Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]
ISEC2017-91
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models
Hirokazu Kono, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 1 - 6
ISEC2017-92
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines
Kenta Toyoda, Tomohiro Ogawa (Univ. of Electro- Commu.)
pp. 7 - 12
ISEC2017-93
Redundancy Analysis of Univarsal Lossless Source Coding via Estimation of Prior
-- Relaxing an Ergodicity Condition --
Ryosuke Ikarashi, Tsutomu Kawabata (UEC)
pp. 13 - 18
ISEC2017-94
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Comm.)
pp. 19 - 24
ISEC2017-95
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes
Masanobu Nakata, Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech)
pp. 25 - 30
ISEC2017-96
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants
Takashi Hisatome, Hiroki Koga (Univ. Tsukuba)
pp. 31 - 36
ISEC2017-97
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba)
pp. 37 - 42
ISEC2017-98
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer
Kengo Ikebata, Tomohiko Uyematsu (Tokyo Tech), Ryutaroh Matsumoto (Nagoya Univ), Tetsunao Matsuta (Tokyo Tech)
pp. 43 - 48
ISEC2017-99
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes
Ryusei Fujita, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo)
pp. 49 - 54
ISEC2017-100
Optimal Coded Caching using Linear Programming
Shota Kamiya, Hiroki Koga (Univ. Tsukuba)
pp. 55 - 60
ISEC2017-101
Shifted Coded Slotted ALOHA
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 61 - 66
ISEC2017-102
[Invited Talk]
On Traitor Tracings and Related Topics
Shota Yamada (AIST)
p. 67
ISEC2017-103
[Invited Talk]
Research and Development of Transmission Technologies for the Next Generation Terrestrial Broadcasting
Tomoaki Takeuchi (NHK)
p. 69
ISEC2017-104
[Invited Talk]
On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms
Hajime Matsui (Toyota Technological Institute)
p. 71
ISEC2017-105
Effect on randomizing components to the security of Minalpher
Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 73 - 79
ISEC2017-106
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations
Koji Shima, Hiroshi Doi (IISEC)
pp. 81 - 88
ISEC2017-107
Succinct Oblivious RAM
Taku Onodera, Tetsuo Shibuya (IMSUT)
pp. 89 - 96
ISEC2017-108
High Efficient Scalar Multiplication in Elliptic Curve Cryptography
Noboru Takeuchi, Toshiyuki Kinoshita (TUT)
pp. 97 - 101
ISEC2017-109
Digital watermark using deep-learning classification
Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.)
pp. 103 - 106
ISEC2017-110
Evaluation of deep learning method for detection of intrusion packets
Tomoki Ueno, Mitiko Harayama (GIFU Univ)
pp. 107 - 113
ISEC2017-111
Reply analysis between Twitter users using machine learning
-- Distinguish real-life/online friends --
Takakuwa Ranka, Sasaki Taroh, Fujioka Atsushi (KU)
pp. 115 - 119
ISEC2017-112
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.)
pp. 121 - 128
ISEC2017-113
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 129 - 135
ISEC2017-114
A study on segmented deletion error correction using polar code
Hikari Koremura, Haruhiko Kaneko (Tokyo Tech)
pp. 137 - 141
ISEC2017-115
Bayes Optimal AMP Decoder for Sparse Superposition Codes
Yuwa Hatae (Kyushu Univ.), Kazushi Mimura (Hiroshima City Univ.), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 143 - 148
ISEC2017-116
Ordered Shuffle-BP Decoding Based on the Loops of LDPC Code
Ryoma Sakai, Kazuhiko Yamaguchi (UEC)
pp. 149 - 154
ISEC2017-117
Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes
Yoshihiro Murayama, Takayuki Nozaki (Yamaguchi Univ.)
pp. 155 - 160
ISEC2017-118
Non-binary codes correcting a burst of deletions or insertions
Toyohiko Saeki, Takayuki Nozaki (Yamaguchi Univ.)
pp. 161 - 166
ISEC2017-119
Asymptotic Analysis of LDPC Codes for Two-Way Relay Channels
Yuta Ishimatsu, Satoshi Takabe, Tadashi Wadayama (NITech), Masahito Hayashi (Nagoya Univ.)
pp. 167 - 172
ISEC2017-120
Consideration of error correction code suitable for WBAN
Akihiro Yamada, Hiroyoshi Morita, Akiko Manada (The Univ. of Electro-Communications)
pp. 173 - 177
ISEC2017-121
On the Generalization of Fano's Inequality for Countably Infinite Alphabets, List-Decoding, and General Conditional Information Measures
Yuta Sakai (Univ. Fukui)
pp. 179 - 184
ISEC2017-122
Parameter orthogonalization method in quantum parameter estimation problem
Jun Suzuki (UEC)
pp. 185 - 190
ISEC2017-123
Improved Lossless Compression by Substring Enumeration Using Sorting
Takahiro Ota (NPIT), Akiko Manada (UEC)
pp. 191 - 196
ISEC2017-124
The Error Performance Analysis of the K-best Viterbi Decoding Algorithm
Hideki Yoshikawa (Tohoku Gakuin Univ.)
pp. 197 - 200
ISEC2017-125
Quantum &Classical Radar Camera for Automotive and Effect of Fog-2
-- Sparse Modeling --
Osamu Hirota (Tamagawa Univ.)
pp. 201 - 206
ISEC2017-126
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.)
pp. 207 - 212
ISEC2017-127
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 213 - 218
ISEC2017-128
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 219 - 223
ISEC2017-129
On (Un)Deniability of Plausible Deniability
Atsushi Waseda, Ryo Nojima (NICT)
pp. 225 - 230
ISEC2017-130
Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.)
pp. 231 - 236
ISEC2017-131
On Security Evaluation for Coset Coding in Wiretap Channel Coding
Yuki Mori, Tomohiro Ogawa (UEC)
pp. 237 - 243
ISEC2017-132
Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.)
pp. 245 - 251
ISEC2017-133
Time-Space Jointly Path-Matched MC-CDM Wide Band Radio Modulation with TX and RX Array Antennas
-- for High Performance Error-Control Coding --
Kohji Itoh, Akira Nakamura, Makoto Itami (TUS)
pp. 253 - 258
ISEC2017-134
Influence of Channel Estimation Error on Noise Enhancement Suppression by Using Novel Multilevel Spreading Codes
Tatsuya Motoki, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 259 - 264
ISEC2017-135
Performance Comparison of User Position Detection Method using Multiple Unmanned Aerial Vehicles based Positioning Accuracy Index
Hiroyasu Ishikawa, Hiroki Onuki (Nihon Univ.)
pp. 265 - 270
ISEC2017-136
Study on Aerial Cooperative Relaying for Coverage Extension of High-Altitude Unmanned Aircraft Systems
Fumie Ono (NICT), Hideki Ochiai (Yokohama National Univ.), Ryu Miura, Fumihide Kojima (NICT)
pp. 271 - 273
ISEC2017-137
On Adaptive Self-Interference Suppression for Full Duplex Filter-and-Forward Relaying
Hayato Teshiromori, Teruyuki Miyajima, Yoshiki Sugitani (Ibaraki Univ.)
pp. 275 - 280
ISEC2017-138
Evaluation of synchronization jitter caused by the distance from base-station on optical wireless RVC system using CSK-MPPM
Masayuki Ishikawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 281 - 286
ISEC2017-139
A study of Bit Error Rate Taking into Account Synchronization Performance on Optical Wireless Framed-DOOK System
Yuta Asano, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 287 - 292
ISEC2017-140
BER Performance Evaluation of ROD-WSN using Modified Pseudo Orthogonal M-sequences under Fading Channel
Tomohiro Okawa, Hiromasa Habuchi (Ibaraki Univ.), Koichiro Hashiura (Akita Prefectural Univ.)
pp. 293 - 297
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.