IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS 2022-05-13
09:25
Kyoto Rakuyu Kaikan, Kyoto Univ. + Online
(Primary: On-site, Secondary: Online)
Reduction methods of amount of data in blockchain node
Masaki Obayashi, Takeshi Ogawa (TDU) NS2022-14
The amount of data that a node in a blockchain needs to store is increasing rapidly in proportion to the total number of... [more] NS2022-14
pp.29-33
CPSY, IPSJ-ARC 2016-10-06
10:00
Chiba Makuhari-messe [Technology Exhibit] Security technologies for non-volatile memory in IoT devices -- Mechanisms for on-chip MCU and off-chip memory system --
Mikio Hashimoto, Yoshiyuki Amanuma, Kentaro Umesawa, Ryuichi Koike, Jun Kanai, Naoko Yamada (Toshiba) CPSY2016-51
Non-volatile memory content modification is serious issues on IoT appliances, since evil effects continue over power cyc... [more] CPSY2016-51
pp.37-42
ISEC, LOIS 2011-11-15
15:40
Osaka Osaka Electro-Communication University Content Authentication for Range Queries in Peer-to-Peer Networks
Shoichi Hirose (Univ. of Fukui) ISEC2011-60 LOIS2011-54
In this article, we propose a distributed authenticated data structure for range queries, which is called distributed au... [more] ISEC2011-60 LOIS2011-54
pp.177-180
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:45
Okayama Okayama Univ. The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA
Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.)
In this paper, we propose a multipurpose authentication method used for streaming multimedia data. In our method, we gen... [more] ISEC2006-58
pp.137-144
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:10
Iwate Iwate Prefectural University Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.)
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more]
ISEC2005-61
pp.129-136
LOIS 2005-03-11
17:30
Tokyo Kikai-Shinko-Kaikan Bldg. Dynamic slicing linking scheme for long-term validity assurance of timestamping
Eiichi Horita, Satoshi Ono, Hidetaka Ishimoto (NTT)
We propose a method for long-term validity assurance of timestamps, by using an event-ordering system based on a dynamic... [more] OIS2004-111
pp.95-100
ISEC 2004-12-17
16:05
Tokyo Kikai-Shinko-Kaikan Bldg. Threat analysis of Event-Ordering Systems
Shingo Orihara, Satoshi Ono, Eiichi Horita, Hidetaka Ishimoto (NTT)
Time-stamping digital documents is now becoming increasingly important. Several time-stamping schemes have been proposed... [more] ISEC2004-104
pp.39-45
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan