Engineering Sciences/NOLTA-Information Security(Date:2014/03/03)

Presentation
Modeling and error rate performance evaluation of a virtual MIMO relay system with small UA and multiple ground stations

Kensuke IKEDA,  Fumie ONO,  Hideki OCHIAI,  Ryu MIURA,  

[Date]2014/3/3
[Paper #]IT2013-72,ISEC2013-101,WBS2013-61
Four Limits in Probability and Their Operational Meanings in Information Theory

Hiroki KOGA,  

[Date]2014/3/3
[Paper #]IT2013-73,ISEC2013-102,WBS2013-62
Information-Theoretic Cryptography : Survey and Challenge

Junji SHIKATA,  

[Date]2014/3/3
[Paper #]IT2013-74,ISEC2013-103,WBS2013-63
Approaches from Queueing Theory for Wireless Mesh Networks

Hiraku OKADA,  

[Date]2014/3/3
[Paper #]IT2013-75,ISEC2013-104,WBS2013-64
Numerical analysis of optimal quantum cloning machines for trine states

Akira KOYAMA,  Jun SUZUKI,  

[Date]2014/3/3
[Paper #]IT2013-76,ISEC2013-105,WBS2013-65
Study of Data Communication using Spread Spectrum Modulation in Magnetic Field Resonance Wireless Power Transfer

Shouhei UENO,  Kazuki SUGENO,  Motoki IIDA,  Yukitoshi SANADA,  

[Date]2014/3/3
[Paper #]IT2013-77,ISEC2013-106,WBS2013-66
Data Transmission using Transmitter Side Channel Estimation in Wireless Power Transfer System

Kazuki SUGENO,  Yukitoshi SANADA,  Mamiko INAMORI,  

[Date]2014/3/3
[Paper #]IT2013-78,ISEC2013-107,WBS2013-67
A Note on Indistinguishability of Fail-Stop Signature Schemes

Masahiro NOMURA,  Katsuhiro NAKAMURA,  

[Date]2014/3/3
[Paper #]IT2013-79,ISEC2013-108,WBS2013-68
A Distribution Related to The Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion 2 Problem over Barreto-Naehrig Curve

Shoichi AKAGI,  Yasuyuki NOGAMI,  

[Date]2014/3/3
[Paper #]IT2013-80,ISEC2013-109,WBS2013-69
On the Outage Energy Efficiency of Wireless Duocast Relay Multiple Access Channels in the Low Power Regime

Bai RO,  Tomohiko UYEMATSU,  Ryutaroh MATSUMOTO,  Tetsunao MATSUTA,  

[Date]2014/3/3
[Paper #]IT2013-81,ISEC2013-110,WBS2013-70
Performance Analysis of Amplify-and-Forward Cooperative Diversity with RF Energy Harvesting

Hiroki KAWABATA,  Koji ISHIBASHI,  

[Date]2014/3/3
[Paper #]IT2013-82,ISEC2013-111,WBS2013-71
On Dynamic Cooperative Diversity Based on Dual-Spinal Codes

Shun OGATA,  Koji ISHIBASHI,  

[Date]2014/3/3
[Paper #]IT2013-83,ISEC2013-112,WBS2013-72
A QAM Classification based on Two Amplitude Moments in the Presence of Symbol Timing Error

Yasuhiro MATSUMURA,  Ikuo OKA,  Shingo ATA,  

[Date]2014/3/3
[Paper #]IT2013-84,ISEC2013-113,WBS2013-73
A Construction of an Efficient Linear Ramp Threshold Secret Sharing Scheme Using an LT code

Mitsuteru SAKASHITA,  Hiroki KOGA,  Shuntaro HONJO,  

[Date]2014/3/3
[Paper #]IT2013-85,ISEC2013-114,WBS2013-74
Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security

Shuntaro HONJO,  Hiroki KOGA,  Mitsuteru SAKASHITA,  

[Date]2014/3/3
[Paper #]IT2013-86,ISEC2013-115,WBS2013-75
Secret Sharing Schemes Secure against Rushing Cheaters

Satoshi OBANA,  

[Date]2014/3/3
[Paper #]IT2013-87,ISEC2013-116,WBS2013-76
On a Secret Sharing Scheme with Systematic Reed-Solomon Codes and Its Applications

Shoichiro YAMASAKI,  Tomoko K. MATSUSHIMA,  Kazuyoshi OHNO,  

[Date]2014/3/3
[Paper #]IT2013-88,ISEC2013-117,WBS2013-77
A Note on the Complex Modulation with Zero Point from Constant-Weight and Multi-Valued Sequences

Takayasu KAIDA,  Junru ZHENG,  Keiichi TAKAAHSHI,  

[Date]2014/3/3
[Paper #]IT2013-89,ISEC2013-118,WBS2013-78
Performance Evaluation of Single Carrier Transmission Using Frequency Domain Equalization

Shinichiro MIYAZAKI,  SHOICHIRO YAMASAKI,  Ryuji KOHNO,  

[Date]2014/3/3
[Paper #]IT2013-90,ISEC2013-119,WBS2013-79
1ビット反転によるデータ書換えを用いたTime-Space制約符号の構成

Shohei TAKEYAMA,  Hiroshi KAMABE,  

[Date]2014/3/3
[Paper #]IT2013-91,ISEC2013-120,WBS2013-80
<<123>> 21-40hit(48hit)