IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 42  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
pp.91-96
RCC, ISEC, IT, WBS 2023-03-14
09:25
Yamaguchi
(Primary: On-site, Secondary: Online)
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more]
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
pp.74-79
QIT
(2nd)
2022-12-09
17:30
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Advance Sharing of Quantum Shares for Classical Secrets
Rina Miyajima, Ryutaroh Matsumoto (Tokyo Tech)
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret ... [more]
IT 2020-12-03
16:40
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
pp.206-211
RCS, SR, SRW
(Joint)
2020-03-05
15:10
Tokyo Tokyo Institute of Technology
(Cancelled but technical report was issued)
Study on application of Reed-Solomon product code for optical on-off keying satellite communication -- A space link in 6G networks --
Eiji Okamoto (NITech), Hiroaki Yamazoe, Shinji Ohta (SONY CSL) RCS2019-370
In consultative committee for space data system (CCSDS), which standardizes techniques for satellite communications, dis... [more] RCS2019-370
pp.257-262
IMQ, IE, MVE, CQ
(Joint) [detail]
2019-03-15
15:15
Kagoshima Kagoshima University Minimizing the reception completion times in one-to-many file transfer using MultiPath-MultiCast with Reed-Solomon coding
Masayuki Kurata, Kenji Heira, Masahiro Shibata, Masato Tsuru (KIT) CQ2018-116
A rapid increase in network traffic has caused a problem along with the penetration of sharing, duplicating, or migratin... [more] CQ2018-116
pp.129-134
IT, ISEC, WBS 2019-03-08
13:30
Tokyo University of Electro-Communications Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima, Shinichiro Miyazaki, Kotoku Omura (PTU) IT2018-122 ISEC2018-128 WBS2018-123
(k, n) - threshold based secret sharing protects information securely.
The information is divided into n shares, and t... [more]
IT2018-122 ISEC2018-128 WBS2018-123
pp.285-290
RCS 2018-06-21
13:50
Nagasaki Nagasaki University Differential Orthogonal Frequency Division Multiplexing Employing Reed-Solomon Codes
Kotaro Hotta, Hiroshi Kubo, Hiroshi Kubo (Ritsumeikan Univ.) RCS2018-60
This paper discusses differential orthogonal frequency-division multiplexing (OFDM) in severe time and frequency selecti... [more] RCS2018-60
pp.149-154
IT 2017-09-08
09:50
Yamaguchi Centcore Yamaguchi Hotel On the weight distributions of the binary codes obtained from Reed-Solomon codes over GF(2^m)
Tshihisa Nishijima (Hosei Univ.) IT2017-40
In this report, we give a necessary and sufficient condition for symmetry of the weight distribution of the binary ... [more] IT2017-40
pp.11-14
IT 2017-09-08
10:15
Yamaguchi Centcore Yamaguchi Hotel Demonstration example of 1 block error correction similar to Reed-Solomon code for students of elementary school 4th or higher grades -- At The Annual Science Festival at Miyakonojo Kosen --
Hirofumi Nakamura (NIT, Miyakonojo College) IT2017-41
This report is not a report on new technical knowledge, but is a report on an example of an initiative designed to help ... [more] IT2017-41
pp.15-20
IT 2017-07-13
10:40
Chiba Chiba University Study on Secret Sharing Scheme for Distributed Storage System
Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] IT2017-18
pp.11-14
IT 2017-07-14
13:45
Chiba Chiba University Unequal Error Protection Codes Based on Reed-Solomon Codes over $GF(2^{m})$
Toshihisa Nishijima (Hosei Univ.) IT2017-32
A new class of unequal error protection codes based on Reed-Solomon codes over $GF(2^{m})$ is proposed by using the codi... [more] IT2017-32
pp.91-95
SAT, RCS
(Joint)
2016-08-18
13:40
Miyagi Tohoku Gakuin University [Invited Lecture] A study on application of Reed-Solomon-Spinal concatenation code for free-space optics
Naoya Saiki, Eiji Okamoto (NITech), Hideki Takenaka, Hiroo Kunimori, Kolev Dimitar, Hiroyuki Endo, Yusuke Kobayashi, Morio Tyoshima, Mikio Hujiwara, Masahide Sasaki (NICT), Takao Aoki (Waseda Univ.), Koichi Gyoda (SIT) SAT2016-40 RCS2016-133
Recently, satellite laser communication is attracting attention as an important infrastructure to achieve increasing dem... [more] SAT2016-40 RCS2016-133
pp.43-48(SAT), pp.25-30(RCS)
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
13:25
Aichi NAGOYA TRADE & INDUSTRY CENTER Proposals of K(AI), K(AII) and K(AIII)Schemes for augmenting code-based PKC, product-sum type PKC and multivariate PKC
Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2015-13 SITE2015-11 ICSS2015-23 EMM2015-21
In this paper we present three new schemes for augmenting the conventional code-based PKC(CBPKC), product-sum type PKC($... [more] ISEC2015-13 SITE2015-11 ICSS2015-23 EMM2015-21
pp.59-64
RECONF 2015-06-20
11:35
Kyoto Kyoto University FPGA Implementation of a key generation circuit using PUF and Fuzzy Extractor on SASEBO-G3
Yohei Hori, Toshihiro Katashita (AIST) RECONF2015-19
We implemented a key generation circuit using a Physically Unclonable Function (PUF) and Fuzzy Extractor (FE) to a Kinte... [more] RECONF2015-19
pp.103-108
EMM 2015-01-29
13:45
Miyagi Tohoku University Introduction of concatenated codes for digital watermarking
Nobuhiro Hirata, Masaki Kawamura (Yamaguchi Univ.) EMM2014-75
We show that concatenated codes, which are combinations of error-correcting codes, can improve performance of watermarki... [more] EMM2014-75
pp.51-56
IT 2014-07-18
09:30
Hyogo Kobe University Recognition Accuracy Improvement of QR Code by Using GMD Decoding
Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ) IT2014-27
In recent years, two-dimensional codes typified by QR code is used in various scenes such as in medical prescription and... [more] IT2014-27
pp.89-94
ISEC, IT, WBS 2014-03-11
14:35
Aichi Nagoya Univ., Higashiyama Campus On a secret sharing scheme with systematic Reed-Solomon codes and its applications
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] IT2013-88 ISEC2013-117 WBS2013-77
pp.215-220
SIS 2013-12-13
13:10
Tottori Torigin Bunka Kaikan (Tottori) A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] SIS2013-51
pp.131-136
IT 2013-07-26
10:10
Tokyo Nishi-Waseda campus, Waseda University Performance Evaluation of 3D DWT Video Transmission with Invertible Codes
Kotoku Omura, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.), Hirokazu Tanaka (Toshiba), Miki Haseyama (Hokkaido Univ.) IT2013-21
The objective of this study is to indicate efficacy of error resilience using invertible codes to three-dimensional disc... [more] IT2013-21
pp.49-53
 Results 1 - 20 of 42  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan