Engineering Sciences/NOLTA-Information Security(Date:2011/02/24)

Presentation
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems

Makoto KANADUKA,  Teruyuki MIYAJIMA,  

[Date]2011/2/24
[Paper #]IT2010-86,ISEC2010-90,WBS2010-65
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network

Koichiro HASHIURA,  Hiromasa HABUCHI,  

[Date]2011/2/24
[Paper #]IT2010-87,ISEC2010-91,WBS2010-66
A Study on Unequal-Power-Allocation-Typed Turbo Code on Relay Channel

Ryo ENDO,  Hiromasa HABUCHI,  Tomoaki MURATA,  

[Date]2011/2/24
[Paper #]IT2010-88,ISEC2010-92,WBS2010-67
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences

Tomohiro HAYASHIDA,  Takahiro MATSUMOTO,  Shinya MATSUFUJI,  Pingzhi FAN,  

[Date]2011/2/24
[Paper #]IT2010-89,ISEC2010-93,WBS2010-68
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications

Yusuke KOZAWA,  Hiromasa HABUCHI,  

[Date]2011/2/24
[Paper #]IT2010-90,ISEC2010-94,WBS2010-69
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communication

Takayoshi NUMATA,  Hiromasa HABUCHI,  

[Date]2011/2/24
[Paper #]IT2010-91,ISEC2010-95,WBS2010-70
Construction of non-hyperelliptic coverings for elliptic curves on extension fields

Hiroyuki HARA,  Tsutomu IIJIMA,  Mahoro SHIMURA,  Jinhui CHAO,  

[Date]2011/2/24
[Paper #]IT2010-92,ISEC2010-96,WBS2010-71
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform

Kazuki OHKAWA,  Tsutomu IIJIMA,  Junhui CHAO,  

[Date]2011/2/24
[Paper #]IT2010-93,ISEC2010-97,WBS2010-72
Proposition of precomputation schemes considering memory

Taiki SASAHARA,  Atsuko MIYAJI,  

[Date]2011/2/24
[Paper #]IT2010-94,ISEC2010-98,WBS2010-73
Performance Evaluations of Robust Group Key Exchange Protocols

Takashi SATO,  Atsuko MIYAJI,  

[Date]2011/2/24
[Paper #]IT2010-95,ISEC2010-99,WBS2010-74
Verification Points of Security Against a Passive Attack for Key Exchange Protocols

Haruki OTAT,  Shinsaku KIYOMOTO,  Yutaka MIYAKE,  

[Date]2011/2/24
[Paper #]IT2010-96,ISEC2010-100,WBS2010-75
Improved POSH scheme using hash chains among sensors

Tetsuomi HASEGAWA,  Hikaru MORITA,  Satoru KANNO,  Shouji OKUNO,  

[Date]2011/2/24
[Paper #]IT2010-97,ISEC2010-101,WBS2010-76
An anomaly detection method using γ-divergence and its application to system call sequence

Shintaro MURAKAMI,  Masanori KAWAKITA,  Jun'ichi TAKEUCHI,  

[Date]2011/2/24
[Paper #]IT2010-98,ISEC2010-102,WBS2010-77
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback

Ryo NOJIMA,  Youki KADOBAYASHI,  

[Date]2011/2/24
[Paper #]IT2010-99,ISEC2010-103,WBS2010-78
A Note on serviceability between personal certificate and server certificate on PKI

Rie Shigetomi YAMAGUCHI,  Yutaka OIWA,  Hajime WATANABE,  

[Date]2011/2/24
[Paper #]IT2010-100,ISEC2010-104,WBS2010-79
User Authentication Using Neural Network Based on Keystroke Characteristics

Keishi SAKURAI,  Takao MIYAMOTO,  Shigeki AOKI,  Motoi IWATA,  Akira SHIOZAKI,  

[Date]2011/2/24
[Paper #]IT2010-101,ISEC2010-105,WBS2010-80
Robust image hashing against geometric attacks using image normalization and SVD decomposition

HERNANDEZ RicardoAntoio PARRAO,  Brian M. KURKOSKI,  MIYATAKE Mariko NAKANO,  

[Date]2011/2/24
[Paper #]IT2010-102,ISEC2010-106,WBS2010-81
Visual Card Games for Boys and Girls

Miyuki UNO,  Mikio KANO,  

[Date]2011/2/24
[Paper #]IT2010-103,ISEC2010-107,WBS2010-82
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation

Keita TOMOKUNI,  Hirosuke YAMAMOTO,  

[Date]2011/2/24
[Paper #]IT2010-104,ISEC2010-108,WBS2010-83
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring

Tsuki SAITO,  Tetsunao MATSUTA,  Ryutaroh MATSUMOTO,  Tomohiko UYEMATSU,  

[Date]2011/2/24
[Paper #]IT2010-105,ISEC2010-109,WBS2010-84
<<1234>> 21-40hit(68hit)