|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] |
IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 pp.97-102 |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
QIT (2nd) |
2019-11-19 14:50 |
Tokyo |
Gakushuin University |
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers Seunghoan Song, Masahito Hayashi (Nagoya Univ.) |
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more] |
|
WBS, IT, ISEC |
2018-03-09 10:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys Miho Ishikawa, Junji Shikata (Yokohama National Univ.) IT2017-142 ISEC2017-130 WBS2017-123 |
The authentication code (A-code) is an information-theoretically secure authentication system which detects messages for... [more] |
IT2017-142 ISEC2017-130 WBS2017-123 pp.231-236 |
IT, ISEC, WBS |
2016-03-10 15:30 |
Tokyo |
The University of Electro-Communications |
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105 |
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more] |
IT2015-122 ISEC2015-81 WBS2015-105 pp.131-136 |
AP |
2009-06-11 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Modeling and Verification of Secret Key Agreement System Using Variable Directional Antenna Masahiko Maeda (ATR/Univ. of Hyogo), Takayuki Umaba (ATR), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-43 |
This paper describes modeling and verification of the mutual information shared by the wireless secret key agreement sys... [more] |
AP2009-43 pp.37-42 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103 |
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] |
IT2008-90 ISEC2008-148 WBS2008-103 pp.301-306 |
RCS, AN, MoNA, SR (Joint) |
2009-03-06 10:35 |
Kanagawa |
YRP |
The Two-Way MIMO Wire-Tap Channel Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273 |
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] |
RCS2008-273 pp.361-366 |
IT, WBS, ISEC |
2005-03-18 10:45 |
Kyoto |
Kyoto Univ. |
Unconditionally Secure Group Signature Schemes Takenobu Seito, Kazuyuki Kinose, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.) |
A group signature scheme introduced by Chaum and Van Heyst allow a group member to sign message anonymously on behalf of... [more] |
IT2004-72 ISEC2004-128 WBS2004-187 pp.13-18 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|