IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 44 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2014-03-11
11:00
Aichi Nagoya Univ., Higashiyama Campus A Note on Indistinguishability of Fail-Stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] IT2013-79 ISEC2013-108 WBS2013-68
pp.155-161
IT, ISEC, WBS 2013-03-07
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] IT2012-67 ISEC2012-85 WBS2012-53
pp.31-38
ISEC 2012-12-12
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission
Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2012-74
There is a strong demand on enhancing the security of Controller Area Network (CAN) known as a major in-vehicle network.... [more] ISEC2012-74
pp.15-22
QIT
(2nd)
2012-11-27
11:20
Kanagawa Keio Univ. Hiyoshi Campus A Quantum Relay using Quantum Scret Sharing
Takashi Suzuki, Akihisa Tomita (Hokkaido Univ)
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more]
ISEC 2012-05-18
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Incompleteness of the criterion for information theoretically key agreement
Osamu Hirota (Tamagawa Univ.) ISEC2012-2
Despite theoretical haughty claim on the security of quantum key distribution (QKD), even the security for the basic mod... [more] ISEC2012-2
pp.5-10
ICSS 2012-03-16
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy
Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] ICSS2011-47
pp.49-54
IT 2011-11-29
14:05
Iwate HOTEL MORI NO KAZE [Invited Talk] The Practical Value of Information-Theoretic Security Technologies
Tsutomu Matsumoto (YNU) IT2011-35
It is often recognized that information-theoretic security technologies are good in security but not practically appeari... [more] IT2011-35
pp.1-5
NLP 2011-11-09
17:20
Okinawa Miyako Island Marine Terminal Secure key distribution using correlated randomness in optical devices
Kazuyuki Yoshimura, Jun Muramatsu (NTT), Peter Davis (Telecognix), Atsushi Uchida (Saitama Univ.), Takahisa Harayama (Toyo Univ.) NLP2011-106
We propose a secure key distribution scheme based on correlated physical randomness in remote opticalscramblers driven b... [more] NLP2011-106
pp.81-84
NLP 2011-11-09
17:45
Okinawa Miyako Island Marine Terminal Experiment on secure key distribution using correlated random phenomenon in semiconductor lasers
Hayato Koizumi, Shinichiro Morikatsu, Hiroki Aida, Masaya Arahata, Atsushi Uchida (Saitama Univ.), Kazuyuki Yoshimura, Jun Muramatsu, Peter Davis (NTT) NLP2011-107
Recently it has been proposed that optical devices can be used to generate correlated random bit sequences and that secu... [more] NLP2011-107
pp.85-90
ISEC, IT, WBS 2011-03-03
13:00
Osaka Osaka University [Invited Talk] Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] IT2010-72 ISEC2010-76 WBS2010-51
pp.31-36
ISEC, IT, WBS 2011-03-04
13:25
Osaka Osaka University Secure Multiplex Coding with a Common Message
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS) IT2010-111 ISEC2010-115 WBS2010-90
We determine the capacity region of the secure multiplex coding
with a common message, improve the exponent of mutual i... [more]
IT2010-111 ISEC2010-115 WBS2010-90
pp.283-287
IT, ISEC, WBS 2010-03-05
14:15
Nagano Nagano-Engineering Campus, Shinshu University Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-111 ISEC2009-119 WBS2009-90
Although the evaluation of biometric systems is often focusing on the
high performance matching approaches, it is not a... [more]
IT2009-111 ISEC2009-119 WBS2009-90
pp.261-268
IT, ISEC, WBS 2010-03-05
16:35
Nagano Nagano-Engineering Campus, Shinshu University Construction of wiretap codes from ordinary channel codes
Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2009-144 ISEC2009-152 WBS2009-123
From an arbitrary given channel code over a discrete or Gaussian
memoryless channel, we construct a wiretap code with t... [more]
IT2009-144 ISEC2009-152 WBS2009-123
pp.461-465
IT 2009-12-01
14:40
Yamaguchi Yamaguchi-Yuda-Onsen Hotel Kamefuku [Invited Talk] History and Perspective of Coding Problem for Interference Channel
Kingo Kobayashi (NICT) IT2009-48
Recently, many young researchers of communication technology in the world
have a lot of interests to apply theoretical... [more]
IT2009-48
pp.9-16
AP 2009-06-11
15:30
Tokyo Kikai-Shinko-Kaikan Bldg. Modeling and Verification of Secret Key Agreement System Using Variable Directional Antenna
Masahiko Maeda (ATR/Univ. of Hyogo), Takayuki Umaba (ATR), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-43
This paper describes modeling and verification of the mutual information shared by the wireless secret key agreement sys... [more] AP2009-43
pp.37-42
COMP 2009-05-26
10:40
Saitama Saitama Univ. Strengthening the Security of Distributed Oblivious Transfer
Kai Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama (Saitama Univ.) COMP2009-11
We study the distributed oblivious transfer first proposed by Naor and Pinkas in ASIACRYPT 2000, and generalized by Blun... [more] COMP2009-11
pp.13-19
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions
Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] IT2008-90 ISEC2008-148 WBS2008-103
pp.301-306
RCS, AN, MoNA, SR
(Joint)
2009-03-06
10:35
Kanagawa YRP The Two-Way MIMO Wire-Tap Channel
Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] RCS2008-273
pp.361-366
SIP, RCS 2009-01-23
11:45
Kumamoto Kumamoto University Directivity Set Selection to Improve Imac (Information mutual anti-tapping condition) for Wireless Secret Key Generator Exploiting ESPAR Antennas
Taku Hasegawa, Jouji Narita, Hideyuki Uehara, Takashi Ohira (Toyohashi Univ. of Tech.) SIP2008-151 RCS2008-199
As an information-theoretically secure key distribution system for wireless communication, a secret key agreement system... [more] SIP2008-151 RCS2008-199
pp.161-166
 Results 21 - 40 of 44 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan