IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 108, Number 474

Wideband System

Workshop Date : 2009-03-09 - 2009-03-10 / Issue Date : 2009-03-02

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

WBS2008-56
Proposal of Piece Falsification Detection Method on JetJigsaw
Tatsuyuki Matsushita, Kentaro Umesawa, Shinji Yamanaka (Toshiba)
pp. 1 - 6

WBS2008-57
Access control model for distributed systems and its application for service proxies
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
pp. 7 - 13

WBS2008-58
Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security)
pp. 15 - 22

WBS2008-59
Anomaly detection based on the machine learning of the human behavior on home network
Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security)
pp. 23 - 28

WBS2008-60
On the Possibility of Taking off Prime Number Generation in RSA-based Access Control
Jin Tamura (NICT)
pp. 29 - 33

WBS2008-61
A Note on Security of Knapsack Type PKC with Random Sequence
Yasuyuki Murakami (Osaka Electro-Comm Univ.)
pp. 35 - 40

WBS2008-62
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack
Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 41 - 45

WBS2008-63
[Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.)
pp. 47 - 48

WBS2008-64
[Invited Talk] Performance Evaluation of Error Correcting Codes
Toru Fujiwara (Osaka Univ.)
p. 49

WBS2008-65
[Invited Talk] Algebraic topology and sensor networks
Yasuaki Hiraoka (Hiroshima Univ./JTS PRESTO), Zin Arai (Hokkaido Univ./JTS PRESTO), Kazunori Hayashi (Kyoto Univ.)
pp. 51 - 56

WBS2008-66
Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks
Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.)
pp. 57 - 64

WBS2008-67
Sharing Multilevel Secrets among Groups Using Concatenation of Reed-Solomon Codes
Hachiro Fujita (Tokyo Metropolitan Univ.), Chigusa Kawashima (Univ. of Electro-Comm.), Tomoko K. Matsushima (Polytechnic Univ.)
pp. 65 - 70

WBS2008-68
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
pp. 71 - 78

WBS2008-69
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
pp. 79 - 84

WBS2008-70
Spectrum spreading sequences generated by chaotic dynamics and its correlational properties
Tohru Kohda, Takao Une, Yuichiro Koura (Kyushu Univ.)
pp. 85 - 90

WBS2008-71
Markovian Coded Gaussian Filter with its application to Filterbanks
Tohru Kohda, Yutaka Jitsumatsu, Tatsuma Kuwazaki, Kenjiro Fujino (Kyushu Univ.)
pp. 91 - 98

WBS2008-72
Data Dissemination in Mobile Environment Using Collaborative Approach
Mohd Rashid, Atsushi Kinjo, Tomokazu Nagata, Shiro Tamaki (Univ. of the Ryukyus)
pp. 99 - 104

WBS2008-73
Modulation Classification Based on Amplitude and Cosine moments
Shinji Ohara, Masato Kita, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 105 - 108

WBS2008-74
Error-Trellis State Complexity of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 109 - 116

WBS2008-75
Accelerated Algorithm for Computing the Weight Distribution of Convolutional Codes, part 2
Yasuo Asakura, Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Hiroshi Sasano (Kinki Univ.)
pp. 117 - 122

WBS2008-76
Sum-Product decoding of 3GPP Turbo Code
Toru Anzai, Toshiyuki Shohon, Haruo Ogiwara (Nagaoka Univ. of Tech.)
pp. 123 - 128

WBS2008-77
Relationship among Conditional Complexities of Individual Sequences
Yuki Tanaka, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 129 - 136

WBS2008-78
A Study on the Construction of Search Systems Indices
Shigeki Miyake (NTT Network Innovation Lab.)
pp. 137 - 141

WBS2008-79
A Coding Theorems for Cheating-Detectable (2,2)-Threshold Schemes
Hiroki Koga (Univ. Tsukuba), Mitsugu Iwamoto (Univ. Electro-Communications), Hirosuke Yamamoto (Univ. Tokyo)
pp. 143 - 150

WBS2008-80
Travel Time Forecasting based on Wavelet Method
Yusuke Kakihara, Jun'ichi Takeuchi (Kyushu Univ), Takashi Fujita, Eijen Yao (NEC Corp.), Hiromasa Oka (Mitsubishi Electric Information Network Corp.)
pp. 151 - 156

WBS2008-81
Collaborative Decoding Based on Average LLR in a Segment
Jun Hirosawa, Tomoaki Ohtsuki (Keio Univ.)
pp. 157 - 161

WBS2008-82
Hierarchical Modulation Schemes with APSK on the Road side to Vehicle Communication
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.), Koichiro Hashiura (Ibaraki Univ.)
pp. 163 - 166

WBS2008-83
Influence of channel errors on a wireless-controlled rotary inverted pendulum
Reo Kohinata, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.)
pp. 167 - 172

WBS2008-84
Reduced-Rank MMSE Signal Detection for MC/CDMA Communication Systems
Akihiko Furuya, Tsuyoshi Ichikawa, Kohei Otake (Hosei Univ.)
pp. 173 - 178

WBS2008-85
Weighted Cooperative Sensing for Shadowing Enviroments in Cognitive Radio
Kento Nakamura, Tomoaki Ohtsuki (Keio Univ.)
pp. 179 - 184

WBS2008-86
Cooperative Spectrum Sensing Techniques Using Decision Comparison for Cognitive Radio Systems Including Malicious Nodes
Toru Sakaguchi, Tomoaki Ohtsuki (Keio Univ.)
pp. 185 - 192

WBS2008-87
[Special Talk] ISSSTA2008 and ICUWB2008 Conference Report
Kohei Ohno (Tokyo Univ. of Science), Tetsushi Ikegami (Meiji Univ.)
pp. 193 - 198

WBS2008-88
A Study on Interference Suppression using Weighting factors for MB-OFDM systems
Atsushi Minakawa, Masahiro Fujii, Yu Watanabe (Utsunomiya Univ.)
pp. 199 - 204

WBS2008-89
a prototype of ultra wideband spatio-temporal channel sounder and its performance evaluation
Hiroto Iiduka, Masaki Takahashi, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 205 - 210

WBS2008-90
TOA UWB Position Estimation with 2 receivers and one known reflector
Jan Kietlinski-Zaleski, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.)
pp. 211 - 216

WBS2008-91
An AOA-based NLOS Error Mitigation Technique for Location Estimation
Takahiro Aso, Teruyuki Miyajima (Ibaraki Univ)
pp. 217 - 221

WBS2008-92
Elliptic curves with a pre-determined embedding degree
Shoujirou Hirasawa, Atsuko Miyaji (JAIST)
pp. 223 - 229

WBS2008-93
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1)
Masahiro Sukegawa, Atsuko Miyaji (JAIST)
pp. 231 - 237

WBS2008-94
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (2)
Mitsuki Ajiro, Masahiro Sukegawa, Atsuko Miyaji (JAIST)
pp. 239 - 244

WBS2008-95
The Distinguishing Attack on the Stream Cipher Consisting of the SPN Structure
Rei Onga, Ryoichi Teramura, Masakatu Morii (Kobe Univ.)
pp. 245 - 251

WBS2008-96
Bit Slice Cryptanalysis of Simplified K2 Stream Cipher
Takashi Ohshima, Munetoshi Iwakiri (National Defense Academy)
pp. 253 - 258

WBS2008-97
Improvement of LFSR Initial State Reconstruction Algorithm in Fast Correlation Attack Using Dynamically Constructed Parity Check Equations
Hiroaki Saitoh, Masami Mohri (Gifu Univ.), Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
pp. 259 - 266

WBS2008-98
A Note on the Security of Cryptographic Hash Functions
Shoichi Hirose (Univ. Fukui)
pp. 267 - 271

WBS2008-99
Formalizing Security of Hash Functions Against Length-Extension Attacks
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
pp. 273 - 276

WBS2008-100
AURORA: A Cryptographic Hash Algorithm Family
Tetsu Iwata (Nagoya Univ.), Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita (Sony Corp.)
pp. 277 - 286

WBS2008-101
Hardware Implementations of the Cryptographic Hash Function Familiy AURORA
Toru Akishita (Sony), Tadaoki Yamamoto, Hiroyuki Abe (Sony LSI Design)
pp. 287 - 294

