50 |
Fukuoka |
Kitakyushu Science and Research Park |
A Capture-Safe Test Generation Scheme for At-speed Scan Testing Atsushi Takashima, Yuta Yamato, Hiroshi Furukawa, Kohei Miyase, Xiaoqing Wen, Seiji Kajihara (Kyusyu Institute of Technology) VLD2008-62 DC2008-30 |
Capture-safety, defined as the avoidance of any timing error due to unduly high switching activity in capture mode durin... [more] |
VLD2008-62 DC2008-30 pp.13-18 |
IN |
2008-02-14 16:15 |
Kagawa |
Kagawa University |
A Scalable and Efficient Scheme for Privacy-Protected RFID Systems Le Thi Ngoc Anh, Koki Abe (Univ. of Electro-Comm.) IN2007-147 |
Radio Frequency Identification (RFID) has become a useful tool and been applied to many systems such as supply chain man... [more] |
IN2007-147 pp.29-34 |
MI |
2007-11-16 11:25 |
Ishikawa |
Kanazawa Univ. |
High security personal identification system using retinal fundus camera Keisuke Fukuta, Toshiaki Nakagawa (Gifu Univ.), Yoshinori Hayashi (TAK Co.,Ltd.), Yuji Hatanaka (Gifu National College of Technology), Takeshi Hara, Hiroshi Fujita (Gifu Univ.) MI2007-53 |
Recently there are many systems which need identification of person automatically. In this paper, we propose a high secu... [more] |
MI2007-53 pp.25-28 |