Engineering Sciences/NOLTA-Wideband System(Date:2006/03/10)

Presentation
表紙

,  

[Date]2006/3/10
[Paper #]
目次

,  

[Date]2006/3/10
[Paper #]
A Note on Correlation-based Watermarking Scheme Exploiting 1-D DCT

Kiyotaka BABA,  Hiromu KODA,  Shojiro SAKATA,  

[Date]2006/3/10
[Paper #]IT2005-95,ISEC2005-152,WBS2005-109
Nonlinear Precoding for Block Transmission

Teruyuki MIYAJIMA,  Weiwei YAN,  Kazuhiko NAKAMURA,  

[Date]2006/3/10
[Paper #]IT2005-96,ISEC2005-153,WBS2005-110
Stability of Timing Synchronization Algorithm for Wireless Ad Hoc Networks

Bin ZHU,  Hidekazu MURATA,  Kiyomichi ARAKI,  

[Date]2006/3/10
[Paper #]IT2005-97,ISEC2005-154,WBS2005-111
Robust BFDM/OQAM Receiver for Time-Frequency Dispersive Channels

Bayarpurev MONGOL,  Takaya YAMAZATO,  Hiraku OKADA,  Masaaki KATAYAMA,  

[Date]2006/3/10
[Paper #]IT2005-98,ISEC2005-155,WBS2005-112
A Study of Maintaining the Image Quality of Digital Watermarking for Binary Images

Kenta KURODA,  Kunikatsu KOBAYASHI,  

[Date]2006/3/10
[Paper #]IT2005-99,ISEC2005-156,WBS2005-113
Proposal of Image Compensation which Embeds Data for Compensation in An Image

Takumi SASAKI,  Kunikatsu KOBAYASHI,  

[Date]2006/3/10
[Paper #]IT2005-100,ISEC2005-157,WBS2005-114
Watermarking Method for Detecting Alteration of Digital Images Using Smearing-Desmearing and Wavelet Transforms

Shunsuke NAKATA,  Toshiyuki UTO,  Kenji OHUE,  

[Date]2006/3/10
[Paper #]IT2005-101,ISEC2005-158,WBS2005-115
Video Watermarking Method Using Smearing-Desmearing and Wavelet Transforms

Genta FURUTSU,  Toshiyuki UTO,  Kenji OHUE,  

[Date]2006/3/10
[Paper #]IT2005-102,ISEC2005-159,WBS2005-116
A constant giving the maximum linear probability in arithmetic addition

Hirotaka ITTOGI,  Toyonaga TSUKISHIMA,  Toshinobu KANEKO,  

[Date]2006/3/10
[Paper #]IT2005-103,ISEC2005-160,WBS2005-117
A Study on necessary numbers of plaintexts for Cache Attack with Average Method.

Yoshitaka IKEDA,  Kozue YAMAGUCHI,  Toshinobu KANEKO,  

[Date]2006/3/10
[Paper #]IT2005-104,ISEC2005-161,WBS2005-118
Analysis of Tiger in Encryption Mode

Hirotaka YOSHIDA,  Alex BIRYUKOV,  Bart PRENEEL,  Dai WATANABE,  

[Date]2006/3/10
[Paper #]IT2005-105,ISEC2005-162,WBS2005-119
Not PGV constructions of a compression function based on a secure block cipher

Dai WATANABE,  Hirotaka YOSHIDA,  

[Date]2006/3/10
[Paper #]IT2005-106,ISEC2005-163,WBS2005-120
A Construction of Authenticated Encryption Algorithm Based on Stream Cipher MUGI and Its Security

Dai WATANABE,  Toshinobu KANEKO,  

[Date]2006/3/10
[Paper #]IT2005-107,ISEC2005-164,WBS2005-121
On the Randomness Evaluation Method using NIST Randomness Test

Hidetoshi OKUTOMI,  Manabu KANEDA,  Kenji YAMAGUCHI,  Katsuhiro NAKAMURA,  

[Date]2006/3/10
[Paper #]IT2005-108,ISEC2005-165,WBS2005-122
Design of a Stream Cipher using Efficient Clock Control

Shinsaku KIYOMOTO,  Toshiaki TANAKA,  Kouichi SAKURAI,  

[Date]2006/3/10
[Paper #]IT2005-109,ISEC2005-166,WBS2005-123
An Encryption Method for Multiple Receivers with Different Roles

Yasuo HATANO,  Kunihiko MIYAZAKI,  

[Date]2006/3/10
[Paper #]IT2005-110,ISEC2005-167,WBS2005-124
Realization of the ID-based encryption scheme based on symmetric-key technique with Device characteristic value

Hiromi Fukaya,  Kouichi Sakurai,  

[Date]2006/3/10
[Paper #]IT2005-111,ISEC2005-168,WBS2005-125
A secure ID based authenticated key agreement scheme with pairing

Daisuke MORIYAMA,  Jinhui CHAO,  

[Date]2006/3/10
[Paper #]IT2005-112,ISEC2005-169,WBS2005-126
123>> 1-20hit(42hit)