Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 |
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more] |
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 pp.74-79 |
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
RCS, SR, SRW (Joint) |
2020-03-05 15:10 |
Tokyo |
Tokyo Institute of Technology (Cancelled but technical report was issued) |
Study on application of Reed-Solomon product code for optical on-off keying satellite communication
-- A space link in 6G networks -- Eiji Okamoto (NITech), Hiroaki Yamazoe, Shinji Ohta (SONY CSL) RCS2019-370 |
In consultative committee for space data system (CCSDS), which standardizes techniques for satellite communications, dis... [more] |
RCS2019-370 pp.257-262 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2019-03-15 15:15 |
Kagoshima |
Kagoshima University |
Minimizing the reception completion times in one-to-many file transfer using MultiPath-MultiCast with Reed-Solomon coding Masayuki Kurata, Kenji Heira, Masahiro Shibata, Masato Tsuru (KIT) CQ2018-116 |
A rapid increase in network traffic has caused a problem along with the penetration of sharing, duplicating, or migratin... [more] |
CQ2018-116 pp.129-134 |
RCS |
2018-06-21 13:50 |
Nagasaki |
Nagasaki University |
Differential Orthogonal Frequency Division Multiplexing Employing Reed-Solomon Codes Kotaro Hotta, Hiroshi Kubo, Hiroshi Kubo (Ritsumeikan Univ.) RCS2018-60 |
This paper discusses differential orthogonal frequency-division multiplexing (OFDM) in severe time and frequency selecti... [more] |
RCS2018-60 pp.149-154 |
IT |
2017-07-13 10:40 |
Chiba |
Chiba University |
Study on Secret Sharing Scheme for Distributed Storage System Masayuki Shiba, Shinichiro Miyazaki, Kotoku Omura, Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) IT2017-18 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2017-18 pp.11-14 |
IT |
2017-07-14 13:45 |
Chiba |
Chiba University |
Unequal Error Protection Codes Based on Reed-Solomon Codes over $GF(2^{m})$ Toshihisa Nishijima (Hosei Univ.) IT2017-32 |
A new class of unequal error protection codes based on Reed-Solomon codes over $GF(2^{m})$ is proposed by using the codi... [more] |
IT2017-32 pp.91-95 |
SAT, RCS (Joint) |
2016-08-18 13:40 |
Miyagi |
Tohoku Gakuin University |
[Invited Lecture]
A study on application of Reed-Solomon-Spinal concatenation code for free-space optics Naoya Saiki, Eiji Okamoto (NITech), Hideki Takenaka, Hiroo Kunimori, Kolev Dimitar, Hiroyuki Endo, Yusuke Kobayashi, Morio Tyoshima, Mikio Hujiwara, Masahide Sasaki (NICT), Takao Aoki (Waseda Univ.), Koichi Gyoda (SIT) SAT2016-40 RCS2016-133 |
Recently, satellite laser communication is attracting attention as an important infrastructure to achieve increasing dem... [more] |
SAT2016-40 RCS2016-133 pp.43-48(SAT), pp.25-30(RCS) |
IT |
2014-07-18 09:30 |
Hyogo |
Kobe University |
Recognition Accuracy Improvement of QR Code by Using GMD Decoding Keisuke Furumoto, Yoshihiro Kusanagi, Masakatu Morii (Kobe Univ) IT2014-27 |
In recent years, two-dimensional codes typified by QR code is used in various scenes such as in medical prescription and... [more] |
IT2014-27 pp.89-94 |
ISEC, IT, WBS |
2014-03-11 14:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On a secret sharing scheme with systematic Reed-Solomon codes and its applications Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) IT2013-88 ISEC2013-117 WBS2013-77 |
Secret sharing is a method in which the source information is divided into n shares and the source information is recons... [more] |
IT2013-88 ISEC2013-117 WBS2013-77 pp.215-220 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
IT |
2013-07-26 10:10 |
Tokyo |
Nishi-Waseda campus, Waseda University |
Performance Evaluation of 3D DWT Video Transmission with Invertible Codes Kotoku Omura, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.), Hirokazu Tanaka (Toshiba), Miki Haseyama (Hokkaido Univ.) IT2013-21 |
The objective of this study is to indicate efficacy of error resilience using invertible codes to three-dimensional disc... [more] |
IT2013-21 pp.49-53 |
PRMU, HIP |
2012-12-14 10:00 |
Yamagata |
|
Large Capacity Barcode with Confidentiality and Error Correction maintaining Compatibility Nobuyuki Teraura (TCRI), Kouichi Sakurai (KU) PRMU2012-77 HIP2012-66 |
The barcode (NW-7,CODE39) which has spread now is printed on business form etc., and is utilized for logistics, distribu... [more] |
PRMU2012-77 HIP2012-66 pp.43-48 |
ICSS |
2011-11-18 15:00 |
Tokushima |
Naruto University of Education |
A New Distributed Storage System Ensuring Security and Reliability Tadashi Minowa (NICT) ICSS2011-35 |
With the growing volume of data generating on diversified information equipment such as smartphones across the network, ... [more] |
ICSS2011-35 pp.19-24 |
ICM, LOIS |
2011-01-20 16:15 |
Nagasaki |
|
A study of image displayable design QR code Kazuaki Fujita, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) ICM2010-40 LOIS2010-51 |
Recently, a lot of QR codes are shown in advertising booklets and Web pages to lead users to a particular site.In order ... [more] |
ICM2010-40 LOIS2010-51 pp.39-44 |
RCS, AN, MoNA, SR (Joint) |
2009-03-06 09:20 |
Kanagawa |
YRP |
Soft-Decision Decoding of Block Codes
-- A Factor-Graph Approach -- Yongmei Wei, Kambiz Homayounfar (PHYBIT) RCS2008-270 |
Linear block codes capable of correcting a burst of bit errors are desirable for protection of control plane data in mob... [more] |
RCS2008-270 pp.343-348 |
IT |
2008-07-24 11:20 |
Chiba |
University of Tokyo, Kashiwa Campus |
On Distance Distribution of a Reed-Solomon-like Code for Network Coding Masafumi Tominaga (Osaka Univ.), Kenji Yasunaga (Kwansei Gakuin Univ.), Toru Fujiwara (Osaka Univ.) IT2008-9 |
Network coding is a technique for efficient network communication. Middle nodes between a source node and a destination ... [more] |
IT2008-9 pp.7-10 |
ISEC |
2007-09-07 09:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes Chigusa Kawashima (Polytechnic Univ.), Takahiro Yoshida (Waseda Univ.), Tomoko K. Matsushima (Polytechnic Univ.) ISEC2007-76 |
In this paper, two secret sharing schemes with a hierarchical access structure are investigated. One scheme is based on ... [more] |
ISEC2007-76 pp.17-23 |
IT |
2007-05-18 15:15 |
Yamagata |
Denkoku-No-Mori (Yonezawa) |
Reed-Solomon coded Code Selection method for multi-carrier systems with nonlinear amplifier Kyung Woon Jang, Hirokazu Tanaka (Toshiba), Shoichiro Yamasaki (POLTECHINIC Univ.) IT2007-4 |
We propose a multi-carrier code division multiple access (MC CDMA) scheme with Reed-Solomon (RS) coded Code Selection (C... [more] |
IT2007-4 pp.19-24 |
IT, ISEC, WBS |
2007-03-16 11:10 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On a soft-input and output iterative decoding algorithm for Reed-Solomon codes Hitoshi Tokushige, Kenichi Arimoto, Masami Mohri, Yasutada Oohama (Univ. of Tokushima) |
Iterative decoding algorithms for Reed-Solomon (RS) product codes have been proposed. In one of the iterative decoding a... [more] |
IT2006-112 ISEC2006-167 WBS2006-109 pp.161-166 |