IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)
2015-11-25
15:00
Kanagawa NTT Atsugi R&D center Robust Decoy State Generation with a Nested Modulator
Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.)
In decoy-BB84 quantum key distribution (QKD) protocol, intensity fluctuation of the transmitted optical pulses reduce se... [more]
QIT
(2nd)
2015-05-25
15:40
Osaka Osaka University Intensity fluctuation of a gain-switched semiconductor laser for a quantum key distribution system
Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.)
 [more]
QIT
(2nd)
2015-05-25
13:20
Osaka Osaka University [Poster Presentation] Robust Quantum State Generation with a Dual-Parallel Modulator and Its Application for Quantum Key Distribution Systems
Yu Kadosawa, Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.)
Secure key in BB84 quantum key distribution system is affected by the state preparation flaws, which arise mainly from t... [more]
ICSS, IPSJ-SPT 2014-03-28
09:00
Okinawa Meio Univiersity Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis
Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] ICSS2013-74
pp.95-100
ICSS, IPSJ-SPT 2014-03-28
14:20
Okinawa Meio Univiersity Design of HTTP Communication Profiling for Infected Hosts Detection
Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] ICSS2013-84
pp.155-160
QIT
(2nd)
2012-11-27
- 2012-11-28
Kanagawa Keio Univ. Hiyoshi Campus [Poster Presentation] Entanglement between superconducting qubits and photon qubits
Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ)
 [more]
QIT
(2nd)
2011-11-21
14:40
Osaka Osaka Univ. Engr. Sci. Sigma Hall (Toyonaka) [Poster Presentation] Entanglement between superconducting qubits and photon qubits
Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.)
Entanglement between superconducting qubits and photons used for optical communication is difficult to create because of... [more]
IA 2009-11-25
16:00
Saga Saga-Ken An analysis of IDS alerts to grasp attack situation in the third party's network
Kensuke Nakata, Hiroki Takakura, Yasuo Okabe (Kyoto Univ) IA2009-62
To fight against emerging cyber attacks on Internet,
various types of security solutions have been proposed.
As one ... [more]
IA2009-62
pp.25-30
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan