Engineering Sciences/NOLTA-Information Security(Date:2016/03/10)

Presentation
Algebraic Construction of KV Trellises for Linear Block Codes

Masato Tajima(*),  

[Date]2016-03-10
[Paper #]IT2015-120,ISEC2015-79,WBS2015-103
Collision-Free Rainbow Table Structure

Yuki Tabata(NDA),  Keisuke Iwai(NDA),  Hidema Tanaka(NDA),  Takakazu Kurokawa(NDA),  

[Date]2016-03-10
[Paper #]IT2015-114,ISEC2015-73,WBS2015-97
Studies on Sudoku Puzzle Based on Coding Theory

Nobumasa Nanami(UEC),  Shinsuke Hirano(UEC),  Kazuhiko Yamaguchi(UEC),  

[Date]2016-03-10
[Paper #]IT2015-101,ISEC2015-60,WBS2015-84
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution

Ryo Inoue(UEC),  Kazuhiko Yamaguchi(UEC),  

[Date]2016-03-10
[Paper #]IT2015-113,ISEC2015-72,WBS2015-96
Fundamental Properties on a Secret-key Cryptosystem with Guessing Secrecy for Plaintexts and Keys

Shota Kamiya(Tsukuba Unv.),  Hiroki Koga(Tsukuba Unv.),  

[Date]2016-03-10
[Paper #]IT2015-123,ISEC2015-82,WBS2015-106
Application of MUI cancellers using bipolar MPSC in CDMA radio communication systems

Hiroki Sato(Polytechnic Univ.),  Shinichiro Miyazaki(Polytechnic Univ.),  Tomoko K. Matsushima(Polytechnic Univ.),  Kotoku Omura(Polytechnic Univ.),  Shoichiro Yamasaki(Polytechnic Univ.),  

[Date]2016-03-10
[Paper #]IT2015-107,ISEC2015-66,WBS2015-90
Improved Key Rate of the Semi-Quantum Key Distribution Protocol

Kento Yamada(Tokyo Tech),  Ryutaroh Matumoto(Tokyo Tech),  

[Date]2016-03-10
[Paper #]IT2015-121,ISEC2015-80,WBS2015-104
A Synchronization Method using Fixed-Symbol for Insertion/Deletion/Substitution Channels

Ryo Shibata(TUS),  Gou Hosoya(TUS),  Hiroyuki Yashima(TUS),  

[Date]2016-03-10
[Paper #]IT2015-108,ISEC2015-67,WBS2015-91
The Minimum Codelength of Multiple-Uniprior Index Coding

Masaru Takahashi(Tokyo Tech),  Tetsunao Matsuta(Tokyo Tech),  Ryutaroh Matsumoto(Tokyo Tech),  Tomohiko Uyematsu(Tokyo Tech),  

[Date]2016-03-10
[Paper #]IT2015-110,ISEC2015-69,WBS2015-93
The Effective Method of Improving Berlekamp-Preparata Convolutional Codes Decoding by Tail-Biting Technology

Tianyi Zhang(Chiba Univ.),  Masato Kitakami(Chiba Univ.),  

[Date]2016-03-10
[Paper #]IT2015-118,ISEC2015-77,WBS2015-101
Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution

Ryousuke Kido(Tokyo Tech.),  Tetsunao Matsuta(Tokyo Tech.),  Ryutaroh Matsumoto(Tokyo Tech.),  Tomohiko Uyematsu(Tokyo Tech.),  

[Date]2016-03-10
[Paper #]IT2015-104,ISEC2015-63,WBS2015-87
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer

Tomoya Komiyama(Tokyo Tech),  Ryutaroh Matsumoto(Tokyo Tech),  Tetsunao Matsuta(Tokyo Tech),  Tomohiko Uyematsu(Tokyo Tech),  

[Date]2016-03-10
[Paper #]IT2015-122,ISEC2015-81,WBS2015-105
A Study on PAPR Reduction based on Iterative PTS without Side Information in OFDM Systems

Moeko Yoshida(Ibaraki Univ.),  Teruyuki Miyajima(Ibaraki Univ.),  

[Date]2016-03-10
[Paper #]IT2015-106,ISEC2015-65,WBS2015-89
Intrinsic Randomness Problem for Correlated General Sources

Tomohiko Uyematsu(Tokyo Tech.),  Tetsunao Matsuta(Tokyo Tech.),  

[Date]2016-03-10
[Paper #]IT2015-111,ISEC2015-70,WBS2015-94
Redundancy of Bayesian Code with Markov Fractal Prior Distributions

Naoya Matsukami(UEC),  Tsutomu Kawabata(UEC),  

[Date]2016-03-10
[Paper #]IT2015-103,ISEC2015-62,WBS2015-86
Performance Evaluation on Service Area Constitution for Position Detection Method using Two Unmanned Aerial Vehicle

Hiroyasu Ishikawa(Nihon Univ.),  Shin Herai(Nihon Univ.),  Shunsuke Sato(Nihon Univ.),  

[Date]2016-03-10
[Paper #]IT2015-105,ISEC2015-64,WBS2015-88
Relations Between Conditional Shannon Entropy and Expectation of Norm and Their Applications

Yuta Sakai(Univ. of Fukui),  Ken-ichi Iwata(Univ. of Fukui),  

[Date]2016-03-10
[Paper #]IT2015-109,ISEC2015-68,WBS2015-92
On the bit error probability for constant log-MAP decoding of convolutional codes

Hideki Yoshikawa(Tohoku Gakuin Univ.),  

[Date]2016-03-10
[Paper #]IT2015-119,ISEC2015-78,WBS2015-102
Message Preprocessing for MD Hash Functions

Hidenori Kuwakado(Kansai Univ.),  Shoichi Hirose(Univ. of Fukui),  

[Date]2016-03-10
[Paper #]IT2015-115,ISEC2015-74,WBS2015-98
Evaluation of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack

Hiroki Koga(Univ. Tsukuba),  Kaoru Itabashi(Univ. Tsukuba),  

[Date]2016-03-10
[Paper #]IT2015-124,ISEC2015-83,WBS2015-107
12>> 1-20hit(37hit)