Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
WBS2009-51
Formal verification method for Access control model which can describe Dynamic Segregation of Duties
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.)
pp. 1 - 5
WBS2009-52
Considerations on Web System Development Process against XSS worms.
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security)
pp. 7 - 14
WBS2009-53
Evaluation of Mutual Anonymity in P2P Networks
Chigusa Kawashima (Univ. of Electro-Comm.), Todorka Alexandrova (Tokyo Metro Univ.), I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 15 - 22
WBS2009-54
About Security of Threshold Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 23 - 30
WBS2009-55
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC)
pp. 31 - 38
WBS2009-56
Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.)
pp. 39 - 43
WBS2009-57
Improved Method for Constructing Pairing-friendly Elliptic Curves with Fixed Coefficients
Masaaki Shirase (Future Univ-Hakodate)
pp. 45 - 52
WBS2009-58
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate)
pp. 53 - 60
WBS2009-59
An RSA Encryption Hardware Algorithm that uses a DSP block on the FPGA
Kensuke Kawakami, Koji Nakano (Hiroshima Univ.)
pp. 61 - 68
WBS2009-60
Performance Evaluation of A Multipath Routing Method for Highly Reliable Wireless Communications
Kento Terai, Shinsuke Hara (Osaka City Univ.)
pp. 69 - 74
WBS2009-61
Experimental Validation of an Ultra Wideband Spatio-Temporal Channel Sounder Employing an OFDM signal in a Narrowband Interference Environment
Hiroto Iiduka, Daisuke Sugizaki, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 75 - 80
WBS2009-62
Feasibility Study on Cognitive Radio based TV Spectrum Reuse using Leaky Coaxial Cable
Melvin Cabatuan, Masato Saito, Minoru Okada (NAIST)
pp. 81 - 86
WBS2009-63
An Area Layout-based MAP Estimation for Indoor Localization
Daisuke Anzai, Shinsuke Hara (Osaka City Univ.)
pp. 87 - 92
WBS2009-64
Direction Finding Performances in UWB Short-Range Phase-Comparison Monopulse Radars
Hironori Enkouji, Takehiko Nishide, Natsuki Hashimoto, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 93 - 98
WBS2009-65
Applicability of MB-OFDM UWB System to In-car Wireless Communication
Fumiaki Maehara, Ryouhei Kaneko, Akihiro Yamakita (Waseda Univ.)
pp. 99 - 104
WBS2009-66
Analysis of optical wireless multi-level PPM using IM/DD
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 105 - 109
WBS2009-67
A Study on LDPC coded Time Domain Block Equalizer under MIMO Frequency Selective Channels
Wang Junpeng, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech.)
pp. 111 - 116
WBS2009-68
New Implementation and Evaluation of Knuth-Yao Algorithm and Interval Algorithm
Shogo Takahashi, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 117 - 122
WBS2009-69
Error exponent for the additive white gaussian noise channel with noisy feedback
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 123 - 128
WBS2009-70
A Channel Coding Theorem based on the Number of Guesses
Keishi Okudera, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 129 - 133
WBS2009-71
Joint channel estimation and LDPC decoding over MIMO channels by nonlinear optimization
Takefumi Kobayashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 135 - 140
WBS2009-72
An analysis of bit error probability of recursive systematic convolutional codes with Max-log-MAP decoding
Yoshitake Kawadai, Hideki Yoshikawa (Tohoku Gakuin Univ)
pp. 141 - 145
WBS2009-73
On the Size of Circulant Matrices for which Reversible Codes Exist
Tomoharu Shibuya, Keita Nakade (Sophia Univ.)
pp. 147 - 151
WBS2009-74
1-State Error-Trellis Decoding of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 153 - 158
WBS2009-75
[Invited Talk]
Indifferentiability Theory and SHA-3 Project
-- Recent Status of Theoretical and Practical Researches on Hash Functions --
Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 159 - 166
WBS2009-76
[Invited Talk]
On the Spread-Spectrum Techniques for Inter-Vechile Communications
Hiromasa Habuchi (Ibaraki Univ.)
pp. 167 - 174
WBS2009-77
[Invited Talk]
Codes with unique correlation property and their application
Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
pp. 175 - 180
WBS2009-78
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 181 - 186
WBS2009-79
Universal Slepian-Wolf Coding for General Sources
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 187 - 191
WBS2009-80
Smooth Renyi Entropy and Resolvability
Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 193 - 198
WBS2009-81
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards
Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.)
pp. 199 - 204
WBS2009-82
Countermeasures against Power Analysis Attacks in Assembly code
Kazunori Kawamura, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 205 - 210
WBS2009-83
Electromagnetic Analysis from power line on SASEBO-R
Tetsutaro Kanno, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 211 - 216
WBS2009-84
Obtaining Local Information from FPGA Using Electromagnetic Analysis
Takao Ochiai, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Daisuke Uchida, Toshiaki Nagai, Shinichi Wakana (Fujitsu Labs.)
pp. 217 - 223
WBS2009-85
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet
-- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.)
pp. 225 - 232
WBS2009-86
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ)
pp. 233 - 240
WBS2009-87
A Reader Only Attack on a MIFARE Classic
Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.)
pp. 241 - 246
WBS2009-88
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2)
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 247 - 254
WBS2009-89
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 255 - 260
WBS2009-90
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 261 - 268
WBS2009-91
An effective attack against a chaos-based image scrambling encryption
Liang Zhao, Kouichi Sakurai (Kyushu Univ.)
pp. 269 - 274
WBS2009-92
On key recovery for Enocoro with weak key in related-key attack scenario
Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 275 - 280
WBS2009-93
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory
Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.)
pp. 281 - 287
WBS2009-94
Preimage Resistance of Hash Functions on the Dedicated Block Cipher
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
pp. 289 - 293
WBS2009-95
Bit Error of Hierarchical Transmission in Optical Wireless Channel
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.)
pp. 295 - 300
WBS2009-96
Theoretical BER Performance of Continuous OFDM Signals with Nonlinear Amplification
Yuichiro Goto, Akihiro Yamakita, Fumiaki Maehara (Waseda Univ.)
pp. 301 - 305
WBS2009-97
On a Blind Time-Domain Equalization Technique in Single-Carrier Block Transmisson
Ryo Kuwana, Teruyuki Miyajima (Ibaraki Univ.)
pp. 307 - 312
WBS2009-98
Discussion on a self-calibrated pipeline A/D converter.
Tohru Kohda, Masatora Ogata (Kyushu Univ.)
pp. 313 - 318
WBS2009-99
The quantized error of AD/DA conversion using beta-expansion
Tohru Kohda, Yuuki Fukae (Kyushu Univ.)
pp. 319 - 324
WBS2009-100
Frequency estimator using Newton method
Tohru Kohda, Kohnosuke Ogiwara (Kyushu Univ.)
pp. 325 - 329
WBS2009-101
Behavior Level Design of Turbo TCM Decoder
-- Automatic Synthesis of Pipeline Processing Circuit and Comparison of RTL Design --
Hayato Taira, Haruo Ogiwara (Nagaoka Univ. of Tech.)
pp. 331 - 335
WBS2009-102
Feasibility study of the pre-processing for enhancing text data compression efficiency
Hirofumi Nakamura (Miyakonojo Natl. Coll. of Tech), Kiyomitsu Kajisa (Kagoshima Natl. Coll. of Tech), Takayasu Fuchida (Kagoshima Univ.)
pp. 337 - 342
WBS2009-103
Antidictionary Coding Scheme Based on Array Structures
Keita Suzuki, Hirotada Fukae (Univ. of Electro-Comm.), Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 343 - 348
WBS2009-104
Redundancy analysis of the universal source code with a singular prior
Tatsuya Hashimoto, Tsutomu Kawabata (Univ. of Electro-Comm.)
pp. 349 - 352
WBS2009-105
New Classes of Public Key Cryptosystems Constructed Based on Error-Correcting Codes and Probabilistic Structure
Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360
WBS2009-106
A Construction of New Class of Linear Multivariate Public Key Cryptosystem Constructed Based on Error Correcting Codes
Masao Kasahara (Osaka Gakuin Univ.)
pp. 361 - 366
WBS2009-107
A Low Density Knapsack Cryptosystem
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 367 - 372
WBS2009-108
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 373 - 380
WBS2009-109
A Note on Practical Key Derivation Functions
Shoichi Hirose (Univ. of Fukui.)
pp. 381 - 384
WBS2009-110
Collision Attack on DM Compression Function Using Reduced AES-256
Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui)
pp. 385 - 390
WBS2009-111
Reducing Disclosed Credentials in Automated Trust Negotiation Using Preference
Taichi Hanaoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
pp. 391 - 398
WBS2009-112
Bio-metric Authentication using Motion Image of Speakers Face
Mari Ozaki, Ryuichi Sakai (Osaka Electro-Comm Univ.)
pp. 399 - 401
WBS2009-113
Existing Probability of Gauss Period Normal Basis
Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 403 - 407
WBS2009-114
On Constant Weight Codes with Large Linear Complexity from Cyclic Difference Set
Takayasu Kaida (Kinki Univ.)
pp. 409 - 412
WBS2009-115
On the Redundancy Rate of FF and VF Source Codes for General Sources
Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 413 - 418
WBS2009-116
Constructions of A Large Class of Optimum Linear Codes for Small Number of Information Symbols
Masao Kasahara (Osaka Gakuin Univ.), Shigeichi Hirasawa (Waseda Univ.)
pp. 419 - 426
WBS2009-117
Secure Key Rate of the BB84 Protocol using Finite Sample Bits
Yousuke Sano, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 427 - 432
WBS2009-118
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol
Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 433 - 438
WBS2009-119
On the Capacity of the AND Anti-Collusion Fingerprinting Codes
Hiroki Koga (Univ. of Tsukuba.)
pp. 439 - 444
WBS2009-120
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ)
pp. 445 - 448
WBS2009-121
Secure Linear Network Coding using Surplus Resources
Tomoki Kubo, Kunihiko Harada, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 449 - 454
WBS2009-122
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 455 - 460
WBS2009-123
Construction of wiretap codes from ordinary channel codes
Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 461 - 465
WBS2009-124
Basics of Design and Analysis of Codes for Wiretap Channels
Mitsuru Hamada (Tamagawa Univ.)
pp. 467 - 474
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.