WBS2008-102
Composition of functionalities in UC framework
Tadashi Araragi (NTT), Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
pp. 295 - 299

WBS2008-103
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions
Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 301 - 306

WBS2008-104
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement
Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security)
pp. 307 - 314

WBS2008-105
On incident forecasting using independent component alalysis
Eisuke Nishino, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT)
pp. 315 - 320

WBS2008-106
A study of incident detection based on correlation analysis between network traffic time series
Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT)
pp. 321 - 328

WBS2008-107
Detecting anomalies by monitoring terminals in Home Network
Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.)
pp. 329 - 334

WBS2008-108
Traffic Data Visualization of a Campus-wide Network
Shun Matsumoto, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Pref. Univ.)
pp. 335 - 342

WBS2008-109
A proof of universality of the source coding by most frequent match
Yangao Lin, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 343 - 348

WBS2008-110
A Necessary and Sufficient Condition for the Existence of a Universal Fixed-Rate Lossless Code
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 349 - 354

WBS2008-111
Universal Lossless Source Coding Based on Sequential Grammar Transforms
Masaki Jono, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 355 - 362

WBS2008-112
Adaptive Antidictionary Data Compression Using a Set of Restricted Length of Minimal Forbidden Words
Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Commu.)
pp. 363 - 370

WBS2008-113
Closed Forms of the Achievable Rate Region for Wyner's Source Coding Systems
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 371 - 378

WBS2008-114
Error Exponents for Wyner's Source Coding System
Tetsunao Matsuta, Shun Watanabe, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 379 - 385

WBS2008-115
On the Admissible Rate Region of Slepian-Wolf Coding Problem with LDPC Code and Mismatched Decoder
Kazuhiro Yamasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 387 - 393

WBS2008-116
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 395 - 400

WBS2008-117
Optimal Axis Compensation in Quantum Key Distribution Protocols
Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 401 - 407

WBS2008-118
Video Watermarking Using Ramp Secret Sharing Scheme
Shingo Saito, Kazuhiko Yamaguchi (Univ. of Electro-Comm)
pp. 409 - 414

WBS2008-119
Audio Watermarking Based on LDPC Code for Clipping Attack and the decoding-extracting algorithm with self-synchronization(2)
Isao Abe, Yusuke Kobayashi, Raul Martinez-Noriega, Kazuhiko Yamaguchi (Univ of Electro-Comm.)
pp. 415 - 420

WBS2008-120
A Grouping Method Based on Degree Distribution of Irregular LDPC Codes for Group Shuffled BP Decoding Algorithm
Yoshiyuki Sato, Gou Hosoya, Shigeichi Hirasawa (Waseda Univ.)
pp. 421 - 426

WBS2008-121
An Efficient Method for Evaluating Max-Fractional Distance Based on A Primal Path-Following Interior Point Method
Makoto Miwa, Tadashi Wadayama, Ichi Takumi (Nagoya Inst. of Tech.)
pp. 427 - 433

WBS2008-122
Minimum span analysis for a combined graph ensemble of low-density parity-check codes
Yujin Ishikawa, Yoshiyuki Sato, Gou Hosoya, Shigeichi Hirasawa (Waseda Univ.)
pp. 435 - 440

WBS2008-123
Sufficient Conditions for Convergence of the Sum-Product Decoding
Tomoharu Shibuya (Sophia Univ.)
pp. 441 - 446

WBS2008-124
Constructions of Irregular LDPC Code for a Burst Erasure
Gou Hosoya (Wased Univ.), Manabu Kobayashi (Shonan Inst. of Tech.), Shigeichi Hirasawa (Wased Univ.)
pp. 447 - 452

WBS2008-125
Reliability Function, Asymptotic Distance Ratio, and The Probability of Undetected Error for Product Codes
Toshihisa Nishijima (Hosei Univ.), Kin-ichiroh Tokiwa (Osaka Sangyo Univ.)
pp. 453 - 457

WBS2008-126
A Video Packet Detection Method in Wireless Communications
Shoichiro Yamasaki (Polytechnic UIniv.), Hirokazu Tanaka (Hokkaido Univ.)
pp. 459 - 462

WBS2008-127
Approximate ML Symbol Detection of OSTBC-OFDM over Unknown Channels
Tomoya Aizawa, Teruyuki Miyajima (Ibaraki Univ.)
pp. 463 - 467

WBS2008-128
A BER floor suppression scheme of OFDM system with Overlap-FDE
Tetsuya Kobori, Fumio Takahata (Waseda Univ)
pp. 469 - 474

WBS2008-129
Theoretical Analysis of Error Rate for IP Packet on Coded OFDM Systems
Yu Komatsu, Fumiaki Maehara (Waseda Univ.)
pp. 475 - 479

WBS2008-130
Theoretical Analysis of Bit Error Rate for MB-OFDM System in the Presence of Frequency Characteristics between Sub-bands
Ryouhei Kaneko, Fumiaki Maehara (Waseda Univ.)
pp. 481 - 485

WBS2008-131
Achievable Rate of Dual-Hop Non-Regenerative OFDM Relay Systems without FFT-based Relay Process
Shuhei Haraguchi, Masato Saito (Nara Inst. of Sci and Tech.), R. N. Athaudage, Jamie Evans (Univ. of Melbourne), Minoru Okada (Nara Inst. of Sci and Tech.)
pp. 487 - 491

WBS2008-132
A Study on Joint Optimization of Power Allocation and Subcarrier Mapping Method for Dual-hop Non-regenerative OFDM Relay Systems
Masato Saito (Nara Inst. of Sci and Tech.), Chandara Athaudage, Jamie Evans (Univ. of Melbourne)
pp. 493 - 499

WBS2008-133
Proposal of MIMO-SDM System considering Correlation of Channels
Tatsuhiko Yoshihara, Masayuki Yoshida, Fumiaki Maehara, Fumio Takahata (Waseda Univ.), Takashi Onodera (Sharp Corp.)
pp. 501 - 506

WBS2008-134
A Study on the Iterative Compensation of Clipping Noise for MIMO-OFDM systems.
Soichi Minamigi, Hideki Ochiai (Yokohama National Univ)
pp. 507 - 512

WBS2008-135
Phase Compensation for Narrowband Power-Line Communication Channels with Cyclic Time-Varying Features
Yoshie Sugiura, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.)
pp. 513 - 518

WBS2008-136
Investigation on an effect of Single/Double Optical Hard Limiter in the optical CDMA systems -- Effect of quantum noises on OHL --
Chinatsu Ito (Polytechnic Univ.), Noboru Ochiai (Ibarki Pref. Academy of Industrial Tech.), Takeshi Nagao (Sansou System), Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
pp. 519 - 526

WBS2008-137
Influence of scintillation on optical wireless CSK with extended prime code sequences
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 527 - 530

WBS2008-138
Study on Multipulse PPM using Replaced Permutation System for Broadcasting Optical Wireless Communications
Toshiki Kato, Fumie Ono (Yokohama National Univ.), Hiromasa Habuchi (Ibaraki Univ.)
pp. 531 - 535

WBS2008-139
McEliece Digital Signature with LDPC codes -- Practicality and Security Evaluation --
Shigenori Yamakawa (Chuo Univ.), Yang Cui, Manabu Hagiwara, Kazukuni Kobara (AIST/Chuo Univ.), Hideki Imai (Chuo Univ./AIST)
pp. 537 - 543

WBS2008-140
On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori
Yuji Nishigaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.)
pp. 545 - 550

WBS2008-141
On the Security of Torus-based Cryptography and Pairing Inversion Problem
Hirofumi Muratani, Tomoko Yonemura, Kenji Ohkuma, Taichi Isogai, Kenichiro Furuta, Yoshikazu Hanatani, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.)
pp. 551 - 556

WBS2008-142
Construction of EUF-CMA-secure Digital Signatures Based on weak Identity-Based Signatures
Takahiro Oshima, Taiichi Saito (Tokyo Denki Univ.)
pp. 557 - 562

WBS2008-143
An ID-Based 2-Functional Proxy Cryptosystem
Lihua Wang (NICT)
pp. 563 - 568

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan