Engineering Sciences/NOLTA-Information Security(Date:2011/02/24)

Presentation
A Generalized MDL Criterion and its Apprication to Learning Bayesian Network Structures : When Both Discrete and Continuous Data are Present

Joe SUZUKI,  

[Date]2011/2/24
[Paper #]IT2010-106,ISEC2010-110,WBS2010-85
Error exponent for channel coding with noisy feedback and bin coding

Akari SATO,  Hirosuke YAMAMOTO,  

[Date]2011/2/24
[Paper #]IT2010-107,ISEC2010-111,WBS2010-86
Rate-Splitting for Multiple Receiver Channels

Hideki YAGI,  H. Vincent POOR,  

[Date]2011/2/24
[Paper #]IT2010-108,ISEC2010-112,WBS2010-87
Performance evaluation of MC-CDMA system which permits time and frequency offsets

Tatsuma KUWAZAKI,  Tohru KHODA,  Yutaka JITSUMATSU,  

[Date]2011/2/24
[Paper #]IT2010-109,ISEC2010-113,WBS2010-88
Performance Evaluation of Non-binary LDPC Codes with APSK Modulation

Keiya ISHIKAWA,  Hideki OCHIAI,  

[Date]2011/2/24
[Paper #]IT2010-110,ISEC2010-114,WBS2010-89
Secure Multiplex Coding with a Common Message

Ryutaroh MATSUMOTO,  Masahito HAYASHI,  

[Date]2011/2/24
[Paper #]IT2010-111,ISEC2010-115,WBS2010-90
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers

Takahiro YOSHIDA,  Hajime JINUSHI,  Toshiyasu MATSUSHIMA,  

[Date]2011/2/24
[Paper #]IT2010-112,ISEC2010-116,WBS2010-91
Dual universality of hash functions and its applications to quantum cryptography

Toyohiro TSURUMARU,  Masahito HAYASHI,  

[Date]2011/2/24
[Paper #]IT2010-113,ISEC2010-117,WBS2010-92
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage

Masazumi KURIHARA,  Hidenori KUWAKADO,  

[Date]2011/2/24
[Paper #]IT2010-114,ISEC2010-118,WBS2010-93
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks

Kazuya KOYANO,  Hiroki KOGA,  

[Date]2011/2/24
[Paper #]IT2010-115,ISEC2010-119,WBS2010-94
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane

Yusuke FUJII,  Hiroki KOGA,  

[Date]2011/2/24
[Paper #]IT2010-116,ISEC2010-120,WBS2010-95
Efficient Privacy Amplification Algorithms for Quantum Key Distribution

Takeshi ASAI,  Toyohiro TSURUMARU,  

[Date]2011/2/24
[Paper #]IT2010-117,ISEC2010-121,WBS2010-96
New Differential Fault Analysis on Trivium Based on Setup-Time Violations

Qi LI,  Shigeto GOMISAWA,  Mitsugu IWAMOTO,  Kazuo OHTA,  Kazuo SAKIYAMA,  

[Date]2011/2/24
[Paper #]IT2010-118,ISEC2010-122,WBS2010-97
Higher Order Differential Attack on HyRAL

Naoki SHIBAYAMA,  Yasutaka IGARASHI,  Toshinobu KANEKO,  Seiichiro HANGAI,  

[Date]2011/2/24
[Paper #]IT2010-119,ISEC2010-123,WBS2010-98
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics

Masao KASAHARA,  

[Date]2011/2/24
[Paper #]IT2010-120,ISEC2010-124,WBS2010-99
A Method of Fingerprint Authentication Using KSS(I)

Hiroki SATOMURA,  Tetsushi OHKI,  Naohisa KOMATSU,  Masao KASAHARA,  

[Date]2011/2/24
[Paper #]IT2010-121,ISEC2010-125,WBS2010-100
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse

Toshinori UEDA,  Toshiyuki UTO,  Kenji OHUE,  

[Date]2011/2/24
[Paper #]IT2010-122,ISEC2010-126,WBS2010-101
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter

Masataka OHNO,  Toshiyuki UTO,  Kenji OHUE,  

[Date]2011/2/24
[Paper #]IT2010-123,ISEC2010-127,WBS2010-102
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC

Masao KASAHARA,  

[Date]2011/2/24
[Paper #]IT2010-124,ISEC2010-128,WBS2010-103
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC : Modification of K(VII)SE(1)PKC

Masao KASAHARA,  

[Date]2011/2/24
[Paper #]IT2010-125,ISEC2010-129,WBS2010-104
<<1234>> 41-60hit(68hit)