IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2014-09-05
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on EUROCRYPT 2014
Ryotaro Hayashi (Toshiba) ISEC2014-53
The annual international cryptology conference EUROCRYPT 2014 was held on May 11th - 15th, 2014, at Copenhagen, Denmark ... [more] ISEC2014-53
pp.43-45
MBE, NC
(Joint)
2012-03-14
16:25
Tokyo Tamagawa University Estimation of forearm motion and speed from surface EMG signals using a selective desensitization neural network
Ryotaro Hayashi, Atsuo Suemitsu (JAIST) NC2011-141
In order to operate a myoelectric arm like a healthy arm, not only the forearm motion but also its speed need to be esti... [more] NC2011-141
pp.117-122
MSS 2011-01-20
10:40
Yamaguchi Kaikyo-Messe-Shimonoseki A Control of Multi-Car Elevators by Multiple Algorithms
Tsuyoshi Izumida, Kenji Inoue, Ryotaro Hayashi (JAIST) CST2010-61
In this paper, we propose a control method in which multiple algorithms are used for Multi-Car Elevator. Two control alg... [more] CST2010-61
pp.17-20
DC, CPSY 2009-04-21
13:25
Tokyo Akihabara Satellite Campus, Tokyo Metropolitan Univ. A Security Data-Flow Analysis in the Secure Software Development Environment DFITS
Fukutomo Nakanishi, Ryotaro Hayashi, Hiroyoshi Haruki, Yurie Fujimatsu, Mikio Hashimoto (Toshiba Corp.) CPSY2009-4 DC2009-4
We proposed a development environment DFITS, which helps security programmers to create software against tampering in-me... [more] CPSY2009-4 DC2009-4
pp.19-24
COMP 2006-06-23
13:00
Saitama Saitama Univ. Relationships between Data-Privacy and Key-Privacy
Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.)
The classical security requirement
of public-key encryption schemes is
that it provides privacy
of the encrypted data... [more]
COMP2006-20
pp.21-27
COMP 2005-12-22
13:35
Tokushima The University of Tokushima Universally Anonymizable Public-Key Encryption
Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.)
We first propose the notion of universally anonymizable public-key encryption. Suppose that we have the encrypted data m... [more] COMP2005-52
pp.21-28
COMP 2005-03-18
09:00
Tokyo Tokyo Institute of Technology RSA-based Public-Key Encryption Schemes with Anonymity
Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.)
Bellare, Boldyreva, Desai, and Pointcheval proposed a new security requirement of the encryption schemes called ``key-pr... [more] COMP2004-73
pp.1-7
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan