|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2014-05-16 09:50 |
Yamanashi |
Yamanashi Univ. |
World's first successful experiment of transmission, storing, and distribution of uncompressed 8K ultra-high-definition live-streaming video Mitsuru Maruyama (KAIT), Hiroyuki Kimiyama (NTT), Akira Yutani, Masatoshi Kakiuchi (NAIST), Hideki Otsuki, Kazumasa Kobayashi (NICT), Masao Sakai (NTT-IT), Masayuki Kobayashi (PFU), Michinori Sano (Astro), Atsushi Inoie (KAIT) NS2014-34 |
During the Sapporo Snow Festival Verification Test Event hosted by the National Institute of Information and Communicati... [more] |
NS2014-34 pp.57-62 |
IA |
2013-10-22 11:20 |
Tokyo |
Takeda Hall, Takeda Bldg. 5F, Hongo Campus, Univ. of Tokyo |
Experiment on the streaming Cloud function using real-time network computing technology Mitsuru Maruyama (KAIT), Akira Yutani, Masatoshi Kakiuchi (NAIST), Hideki Otsuki, Kazumasa Kobayashi (NICT), Masao Sakai (NTT-IT), Masayuki Kobayashi (PFU) IA2013-41 |
(To be available after the conference date) [more] |
IA2013-41 pp.1-6 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori Yuji Nishigaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) IT2008-127 ISEC2008-185 WBS2008-140 |
In this paper we investigate the computational complexity of the discrete logarithm problem over algebraic tori (TDLP).
... [more] |
IT2008-127 ISEC2008-185 WBS2008-140 pp.545-550 |
IT, ISEC, WBS |
2007-03-16 14:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
A technique for making PKI robust Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita) |
We study a strategy for recovering a PKI system without reconstructing the whole one when the trust anchor has been brok... [more] |
IT2006-105 ISEC2006-160 WBS2006-102 pp.119-124 |
IT, ISEC, WBS |
2007-03-16 15:15 |
Gunma |
Gunma Univ. (Kiryu Campus) |
A Digital Watermarking for Audio Information: Randomized Method and Beat-Frequency Method Shinya Miura, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) |
In this paper, we propose a randomized method and a beat-frequency method for an audio digital watermarking.
The random... [more] |
IT2006-106 ISEC2006-161 WBS2006-103 pp.125-130 |
WBS, IT, ISEC |
2006-03-16 16:45 |
Aichi |
Nagoya Univ. |
Complexity of Diffie-Hellman problems and its variants Kazunari Manabe, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) |
[more] |
IT2005-82 ISEC2005-139 WBS2005-96 pp.105-110 |
WBS, IT, ISEC |
2006-03-16 17:35 |
Aichi |
Nagoya Univ. |
Complexity of abstract DDoS attack problems Daisuke Yokota, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) |
[more] |
IT2005-84 ISEC2005-141 WBS2005-98 pp.117-121 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|