Engineering Sciences/NOLTA-Information Security(Date:2017/03/09)

Presentation
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC

Masao Kasahara(Waseda Univ.),  

[Date]2017-03-10
[Paper #]IT2016-127,ISEC2016-117,WBS2016-103
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification

Naoki Watanabe(YNU),  Naoki Yoshida(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2017-03-10
[Paper #]IT2016-120,ISEC2016-110,WBS2016-96
[Invited Talk] A Survey on Space-, Time-, and Frequency-Domain Index Modulation

Shinya Sugiura(TUAT),  

[Date]2017-03-10
[Paper #]IT2016-138,ISEC2016-128,WBS2016-114
Efficient Verifiable Attribute-Based Keyword Search

Go Ohtake(NHK),  Reihaneh Safavi-Naini(Univ. of Calgary),  Liang Feng Zhang(ShanghaiTech Univ.),  

[Date]2017-03-10
[Paper #]IT2016-129,ISEC2016-119,WBS2016-105
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability

Ryo Nomura(Senshu Univ.),  Hideki Yagi(Univ. of Electro-Comm.),  

[Date]2017-03-10
[Paper #]IT2016-126,ISEC2016-116,WBS2016-102
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code

Keisuke Osawa(Ibaraki Univ.),  Hiromasa Habuchi(Ibaraki Univ.),  Yusuke Kozawa(Ibaraki Univ.),  

[Date]2017-03-10
[Paper #]IT2016-136,ISEC2016-126,WBS2016-112
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN

Norisato Suga(ATR),  Naoto Egashira(ATR),  Kazuto Yano(ATR),  Tomoaki Kumagai(ATR),  

[Date]2017-03-10
[Paper #]IT2016-125,ISEC2016-115,WBS2016-101
Index Coding with Information-Theoretic Secrecy for Unintended Message

Mami Takei(Univ. Tsukuba),  Hiroki Koga(Univ. Tsukuba),  

[Date]2017-03-10
[Paper #]IT2016-130,ISEC2016-120,WBS2016-106
MRI Acceleration by Super Resolution

Ayaka Nakashima(Kyushu Univ.),  Masanori Kawakita(Kyushu Univ.),  Yutaka Jitsumatsu(Kyushu Univ.),  Shigehide Kuhara(Kyorin Univ.),  Jun'ichi Takeuchi(Kyushu Univ.),  

[Date]2017-03-10
[Paper #]IT2016-124,ISEC2016-114,WBS2016-100
Performance of Error Correcting Codes for RGB-LED Parallel Transmission

Ran Sun(Ibaraki Univ.),  Hiromasa Habuchi(Ibaraki Univ.),  Yusuke Kozawa(Ibaraki Univ.),  

[Date]2017-03-10
[Paper #]IT2016-135,ISEC2016-125,WBS2016-111
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets

Bagus Santoso(UEC),  

[Date]2017-03-10
[Paper #]IT2016-122,ISEC2016-112,WBS2016-98
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing

Ryutaroh Matsumoto(Tokyo Tech.),  

[Date]2017-03-10
[Paper #]IT2016-132,ISEC2016-122,WBS2016-108
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption

Takeshi Nakai(UEC),  Takuya Nojima(UEC),  Mitsugu Iwamoto(UEC),  Kazuo Ohta(UEC),  

[Date]2017-03-10
[Paper #]IT2016-128,ISEC2016-118,WBS2016-104
Spectrum Sensing in Cooperative with Some Secondary Users

Yuki Muranaka(Tokyo Tech),  Ryutaroh Matsumoto(Tokyo Tech),  Tetsunao Matsuta(Tokyo Tech),  Tomohiko Uyematsu(Tokyo Tech),  

[Date]2017-03-10
[Paper #]IT2016-131,ISEC2016-121,WBS2016-107
Anonymous Oblivious RAM for Multi-user Environment

Satoru Takano(Osaka Univ.),  Su Chunhua(Osaka Univ.),  Atuko Miyaji(Osaka Univ.),  

[Date]2017-03-10
[Paper #]IT2016-118,ISEC2016-108,WBS2016-94
A Study on Relay Communication using UAV with Buffer

Higashi Takahiro(Yokohama National Univ.),  Ochiai Hideki(Yokohama National Univ.),  

[Date]2017-03-10
[Paper #]IT2016-137,ISEC2016-127,WBS2016-113
Secret Sharing Schemes using Modulo-2^m Operations

Hidenori Kuwakado(Kansai Univ.),  

[Date]2017-03-10
[Paper #]IT2016-133,ISEC2016-123,WBS2016-109
A study of secure multi-party set union protocol

Katsunari Shishido(OU),  Atsuko Miyaji(OU),  

[Date]2017-03-10
[Paper #]IT2016-119,ISEC2016-109,WBS2016-95
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation

Gavin Lynn Stewart(JAIST),  Yuichi Futa(TUT),  Atsuko Miyaji(JAIST/Osaka Univ.),  

[Date]2017-03-10
[Paper #]IT2016-100,ISEC2016-90,WBS2016-76
Development of Security Incident Symptomatic Analysis function in SIAS

Mitsumu Katsuno(TUIS),  Hiroki Sakamoto(TUIS),  Hiroyuki Ookawa(TUIS),  Takashi Yamaguchi(TUIS),  Eiji Nunohiro(TUIS),  Akira Orita(HISYS.ISR),  Tatsuya Sekiguchi(HISYS.ISR),  

[Date]2017-03-10
[Paper #]IT2016-134,ISEC2016-124,WBS2016-110
<<12 21-40hit(40hit)