|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2014-09-05 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on EUROCRYPT 2014 Ryotaro Hayashi (Toshiba) ISEC2014-53 |
The annual international cryptology conference EUROCRYPT 2014 was held on May 11th - 15th, 2014, at Copenhagen, Denmark ... [more] |
ISEC2014-53 pp.43-45 |
MBE, NC (Joint) |
2012-03-14 16:25 |
Tokyo |
Tamagawa University |
Estimation of forearm motion and speed from surface EMG signals using a selective desensitization neural network Ryotaro Hayashi, Atsuo Suemitsu (JAIST) NC2011-141 |
In order to operate a myoelectric arm like a healthy arm, not only the forearm motion but also its speed need to be esti... [more] |
NC2011-141 pp.117-122 |
MSS |
2011-01-20 10:40 |
Yamaguchi |
Kaikyo-Messe-Shimonoseki |
A Control of Multi-Car Elevators by Multiple Algorithms Tsuyoshi Izumida, Kenji Inoue, Ryotaro Hayashi (JAIST) CST2010-61 |
In this paper, we propose a control method in which multiple algorithms are used for Multi-Car Elevator. Two control alg... [more] |
CST2010-61 pp.17-20 |
DC, CPSY |
2009-04-21 13:25 |
Tokyo |
Akihabara Satellite Campus, Tokyo Metropolitan Univ. |
A Security Data-Flow Analysis in the Secure Software Development Environment DFITS Fukutomo Nakanishi, Ryotaro Hayashi, Hiroyoshi Haruki, Yurie Fujimatsu, Mikio Hashimoto (Toshiba Corp.) CPSY2009-4 DC2009-4 |
We proposed a development environment DFITS, which helps security programmers to create software against tampering in-me... [more] |
CPSY2009-4 DC2009-4 pp.19-24 |
COMP |
2006-06-23 13:00 |
Saitama |
Saitama Univ. |
Relationships between Data-Privacy and Key-Privacy Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.) |
The classical security requirement
of public-key encryption schemes is
that it provides privacy
of the encrypted data... [more] |
COMP2006-20 pp.21-27 |
COMP |
2005-12-22 13:35 |
Tokushima |
The University of Tokushima |
Universally Anonymizable Public-Key Encryption Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.) |
We first propose the notion of universally anonymizable public-key encryption. Suppose that we have the encrypted data m... [more] |
COMP2005-52 pp.21-28 |
COMP |
2005-03-18 09:00 |
Tokyo |
Tokyo Institute of Technology |
RSA-based Public-Key Encryption Schemes with Anonymity Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.) |
Bellare, Boldyreva, Desai, and Pointcheval proposed a new security requirement of the encryption schemes called ``key-pr... [more] |
COMP2004-73 pp.1-7 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|