Print edition: ISSN 0913-5685
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
IT2006-85
On performances of M-ary/OFDM communication system
Hideyuki Murata, Shin'ichi Tachikawa (Nagaoka Univ. of Tech.)
pp. 1 - 6
IT2006-86
On Bit-Error Rate Performance of Approximately Synchronized CDMA System
Tatsuya Hisada, Shinya Matsufuji, Takahiro Matsumoto, Yoshihiro Tanada (Yamaguchi Univ.), Noriyoshi Kuroyanagi (Chubu Univ.), Naoki Suehiro (Tsukuba Univ.)
pp. 7 - 10
IT2006-87
On Noncoherent FH Pattern Likelihood Ratio Decision Methods
Takuma Maeda, Shin'ichi Tachikawa (Nagaoka Univ of Tech)
pp. 11 - 16
IT2006-88
A Construction Method of Spread Spectrum Codes
Takumi Sugawara, Kouichi Ohnuma (Tohoku Gakuin Univ.)
pp. 17 - 22
IT2006-89
MMSE Signal Detection with Adaptive Antenna Array for BS/CDMA Communication Systems
Satoshi Kawashimo, Tsuyoshi Ichikawa, Kohei Otake (Hosei Univ), Noriyoshi Kuroyanagi (Chubu Univ)
pp. 23 - 28
IT2006-90
Capacity increase in block-spreading MIMO CDMA systems due to path diversity effect
Mitsuhiro Tomita (Tokyo Univ. of Tech.), Noriyoshi Kuroyanagi (Chubu Univ.), Kohei Otake (Hosei Univ.), Naoki Suehiro (Univ. of Tsukuba)
pp. 29 - 34
IT2006-91
Proposal of Twin Turbo MIMO-OFDM
Yasuyuki Hatakawa, Noriaki Miyazaki, Toshinori Suzuki (KDDI R&D Lab.)
pp. 35 - 40
IT2006-92
A Consideration of Time Domain Precoder on MIMO Frequency Selective Channels
Yusuke Goto, Yasunori Iwanami, Eiji Okamoto (N.I.T)
pp. 41 - 46
IT2006-93
On the Security of Secret Handshake
Kazuki Yoneyama, Yutaka Kawai, Takahiro Kondo, Kazuo Ohta, Noboru Kunihiro (UEC)
pp. 47 - 52
IT2006-94
On a Secure Function Evaluation for Comparator Networks
Koji Chida (NTT), Hiroaki Kikuchi (Tokai Univ.), Gembu Morohashi, Keiichi Hirota (NTT)
pp. 53 - 58
IT2006-95
Computationally Sound Symbolic Criteria for UC-secure Multi-Party Mutual Authentication and Key Exchange Protocols
Hirofumi Muratani, Yoshikazu Hanatani (Toshiba)
pp. 59 - 64
IT2006-96
Key Update by Broadcast Encryption for Wireless Sensor Networks
Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI)
pp. 65 - 70
IT2006-97
QPKI:Construction of Ubiquitous PKI Systems Using Two-Dimensional Barcode
Ken Umeno (NICT)
pp. 71 - 74
IT2006-98
Proposal of P2P network architechture where data acquisition can be controlled
Naoki Sasamura, Hidehiko Tanaka (iisec)
pp. 75 - 80
IT2006-99
Design and Analysis of 3way Authentication Based on Trusted Device
Hiromi Fukaya (Pastel), Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
pp. 81 - 86
IT2006-100
The proposal of low-processing load authentication method for two parties using disposable ID
Kazuo Fushimi, Noboru Kunihiro, Kazuo Ohta (UEC)
pp. 87 - 92
IT2006-101
Linearization method and linear complexity
Hidema Tanaka (NICT)
pp. 93 - 98
IT2006-102
On the Linear Characteristic of HyRAL16
Yasutaka Igarashi, Toshinobu Kaneko, Naoto Fukubayashi (Tokyo Univ. of Science)
pp. 99 - 103
IT2006-103
Performance Evaluation of Block Encryption Algorithms on Core2
Junko Nakajima, Mitsuru Matsui (Mitsubishi Electric Corp.)
pp. 105 - 110
IT2006-104
Performance Comparison of the ISO standard block ciphers in ASICs
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan)
pp. 111 - 117
IT2006-105
A technique for making PKI robust
Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita)
pp. 119 - 124
IT2006-106
A Digital Watermarking for Audio Information: Randomized Method and Beat-Frequency Method
Shinya Miura, Masao Sakai, Hiroki Shizuya (Tohoku Univ.)
pp. 125 - 130
IT2006-107
A Study on Relation between Orthogonal Design and Dual Codes
Yoshifumi Ukita (YCC), Toshiyasu Matsushima (Waseda Univ.)
pp. 131 - 136
IT2006-108
Another Form of Coding Theorems for General Source Coding and Shannon:s Cipher System
Hiroki Koga (Univ. of Tsukuba)
pp. 137 - 142
IT2006-109
Quantum key distribution with guarantteed security by weak coherent light
Masahito Hayashi, Akihisa Tomita, Jun Hasegawa, Tohya Hiroshima (JST ERATO-SORST)
pp. 143 - 148
IT2006-110
A Study on Performance of Reed-Solomon coded Code Selection method
Kyung Woon Jang, Hirokazu Tanaka (Toshiba), Shoichiro Yamasaki (POLITECHINIC Univ.)
pp. 149 - 153
IT2006-111
Study on Turbo Decoding Using Error and Erasure Decoder of RS codes As a Hard-in Soft-out Decoder
Shinya Maehara, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi (UEC)
pp. 155 - 160
IT2006-112
On a soft-input and output iterative decoding algorithm for Reed-Solomon codes
Hitoshi Tokushige, Kenichi Arimoto, Masami Mohri, Yasutada Oohama (Univ. of Tokushima)
pp. 161 - 166
IT2006-113
Method for Reducing Computational Complexity of Soft-Decision Decoding Based on Ordered Statistics
Takayuki Shimizu, Kenya Horai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
pp. 167 - 172
IT2006-114
Share selectable secret sharing scheme on inefficiency concentrated for particular user
Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST)
pp. 173 - 178
IT2006-115
Group Signature with Efficient Revocation
Nao Nomura, Atsuko Miyaji, Keita Emura (JAIST)
pp. 179 - 184
IT2006-116
On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory
Takayuki Takagi, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (Jaist)
pp. 185 - 190
IT2006-117
A Study on Huffman Coding for Binomial Sources
Hisao Fukuoka (Matsue NCT)
pp. 191 - 195
IT2006-118
Updating algorithms for Jones splay code with a multiway tree
Yoshiyuki Suimon, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 197 - 202
IT2006-119
Information-Hiding Schemes Based on the Algorithm of gzip
Satoshi Tomioka, Hiroki Koga (Univ. of Tsukuba)
pp. 203 - 208
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.