IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)
2019-05-20
12:00
Fukuoka Kyushu University, Chikushi Campus One-Shot Randomized and Nonrandomized Partial Decoupling
Eyuri Wakakuwa (UEC), Yoshifumi Nakata (Kyoto U)
We introduce a task that we call partial decoupling, in which a bipartite quantum state is transformed by a unitary oper... [more]
MoNA 2018-12-25
13:00
Tokyo   Low-delay route construction method against black hole attack in MANET
Nozomi Sasaki, Shintaro Imai, Yoshikazu Arai, Toshimitsu Inomata (Iwate Prefectural Univ.) MoNA2018-45
Black hole attack to MANET which is constituted by an unspecified number of nodes is a big threat. In black hole attack,... [more] MoNA2018-45
pp.37-41
QIT
(2nd)
2018-06-05
14:40
Hiroshima ICCH Ran Firewall and qubit model of black hole evaporation
Tomoro Tokusumi, Yasusada Nambu, Akira Matsumura (Nagoya Univ.)
(To be available after the conference date) [more]
ICSS 2017-11-21
13:10
Oita Beppu International Convention Center Study of Traffic Analysis Method for Illegal Host Detection with Kmeans++
Taisuke Yamada, Masaki Inamura (Tokyo Denki Univ.) ICSS2017-48
With the development of the Internet, the number of devices connected to cyberspace is increasing. By being left untreat... [more] ICSS2017-48
pp.59-64
SR
(2nd)
2014-10-30
- 2014-10-31
Overseas I2R, Singapore [Poster Presentation] Neighborhood connectivity based trust scheme to prevent acitve black hole attacks
Ruojun Cai, Peter Han Joo Chong (NTU)
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing i... [more]
ET 2013-05-26
15:00
Wakayama Wakayama University Development of a Hand-Writing Process Presenter with HTML5
Yasuhisa Okazaki, Chinatsu Yoshihara, Hisaharu Tanaka (Saga Univ.), Kenzi Watanabe (Hiroshima Univ.) ET2013-11
This paper describes development of a system which can replay the handwriting presentation processes as if they are writ... [more] ET2013-11
pp.55-60
ICSS 2011-03-25
16:25
Tokyo Suspended Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] ICSS2010-66
pp.59-64
AP 2008-03-14
13:25
Aichi Nanzan Univ. Total radiated power (TRP) measurement of small radio terminals using a spheroidal coupler
Tasuku Teshirogi, Aya Yamamoto, Takashi Kawamura, Toru Sakuma (Anritsu) AP2007-192
Recent small radio terminals require radiation measurements to obtain their electrical performances because most of them... [more] AP2007-192
pp.113-118
NS, IN
(Joint)
2008-03-07
14:30
Okinawa Bankoku Shinryokan Defense Method against Black Hole Attack with Adaptive Blacklist
Ken Sajo, Takumi Miyoshi (Shibaura Inst. Tech.) NS2007-197
A black hole attack is a serious problem in ad hoc networks.
In this attack, a malicious node camouflages a route reply... [more]
NS2007-197
pp.365-368
NS, ICM, CQ
(Joint)
2007-11-15
15:50
Fukuoka Institute of System LSI Design Industry, Fukuoka Defense Method to Black Hole Attack on Ad Hoc Network
Ken Sajo (Shibaura Inst. Tech.), Takumi Miyoshi (Shibaura Inst.) CQ2007-75
A black hole attack is a serious problem in ad hoc networks. In this attack, a malicious node camouflages
a route reply... [more]
CQ2007-75
pp.21-24
IN, NS
(Joint)
2006-03-02
11:00
Okinawa Rizzan Sea-Park Hotel Tancha-Bay (Okinawa) Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networksby Dynamic learning method
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney)
This paper analyzes blackhole attack which is one of the possible attacks in ad hoc network. In blackhole
attack, a mal... [more]
NS2005-174
pp.65-68
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan