|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2015-11-25 15:00 |
Kanagawa |
NTT Atsugi R&D center |
Robust Decoy State Generation with a Nested Modulator Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
In decoy-BB84 quantum key distribution (QKD) protocol, intensity fluctuation of the transmitted optical pulses reduce se... [more] |
|
QIT (2nd) |
2015-05-25 15:40 |
Osaka |
Osaka University |
Intensity fluctuation of a gain-switched semiconductor laser for a quantum key distribution system Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
[more] |
|
QIT (2nd) |
2015-05-25 13:20 |
Osaka |
Osaka University |
[Poster Presentation]
Robust Quantum State Generation with a Dual-Parallel Modulator and Its Application for Quantum Key Distribution Systems Yu Kadosawa, Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
Secure key in BB84 quantum key distribution system is affected by the state preparation flaws, which arise mainly from t... [more] |
|
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74 |
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] |
ICSS2013-74 pp.95-100 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |
QIT (2nd) |
2012-11-27 - 2012-11-28 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
[Poster Presentation]
Entanglement between superconducting qubits and photon qubits Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ) |
[more] |
|
QIT (2nd) |
2011-11-21 14:40 |
Osaka |
Osaka Univ. Engr. Sci. Sigma Hall (Toyonaka) |
[Poster Presentation]
Entanglement between superconducting qubits and photon qubits Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
Entanglement between superconducting qubits and photons used for optical communication is difficult to create because of... [more] |
|
IA |
2009-11-25 16:00 |
Saga |
Saga-Ken |
An analysis of IDS alerts to grasp attack situation in the third party's network Kensuke Nakata, Hiroki Takakura, Yasuo Okabe (Kyoto Univ) IA2009-62 |
To fight against emerging cyber attacks on Internet,
various types of security solutions have been proposed.
As one ... [more] |
IA2009-62 pp.25-30 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|