IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 44  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Secure communication based on high precision space-time synchronization
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
pp.97-102
AP, SANE, SAT
(Joint)
2022-07-29
11:15
Hokkaido Asahikawa Taisetsu Crystal Hall
(Primary: On-site, Secondary: Online)
Evaluation of Secure Transmission Performance of Spatially-Selective Modulation in an Indoor Environment
Hitoro Yonawa, Yuka Morishima, Hisato Iwai, Shinsuke Ibi (Doshisha Univ.) AP2022-57
As a physical layer security technique, we have proposed spatially-selective modulation (SSM) which consists of multiple... [more] AP2022-57
pp.129-134
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
RCC, WBS, SAT, MICT 2022-05-26
15:50
Online Online Construction of high-efficient information reconciliation method using polar codes and adaptive post selection for continuous-variable quantum key distribution
Yamaura Kensuke (NITech), Endo Hiroyuki (NICT), Yamashita Yuma, Okamoto Eiji (NITech), Toyoshima Morio (NICT) WBS2022-11 RCC2022-11 SAT2022-11 MICT2022-11
Quantum key distribution using optical laser satellites has currently been attracting attention for its information-theo... [more] WBS2022-11 RCC2022-11 SAT2022-11 MICT2022-11
pp.52-57
PN 2021-08-30
10:35
Online Online On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography
Takehisa Iwakoshi (Mie Univ.) PN2021-12
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] PN2021-12
pp.1-6
IT 2020-12-03
16:40
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
pp.206-211
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] SR2019-88
pp.15-22
QIT
(2nd)
2019-11-19
14:50
Tokyo Gakushuin University Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers
Seunghoan Song, Masahito Hayashi (Nagoya Univ.)
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more]
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
IT, ISEC, WBS 2019-03-08
10:50
Tokyo University of Electro-Communications The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC) IT2018-118 ISEC2018-124 WBS2018-119
In Wyner's wiretap channel, information leakage is defined as mutual information between transmitter's messages and eave... [more] IT2018-118 ISEC2018-124 WBS2018-119
pp.263-268
RCS, AP
(Joint)
2018-11-20
14:05
Okinawa Okinawa Industry Support Center [Invited Lecture] Performance analysis of large-scale non-orthogonal sparse chaos code multiple access scheme using GaBP algorithm
Eiji Okamoto, Yoshihiro Masuda, Keita Ito (NITech), Tetsuya Yamamoto (Panasonic) AP2018-109 RCS2018-186
As one of the main scenarios in the fifth generation mobile communications system (5G), a massive machine type communica... [more] AP2018-109 RCS2018-186
pp.41-46(AP), pp.49-54(RCS)
SAT, RCS
(Joint)
2018-08-10
11:15
Iwate Iwate University Performance analysis of non-orthogonal sparse chaos code multiple access scheme based on mutual information
Eiji Okamoto, Yoshihiro Masuda, Keita Ito (NITech), Tetsuya Yamamoto (Panasonic) RCS2018-144
To realize massive machine type communications (mMTC) scenario which accommodates Internet of things (IoT) device connec... [more] RCS2018-144
pp.69-74
WBS, IT, ISEC 2018-03-08
10:50
Tokyo Katsusika Campas, Tokyo University of Science The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech) IT2017-107 ISEC2017-95 WBS2017-88
As a method to distribute and preserve secret information, a secret sharing scheme provides high confidentiality and red... [more] IT2017-107 ISEC2017-95 WBS2017-88
pp.25-30
WBS, IT, ISEC 2018-03-09
10:15
Tokyo Katsusika Campas, Tokyo University of Science Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.) IT2017-142 ISEC2017-130 WBS2017-123
The authentication code (A-code) is an information-theoretically secure authentication system which detects messages for... [more] IT2017-142 ISEC2017-130 WBS2017-123
pp.231-236
WBS, IT, ISEC 2018-03-09
10:50
Tokyo Katsusika Campas, Tokyo University of Science On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC) IT2017-143 ISEC2017-131 WBS2017-124
According to wiretap channel coding by Wyner, it is possible to encode messages (or secret keys) so that the legitimate ... [more] IT2017-143 ISEC2017-131 WBS2017-124
pp.237-243
IT 2017-09-08
13:00
Yamaguchi Centcore Yamaguchi Hotel [Invited Talk] Broadcast Encryption with Information Theoretic Security -- Classical Results and Recent Progress --
Yohei Watanabe (UEC) IT2017-44
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] IT2017-44
pp.31-36
NLP 2017-03-14
16:00
Aomori Nebuta Museum Warasse Physical random number generation under noisy observation of entropy source
Kenichi Arai, Jun Muramatsu (NTT) NLP2016-116
We theoretically show that undesired noise can be eliminated in generating Physical Random Numbers (PRNs). PRNs can be u... [more] NLP2016-116
pp.57-61
IT, ISEC, WBS 2016-03-10
15:30
Tokyo The University of Electro-Communications Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer
Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2015-122 ISEC2015-81 WBS2015-105
Wireless secure communications based on the information-theoretic security are attracting much attention.
In this pape... [more]
IT2015-122 ISEC2015-81 WBS2015-105
pp.131-136
SS 2015-05-11
14:25
Kumamoto Kumamoto University [Invited Lecture] Quantitative Information Flow and Differential Privacy
Hiroyuki Seki (Nagoya Univ.) SS2015-4
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative in... [more] SS2015-4
pp.17-22
IT 2014-12-09
15:50
Toyama Unazuki New Otani Hotel [Invited Talk] On Quantitative Notions for Security and Privacy
Hiroyuki Seki (Nagoya Univ.) IT2014-52
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative i... [more] IT2014-52
pp.13-18
 Results 1 - 20 of 44  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan