Engineering Sciences/NOLTA-Information Security(Date:2012/02/23)

Presentation
A Study on Single-RF Diversity Using Multiple Element ESPAR Antenna for IEEE 802.15.4

Yudai KATSUDA,  Minoru OKADA,  

[Date]2012/2/23
[Paper #]IT2011-64,ISEC2011-91,WBS2011-65
Prototype of Ultra Wideband-based Wireless Body Area Networks : Consideration of CAP and CFP slots allocation in human walking motion

Yuichiro TAKEI,  Hiroki KATSUTA,  Kenichi TAKIZAWA,  Tetsushi IKEGAMI,  Kiyoshi HAMAGUCHI,  

[Date]2012/2/23
[Paper #]IT2011-65,ISEC2011-92,WBS2011-66
Proposal of Green Receive Diversity Using White-spaces : Receive Diversity with ESPAR Antenna Using Arbitrary Frequency Band

Masato SAITO,  Wataru ARITA,  

[Date]2012/2/23
[Paper #]IT2011-66,ISEC2011-93,WBS2011-67
Searchable Symmetric Encryption with Small Information Leakage in Index Update

Toshinori ARAKI,  

[Date]2012/2/23
[Paper #]IT2011-67,ISEC2011-94,WBS2011-68
Software Implementation of Privacy Preserving Statistical Computations based on Homomorphic Encryption

Toshiyuki ISSHIKI,  Satoshi OBANA,  Kengo MORI,  

[Date]2012/2/23
[Paper #]IT2011-68,ISEC2011-95,WBS2011-69
Improved Left-to-Right Scalar Multiplication Algorithms

Atsuko MIYAJI,  Yiren MO,  

[Date]2012/2/23
[Paper #]IT2011-69,ISEC2011-96,WBS2011-70
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Cryptosystem, which relies on the Difficulty of Prime Factorization

Shigeo TSUJII,  Kohtaro TADAKI,  Masahito GOTAISHI,  Ryo FUJITA,  

[Date]2012/2/23
[Paper #]IT2011-70,ISEC2011-97,WBS2011-71
Properties of Public-Keys for Knapsack Cryptosystems and the Low-density Attack

Shougo TAKAI,  Akira HAYASHI,  

[Date]2012/2/23
[Paper #]IT2011-71,ISEC2011-98,WBS2011-72
Computer experiments on Shamir's attack against knapsack cryptosystems

Jun HASHIMOTO,  Akira HAYASHI,  

[Date]2012/2/23
[Paper #]IT2011-72,ISEC2011-99,WBS2011-73
Information Theoretically Secure Secret Key Agreement

Shun WATANABE,  Ryutaroh MATSUMOTO,  Tomohiko UYEMATSU,  

[Date]2012/2/23
[Paper #]IT2011-73,ISEC2011-100,WBS2011-74
Physical Attacks and Countermeasures on Cryptographic Devices

Akashi SATOH,  

[Date]2012/2/23
[Paper #]IT2011-74,ISEC2011-101,WBS2011-75
Human Activity Sensing Using Radio Waves for Safe and Secure Life

Tomoaki OHTSUKI,  

[Date]2012/2/23
[Paper #]IT2011-75,ISEC2011-102,WBS2011-76
Secure Tabular Data Analysis Allowing Partial Disclosure of Statistics

Takashi ITO,  Takato HIRANO,  Takumi MORI,  Mitsuhiro HATTORI,  Nori MATSUDA,  

[Date]2012/2/23
[Paper #]IT2011-76,ISEC2011-103,WBS2011-77
Image Authentication Based on Interleaving and Cyclic Hamming Code

Hiroaki FUJIMOTO,  Ryuji HAMABE,  

[Date]2012/2/23
[Paper #]IT2011-77,ISEC2011-104,WBS2011-78
A New Watermarking Method with Block Diffusion and Biased-Chirp Transformation

Kazuo OHZEKI,  Yuan-Yu Wei,  Mao Kuraki,  Yutaka Hirakawa,  Kiyotsugu Sato,  

[Date]2012/2/23
[Paper #]IT2011-78,ISEC2011-105,WBS2011-79
Healthcare Telemonitoring System by Relay-Assisted Communications in 400MHz band

Kenichi TAKIZAWA,  Ryu MIURA,  

[Date]2012/2/23
[Paper #]IT2011-79,ISEC2011-106,WBS2011-80
Study on RAKE Reception using Multicarrier Template Waveform in UWB-IR System

Jumpei ONO,  Kohei OHNO,  Makoto ITAMI,  

[Date]2012/2/23
[Paper #]IT2011-80,ISEC2011-107,WBS2011-81
Transmission Performance Improvement with Dynamic Channel Allocation in MU-MIMO Systems

Toshiro NAKAHIRA,  Hidekazu MURATA,  Susumu YOSHIDA,  Koji YAMAMOTO,  Daisuke UMEHARA,  Satoshi DENNO,  Masahiro MORIKURA,  

[Date]2012/2/23
[Paper #]IT2011-81,ISEC2011-108,WBS2011-82
Trends, Technical and Regulatory Problems, and Standardization for Commercialization of Wireless Power Transmission Technologies

Hiroki Shoki,  

[Date]2012/2/23
[Paper #]IT2011-82,ISEC2011-109,WBS2011-83
A Note on Separation Conditions of Source and Channel Coding for Sources with Two Output Terminal and Channels with Two Input and One Output Terminals

Ken-ichi IWATA,  Nobu MORI,  

[Date]2012/2/23
[Paper #]IT2011-83,ISEC2011-110,WBS2011-84
<<123>> 21-40hit(46hit)