IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 76 of 76 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, RCS
(Joint)
2010-12-17
15:30
Okayama Okayama Univ. A Study on Parameter Controls of Transmit Antenna Directivity for Secure Wireless Link Creation based on Secret Sharing Method
Masaaki Yamanaka (Hiroshima International Univ.), Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.), Norihiko Morinaga (Hiroshima International Univ.) RCS2010-196
The authors have proposed a secure wireless communication scheme by producing shared information by secret sharing metho... [more] RCS2010-196
pp.221-226
AN, USN, SR, RCS
(Joint)
2010-10-28
09:30
Osaka Osaka University Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication
Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] RCS2010-116 SR2010-49 AN2010-26 USN2010-22
pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN)
ISEC 2010-09-10
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. A general construction method of visual secret sharing scheme with share rotations
Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] ISEC2010-49
pp.67-74
IT, ISEC, WBS 2010-03-05
15:20
Nagano Nagano-Engineering Campus, Shinshu University On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ) IT2009-141 ISEC2009-149 WBS2009-120
Shamir’s polynomial interpolation scheme is a secret sharing scheme with univariate polynomial.
In this study, we inve... [more]
IT2009-141 ISEC2009-149 WBS2009-120
pp.445-448
RCS 2009-06-25
16:00
Aichi Nagoya University Position Dependence of Key Capacity in Secret Key Agreement Scheme Using ESPAR Antenna
Shunichi Kawamura, Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2009-34
As a countermeasure for eavesdropping in wireless communication, a new secret key agreement scheme using a variable dire... [more] RCS2009-34
pp.37-42
AP 2009-06-11
15:30
Tokyo Kikai-Shinko-Kaikan Bldg. Modeling and Verification of Secret Key Agreement System Using Variable Directional Antenna
Masahiko Maeda (ATR/Univ. of Hyogo), Takayuki Umaba (ATR), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-43
This paper describes modeling and verification of the mutual information shared by the wireless secret key agreement sys... [more] AP2009-43
pp.37-42
ISEC 2009-05-22
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] ISEC2009-5
pp.29-36
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] IT2008-55 ISEC2008-113 WBS2008-68
pp.71-78
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] ISEC2008-42
pp.53-60
ISEC 2007-09-07
10:15
Tokyo Kikai-Shinko-Kaikan Bldg. visual cryptography schemes with tree access structure for many images
Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-77
Let $T$ be a tree with order $n$ and maximum degree three.
We construct a
visual cryptography sharing scheme with $T$... [more]
ISEC2007-77
pp.25-31
IT 2007-07-20
09:30
Hyogo Kobe Univ. Proposal of a (2,2)-threshold visual secret sharing scheme for many images
Taishi Sakamoto, Hiroki Koga (Univ. of Tsukuba) IT2007-15
The $(k,n)$-visual secret sharing scheme
(hereafter, the $(k,n)$-VSSS for short)
is a unconventional secret sharing ... [more]
IT2007-15
pp.1-6
ISEC 2007-05-18
15:35
Tokyo Kikai-Shinko-Kaikan Bldg. Visual Cryptography Schemes with Cyclic Structure for Many Images
Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-12
We consider a visual cryptography sharing scheme with
cyclic access structure
for $n$ secret images and $n$ shares,
... [more]
ISEC2007-12
pp.77-84
IT, ISEC, WBS 2007-03-16
13:00
Gunma Gunma Univ. (Kiryu Campus) Share selectable secret sharing scheme on inefficiency concentrated for particular user
Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST)
On Shamir threshold scheme, a participant's share is randomly given.\
The usability can be improved if share is select... [more]
IT2006-114 ISEC2006-169 WBS2006-111
pp.173-178
MSS 2006-07-26
10:25
Kyoto Kyoto Institute of Technology An Optimal Share Transfer Problem on Secret Sharing Storage Systems
Toshiyuki Miyamoto, Sadatoshi Kumagai (Osaka Univ.)
We have been proposing and developing a secure and reliable distributed storage system, which uses the secret sharing sc... [more] CST2006-11
pp.7-12
WBS, IT, ISEC 2006-03-17
13:50
Aichi Nagoya Univ. A study on authentic method using a scheme of secret key agreement based on the radio channel characteristics
Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
Eavesdropping and unauthorized use have become serious problems in Wireless Local Area Network (WLAN). They are more ess... [more] IT2005-117 ISEC2005-174 WBS2005-131
pp.129-134
RCS, AP, WBS, SR, MW, MoNA
(Joint)
2006-03-03
15:40
Kanagawa YRP A scheme of Private Key Agreement Based on Fluctuations of BER in Land Mobile Radio
Takayasu Kitano, Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
This paper proposes a private key sharing scheme using the fluctuations of BER (Bit Error Rate). It utilizes the receive... [more] RCS2005-217
pp.235-240
 Results 61 - 76 of 76 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan