IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Secure communication based on high precision space-time synchronization
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
pp.97-102
PN 2021-08-30
10:35
Online Online On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography
Takehisa Iwakoshi (Mie Univ.) PN2021-12
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] PN2021-12
pp.1-6
QIT
(2nd)
2019-11-19
14:50
Tokyo Gakushuin University Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers
Seunghoan Song, Masahito Hayashi (Nagoya Univ.)
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more]
WBS, IT, ISEC 2018-03-09
10:15
Tokyo Katsusika Campas, Tokyo University of Science Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.) IT2017-142 ISEC2017-130 WBS2017-123
The authentication code (A-code) is an information-theoretically secure authentication system which detects messages for... [more] IT2017-142 ISEC2017-130 WBS2017-123
pp.231-236
IT, ISEC, WBS 2016-03-10
15:30
Tokyo The University of Electro-Communications Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer
Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more]
IT2015-122 ISEC2015-81 WBS2015-105
pp.131-136
AP 2009-06-11
15:30
Tokyo Kikai-Shinko-Kaikan Bldg. Modeling and Verification of Secret Key Agreement System Using Variable Directional Antenna
Masahiko Maeda (ATR/Univ. of Hyogo), Takayuki Umaba (ATR), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-43
This paper describes modeling and verification of the mutual information shared by the wireless secret key agreement sys... [more] AP2009-43
pp.37-42
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions
Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] IT2008-90 ISEC2008-148 WBS2008-103
pp.301-306
RCS, AN, MoNA, SR
(Joint)
2009-03-06
10:35
Kanagawa YRP The Two-Way MIMO Wire-Tap Channel
Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] RCS2008-273
pp.361-366
IT, WBS, ISEC 2005-03-18
10:45
Kyoto Kyoto Univ. Unconditionally Secure Group Signature Schemes
Takenobu Seito, Kazuyuki Kinose, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.)
A group signature scheme introduced by Chaum and Van Heyst allow a group member to sign message anonymously on behalf of... [more] IT2004-72 ISEC2004-128 WBS2004-187
pp.13-18
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan