IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] ICSS2021-81
pp.135-140
RCS 2021-06-23
10:30
Online Online A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation
Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] RCS2021-35
pp.37-42
WBS, MICT 2019-07-16
12:30
Ibaraki Ibaraki University(Mito Campus) [Poster Presentation] A Study of Data Transmission Scheme in Interference Area of VN-CSK Illumination Light Communication
Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2019-13 MICT2019-14
The Variable N-parallel code-shift-keying (VN-CSK) system has been proposed for solving the dimming control problem and ... [more] WBS2019-13 MICT2019-14
pp.17-22
QIT
(2nd)
2018-06-04
13:20
Hiroshima ICCH Ran [Poster Presentation] Proposal of simple authentication and secret-key-sharing system using a threshold-type single photon detector
Shin Arahira, Hitoshi Murai (OKI)
We report a quantum-mechanics-based authentication and secret-key-sharing system using intensity modulated light pulses ... [more]
NS, IN
(Joint)
2018-03-02
15:40
Miyazaki Phoenix Seagaia Resort Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices
Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] NS2017-239
pp.403-408
IT, SIP, RCS 2017-01-19
13:05
Osaka Osaka City Univ. A study on application of one time pad to enhance information secrecy in wireless distributed transmission
Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] IT2016-60 SIP2016-98 RCS2016-250
pp.81-86
ICSS, IA 2016-06-06
15:40
Saga Saga University Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN
Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] IA2016-4 ICSS2016-4
pp.19-24
RCS, IN
(Joint)
2015-05-22
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Using Signal Strength to prevent sessinon hijacking in IEEE 802.11
Nariaki Tamaki, Takehiro Kawata (NTT) IN2015-12
We propose a method for detecting malicious frames used to disconnect legitimate sessions, and preventing session hijack... [more] IN2015-12
pp.55-60
SWIM 2014-05-23
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services
Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] SWIM2014-4
pp.19-24
SIS 2013-12-13
13:10
Tottori Torigin Bunka Kaikan (Tottori) A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding
Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] SIS2013-51
pp.131-136
EMM 2013-01-30
11:10
Miyagi Tohoku Univ. A Secret Sharing Method for String Data Incorporating Their Transformation
Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more]
EMM2012-100
pp.53-58
QIT
(2nd)
2012-11-27
11:20
Kanagawa Keio Univ. Hiyoshi Campus A Quantum Relay using Quantum Scret Sharing
Takashi Suzuki, Akihisa Tomita (Hokkaido Univ)
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more]
COMP 2011-06-30
13:00
Hiroshima Hiroshima Univ. Absolutely Secure Message Transmission Using a Key Sharing Graph
Yoshihiro Indo (Kwansei Gakuin Univ.), Takaaki Mizuki (Tohoku Univ.), Takao Nishizeki (Kwansei Gakuin Univ.) COMP2011-18
Assume that there are players and an eavesdropper of unlimited computational power and that several pairs of players hav... [more] COMP2011-18
pp.17-23
IA, ICSS 2011-06-17
10:25
Fukuoka Kyushu Institute of Technology Secure and Traceable Online Image Sharing Scheme for Service Providers
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2011-8 ICSS2011-8
We propose a scheme for application service providers to provide a secure and traceable online image sharing service. To... [more] IA2011-8 ICSS2011-8
pp.41-46
IN, NS
(Joint)
2011-03-04
08:50
Okinawa Okinawa Convention Center Encrypted E-mail sharing system with multi-forwarding
Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] NS2010-243
pp.445-448
AN, USN, SR, RCS
(Joint)
2010-10-28
09:30
Osaka Osaka University Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication
Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] RCS2010-116 SR2010-49 AN2010-26 USN2010-22
pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN)
IPSJ-AVM, MoNA 2010-07-16
10:55
Hokkaido Hokkaido Univ. An Approach to Reduce Illegal Content Redistributions of P2P Video Sharing System Using Multiple Secret Sharing Scheme
Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Univ. of Tokyo.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) MoMuC2010-23
CGM (Consumer Generated Media) based video sharing services are one of the killer applications among the current Interne... [more] MoMuC2010-23
pp.57-62
ISEC 2010-05-21
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. An Improvement of Attribute-based Encryption
Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] ISEC2010-6
pp.33-39
LOIS, IPSJ-CN 2009-05-21
15:25
Tokyo Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg Secure Password Authentication Protocol with Key Sharing Function (SPARK)
Hirokazu Nogura, Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (T-SS), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-3
Various information are sent on public networks.Cryptosystems are necessary for protect these information.Existing key s... [more] LOIS2009-3
pp.67-72
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan