IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 68件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
MI 2019-07-06
Hokkaido Future Univ. Hakodate [Poster Presentation] Basic study of left atrial appendage segmentation from cardiac CT images
Itaru Takayashiki, Doi Akio, Toru Kato, Hiroki Takahashi (Iwate Prefectural Univ.), Shoto Sekimura (ISP), Maiko Hozawa, Yoshihiro Morino (Iwate Medical Univ.) MI2019-30
In this study, we propose a method to automatically extract the left atrial appendage region from the cardiac CT image f... [more] MI2019-30
EID, ITE-IDY, IEIJ-SSL, SID-JC, IEE-EDD [detail] 2018-01-26
Shizuoka Shizuoka Univ., Hamamatsu Prototype of transparent OLED lighting indicator
Yukinobu Masuda, Shim Chang-Hoon, Ryutaro Sugawara (Kyushu Univ.), Masayuki Yahiro (ISIT), Reiji Hattori (Kyushu Univ.)
OME 2017-12-01
Saga Sun Messe Tosu [Invited Talk] Solution-processed organic-inorganic perovskite field-effect transistors with high carrier mobility
Toshinori Matsushima, Atula S. D. Sandanayaka, Chuanjiang Qin (Kyushu Univ.), Takashi Fujihara (ISIT), Chihaya Adachi (Kyushu Univ.) OME2017-45
Organic-inorganic perovskites are extremely promising as the semiconductor in field-effect transistors because of their ... [more] OME2017-45
ICSS, IPSJ-SPT 2017-03-14
Nagasaki University of Nagasaki Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] ICSS2016-69
(Joint) [detail]
Osaka Ritsumeikan University, Osaka Ibaraki Campus [Invited Talk] FPGA Development using HLS for Software Engineers
Kenichiro Mitsuda, Hiroshi Owada, Shinji Yamamoto (ISP) RECONF2016-48
 [more] RECONF2016-48
RECONF 2016-09-05
Toyama Univ. of Toyama The effect of the C ++ template meta-programming in high-level synthesis
Kenichiro Mitsuda, Owada Hiroshi, Shinji Yamamoto (ISP) RECONF2016-27
In this talk, we introduce technique of high level synthesis using C++ template meta-programming. [more] RECONF2016-27
ISEC 2016-09-02
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
Yamaguchi   On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem
Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42
There are no known quantum algorithms, performed in polynomial time, for solving the section finding problem on algebrai... [more] ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42
ICSS, IA 2016-06-07
Saga Saga University Report on the 2016 Network and Distributed System Security Symposium
Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8
 [more] IA2016-8 ICSS2016-8
IT, ISEC, WBS 2016-03-11
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
ICSS, IPSJ-SPT 2016-03-03
Kyoto Academic Center for Computing and Media Studies, Kyoto University Current Status and Issues of the Application of AI Technology for Digital Forensics
Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.)
- 2015-12-18
Toyama Toyama International Conference Center Monitoring of dining based on mastication pattern analysis
Misato Kita (Graduate School of Future Univ. Hakodate), Toshio Kawashima (Future Univ. Hakodate), Yuishi Mitsudo (ISIT)
The meal has a close relationship with health. Therefore, the record of the meal is recorded as an important information... [more]
LOIS, ISEC, SITE 2015-11-07
Kanagawa Kanagawa Univ. Extension of NTRU Using Group Ring and Its Application
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46
 [more] ISEC2015-52 SITE2015-39 LOIS2015-46
WIT 2015-10-26
Yamaguchi Kawatana Grand Hotel A Questionnaire Survey on ICT Environment Used by Visually Impaired
Yoshihiko Kimuro, Takafumi Ienaga (FIT), Akito Teraoka (ISIT), Seiji Okimoto (Fukuoka Special Needs Education School for the Visually Impaired) WIT2015-58
In the information society, understanding of the basic principles of information technology is one of the common sense.... [more] WIT2015-58
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
Aichi NAGOYA TRADE & INDUSTRY CENTER Report on Workshop on Cybersecurity in a Post-Quantum World
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30
 [more] ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30
IA, ICSS 2015-06-11
Fukuoka Kyushu Institute of Technology Univ. [Invited Talk] Recent trends in multivariate cryptography
Takanori Yasuda (ISIT) IA2015-1 ICSS2015-1
 [more] IA2015-1 ICSS2015-1
IA, ICSS 2015-06-11
Fukuoka Kyushu Institute of Technology Univ. Report on the 23rd USENIX Security Symposium
Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8
 [more] IA2015-8 ICSS2015-8
IA, ICSS 2015-06-12
Fukuoka Kyushu Institute of Technology Univ. A Report on International Conference NDSS2015
Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] IA2015-12 ICSS2015-12
Osaka Osaka University MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation
Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
 68件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan