IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, IT 2015-05-22
Kyoto Kyoto International Community House [Invited Talk] Trade-off between resiliency and efficiency of cryptographic protocols -- The case of information theoretical security --
Maki Yoshida (NICT) IT2015-13 EMM2015-13
 [more] IT2015-13 EMM2015-13
EMM 2015-03-12
Okinawa   Relations of Compression Ratio and the Most Suitable Parameter of Additive Watermarking under the IHC Criteria
Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2014-91
In this paper, we show relations of the compression ratio and the optimum parameter, which maximizes the performance of ... [more] EMM2014-91
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] 2014-09-18
Kochi   Performance Evaluation of Additive Watermarking under the Highest Image Quality Category of the IHC Watermark Competition
Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) LOIS2014-23 IE2014-36 EMM2014-53
In this paper, we show that the additive watermarking scheme satisfies the evaluation criteria ver.3 developed by IEICE-... [more] LOIS2014-23 IE2014-36 EMM2014-53
EMM 2014-03-08
Ishikawa JAIST Performance Evaluation of Additive Watermarking under the IHC Criteria
Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2013-113
In this paper, the performance of additive watermarking scheme is evaluated on the criteria developed by the IEICE-ISS I... [more] EMM2013-113
EMM 2013-01-30
Miyagi Tohoku Univ. Theoretical Performance Analysis of Hybrid Additive-Multiplicative Watermarking
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) EMM2012-104
An important issue of robust watermarking for image is to achieve a better tradeoff between the quality of watermarked i... [more] EMM2012-104
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
Hokkaido   Hybrid Additive-Multiplicative Watermarking for General Embedding Domains
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2
 [more] ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2
ISEC, LOIS 2011-11-15
Osaka Osaka Electro-Communication University Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-57 LOIS2011-51
A protocol is said to be EUC secure if it can be securely
composed with arbitrary protocols which use the same setup. ... [more]
ISEC2011-57 LOIS2011-51
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-12
Shizuoka Shizuoka University Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.) ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9
 [more] ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9
ISEC 2011-05-13
Tokyo Kikai-Shinko-Kaikan Bldg. On the Impossibility of $d$-Multiplicative Non-perfect Secret Sharing
Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-5
 [more] ISEC2011-5
ISEC, IT, WBS 2011-03-04
Osaka Osaka University Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) IT2010-129 ISEC2010-133 WBS2010-108
EUC secure protocol maintains its security even when it is composed and shares public information with arbitrary protoco... [more] IT2010-129 ISEC2010-133 WBS2010-108
ISEC, LOIS 2010-11-17
Ibaraki Tsukuba Univ. Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system
Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) ISEC2010-58 LOIS2010-37
The computational hardness of number-theoretic problems used in
cryptography is generally proved in a generic model of ... [more]
ISEC2010-58 LOIS2010-37
ISEC, LOIS 2007-11-21
Hyogo Kobe University Anonymous Fingerprinting for Predelivery of Contents
Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] ISEC2007-92 OIS2007-64
IT 2006-05-24
Nara Nara-ken new public hall Authenticated Key Encapsulation Using Signatures
Maki Yoshida, Toru Fujiwara (Osaka Univ.)
 [more] IT2006-11
ISEC, IPSJ-CSEC, SITE 2005-07-22
Iwate Iwate Prefectural University Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.)
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more]
ISEC, IPSJ-CSEC, SITE 2005-07-22
Iwate Iwate Prefectural University Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability
Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
To use results of watermark detection, a detection error probability is
required to be low enough.

We have derived ... [more]
IT 2005-05-27
Overseas Univ. of Hawaii A Time-Limited Key Management Scheme Based on a One-Way Permutatin Tree
Maki Yoshida (Osaka Univ.), Yuichi Kaji (NAIST), Toru Fujiwara (Osaka Univ.)
 [more] IT2005-29
ISEC 2004-12-17
Tokyo Kikai-Shinko-Kaikan Bldg. Time-Capsule Encryption
Maki Yoshida (Osaka Univ.), Shigeo Mitsunari (u10 Networks), Toru Fujiwara (Osaka Univ.)
We have designed a new timed-release encryption, called time-capsule encryption, and implemented it. In our scheme, a ti... [more] ISEC2004-98
ISEC, LOIS 2004-11-09
Osaka Osaka Univ. A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] ISEC2004-87 OIS2004-54
ISEC, IPSJ-CSEC 2004-07-20
Tokushima Tokushima Univ. Reducing Frequency of Communication on the Consignment Delivering System Protecting Marketing Information
Akira Fujiwara, Shingo Okamura, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
A digital contents delivering system is considered, where contents providers consign delivering and charging to distribu... [more] ISEC2004-34
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan