Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 15:25 |
Online |
Online |
[Invited Talk]
Data science practice from a legal and ethical perspective
-- A case study of an avatar community application -- Soichiro Morishita (CA) ISEC2021-19 SITE2021-13 BioX2021-20 HWS2021-19 ICSS2021-24 EMM2021-24 |
In social networking services, messages may be monitored before and after with valid consent obtained from the user in o... [more] |
ISEC2021-19 SITE2021-13 BioX2021-20 HWS2021-19 ICSS2021-24 EMM2021-24 pp.56-59 |
IA, IN (Joint) |
2018-12-14 10:45 |
Hiroshima |
Hiroshima Univ. |
New Content Sharing Media v.s. Communication Secrecy
-- A Historical Position of CCN -- Tohru Asami (ATR) IN2018-66 |
In 2018, the conflict of the copyright law and the communication secrecy became a big problem at blocking accesses to th... [more] |
IN2018-66 pp.43-48 |
SIP, IT, RCS |
2018-01-23 11:20 |
Kagawa |
Sunport Hall Takamatsu |
Bidirectional Broadcast Channel Under Strong Secrecy and Cost Constraints Akinori Inaba, Hideki Yagi (Univ. of Electro-Comm.) IT2017-92 SIP2017-100 RCS2017-306 |
The bidirectional broadcast channel :(BBC), one of the many-to-many communication channels, has a bidirectional relaying... [more] |
IT2017-92 SIP2017-100 RCS2017-306 pp.219-224 |
SITE, IPSJ-EIP |
2016-06-02 14:50 |
Kanagawa |
Institute of Information Security |
Secrecy Laws in Japan and communication technologies Makoto Koike (MK Microwave Research) SITE2016-4 |
Conventionally, the National Government Official Act, the Local Government Official Act, and the Self Defense Forces Act... [more] |
SITE2016-4 pp.37-41 |
RCS, CCS, SR, SRW (Joint) |
2016-03-02 17:20 |
Tokyo |
Tokyo Institute of Technology |
A study on optimum pilot power in secret communication system with dummy signal Fumiya Nakabayashi, Kenta Umebayashi, Yasuo Suzuki (TUAT) RCS2015-349 |
In this paper, we investigate power allocation method for physical layer security based wireless communication with dumm... [more] |
RCS2015-349 pp.97-102 |
MoNA, IN (Joint) |
2015-11-18 13:30 |
Kumamoto |
Kumamoto University |
Missions of Information-Centric Networking Tohru Asami, Masaru Takagi, Yoshihiro Kawahara (TODAI), Atsushi Tagami (KDDIR&D Labs.), Kenichi Nakamura (Panasonic), Tomohiko Yagyu (NEC), Hidenori Nakazato (Waseda) IN2015-67 |
From the point of views of communication secrecy, traffic engineering and information leakage prevention, this paper rev... [more] |
IN2015-67 pp.35-40 |
RCS, SAT (Joint) |
2015-08-18 10:55 |
Fukuoka |
Fukuoka Univ. |
Wireless Security Schemes using Random Phases for MISO-OFDM Communications Kaikai Huang, Kazuhiko Fukawa, Yuyuan Chang (Tokyo Tech) RCS2015-150 |
This report proposes new physical-layer security schemes for multiple-input single-output (MISO)-OFDM wireless communica... [more] |
RCS2015-150 pp.109-114 |
RCC, ASN, RCS, NS, SR (Joint) |
2015-07-31 15:25 |
Nagano |
JA Naganoken Bldg. |
A study of power allocation in secret communication with dummy signal Fumiya Nakabayashi, Kenta Umebayashi, Yasuo Suzuki (TUAT) RCS2015-129 |
In this paper, we investigate power an allocation method for physical layer security based wireless communication with d... [more] |
RCS2015-129 pp.169-173 |
ASN, RCS, NS, SR (Joint) |
2013-07-18 10:20 |
Shizuoka |
Hamamatsu Act City |
[Poster Presentation]
Secondary Node Cooperation with Enhancing Secure Capacity under Existence of Primary System Kenichi Tsukada, Takayuki Suzuki, Takeo Fujii (UEC), Osamu Takyu (shinshu Univ.), Tomoaki Ohtsuki (Keio Univ.) NS2013-46 RCS2013-97 SR2013-34 ASN2013-64 |
This paper considers secure communication of secondary user (SU) under existence of a primary user (PU) by cooperating t... [more] |
NS2013-46 RCS2013-97 SR2013-34 ASN2013-64 pp.69-74(NS), pp.111-116(RCS), pp.77-82(SR), pp.97-102(ASN) |
RCS, SIP |
2012-01-26 09:00 |
Fukuoka |
Fukuoka Univ. |
The Secrecy Capacity maximized by Adaptive Modulation and Transmission Power Control Satoru Shimosaka, Kenta Umebayashi, Yasuo Suzuki (Tokyo Univ. of Agr and Tech.) SIP2011-78 RCS2011-267 |
In recent wireless communication, security is one of main issues and secret key sharing based on information theoretic s... [more] |
SIP2011-78 RCS2011-267 pp.1-6 |
RCS, SIP |
2012-01-27 13:55 |
Fukuoka |
Fukuoka Univ. |
OPTIMIZATION OF INTERFERENCE SIGNALS TO AN EAVESDROPPER WITH MULTIPLE ANTENNAS Shuiqiang Yan, Shuichi Ohno (Hiroshima Univ.), Yuji Wakasa (Yamaguchi Univ.) SIP2011-110 RCS2011-299 |
Wireless communications are susceptible to eavesdropping. To interfere the eavesdropper having multiple antennas,secret ... [more] |
SIP2011-110 RCS2011-299 pp.183-186 |
RCS, NS (Joint) |
2011-07-22 09:15 |
Hokkaido |
Asahikawa Civic Culture Hall |
Cooperation for Secure Communications in the MIMO Relay Wire-tap Channel Marouan Jilani, Tomoaki Ohtsuki (Keio Univ.) RCS2011-90 |
We tackle the problem of secure communications for the Multiple-Input Multiple-Output Relay Eavesdropper system. By esta... [more] |
RCS2011-90 pp.93-98 |
RCS, MoNA, SR (Joint) |
2011-03-04 09:00 |
Kanagawa |
YRP |
A Study on Dynamic Node Selection for Secure Wireless Communication using Spatially Distributed Ciphering Function Satoshi Hirai, Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) RCS2010-281 |
Because of the vulnerable and unpredictable propagation of wireless signal, secure communications against eavesdropper i... [more] |
RCS2010-281 pp.189-194 |
RCS, MoNA, SR (Joint) |
2011-03-04 09:40 |
Kanagawa |
YRP |
Secrecy Capacity in Base Station Cooperative MIMO Masatoshi Yanase, Tomoaki Ohtsuki (Keio Univ.) RCS2010-283 |
In recent years, wireless communications such as a wireless lan or a cellular are widely used. However, it is easy to ea... [more] |
RCS2010-283 pp.201-204 |
AN, USN, SR, RCS (Joint) |
2010-10-28 09:30 |
Osaka |
Osaka University |
Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22 |
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] |
RCS2010-116 SR2010-49 AN2010-26 USN2010-22 pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN) |
RCS, AN, MoNA, SR (Joint) |
2010-03-05 11:50 |
Kanagawa |
YRP |
Power Allocation considering Secrecy Capacity based on Game Theory in L-link MIMO System Masatoshi Yanase, Tomoaki Ohtsuki (Keio Univ.) RCS2009-305 |
Recently, some power allocation methods for $L$-link MIMO system are proposed. However, these schemes do not consider se... [more] |
RCS2009-305 pp.275-278 |
RCS, AP (Joint) |
2009-11-26 09:00 |
Tokyo |
Tokyo Inst. of Tech. |
User Selection Scheme with Secrecy Capacity Between Other Users in MIMO Downlink Systems Masatoshi Yanase, Tomoaki Ohtsuki (Keio Univ.) RCS2009-133 |
For multiuser Multiple-Input-Multiple-Output (MIMO) downlink systems where some receivers exist, several user selection ... [more] |
RCS2009-133 pp.1-5 |
RCS |
2009-06-25 16:20 |
Aichi |
Nagoya University |
Proposal of Secure Wireless Communication with Multi-hop Transmission using Spatially Separated Propagation Channels Satoshi Hirai, Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) RCS2009-35 |
Private wireless network has to establish determinate wireless network in the limited private space that user intends. U... [more] |
RCS2009-35 pp.43-48 |
RCS |
2009-06-26 11:40 |
Aichi |
Nagoya University |
Secrecy-Based User Selection in Multiuser MIMO Downlink System Masatoshi Yanase, Tomoaki Ohtsuki (Keio Univ.) RCS2009-45 |
Several user selection schemes have been proposed for multiuser MIMO downlink systems. However,
these user selection sc... [more] |
RCS2009-45 pp.97-100 |
RCS, AN, MoNA, SR (Joint) |
2009-03-06 15:15 |
Kanagawa |
YRP |
Proposal of Secure Wireless Communication Using Spatially Separated Propagation Areas in Wireless Mesh Networks Masataka Araki, Shinichi Miyamoto, Seiichi Sampei (Osaka Univ) RCS2008-262 |
Private wireless network has to establish flexible wireless interconnection between various types of nodes in the limite... [more] |
RCS2008-262 pp.295-300 |