Thu, Mar 1 10:30 - 16:10 |
(1) |
10:30-10:55 |
A Clone Resistance Evaluation of Visible-Light Paper Artifact-Metrics |
Yuki Kondo, Yasuhiro Takeuchi, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.) |
(2) |
10:55-11:20 |
Object Verification System from Artifact-Metrics Based on Printed Ink Spread |
Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST) |
(3) |
11:20-11:45 |
A Method to Divide Application for Deterring Unauthorized Use by Outsourcee |
Satomi Honda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(4) |
11:45-12:10 |
Analysis of interdependency of information security in Japan |
Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.) |
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
(5) |
13:30-13:55 |
Reducing the Message Size in Oblivious Automata Evaluation |
Yuji Watanabe, Takaaki Tateishi (IBM) |
(6) |
13:55-14:20 |
Extension of Fuzzy Commitment Schemes |
Naoki Tani, Junji Shikata, Tsutomu Matsumoto (YNU) |
(7) |
14:20-14:45 |
Consideration for IT-secure password protected secret sharing |
Atsushi Waseda, Ryo Nojima (NICT) |
|
14:45-15:20 |
Break ( 35 min. ) |
(8) |
15:20-15:45 |
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function |
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kobe Univ.) |
(9) |
15:45-16:10 |
New Saturation Characteristics of HyRAL |
Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) |
Thu, Mar 1 10:30 - 17:25 |
(10) |
10:30-10:55 |
Wyner-Ziv video coding with a quantizer using correlations between frames |
Michiaki Ohkawa, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech) |
(11) |
10:55-11:20 |
Super-resolution using information-theoretic priori information of image histogram |
Shimpei Tanemori, Hiroyuki Kudo (Tsukuba Univ.) |
(12) |
11:20-11:45 |
An Efficient Quadtree-based Image Coder with Predictive Set Partitioning |
Hidetoshi Imamura, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) |
|
11:45-13:05 |
Lunch Break ( 80 min. ) |
|
- |
Break |
(13) |
15:20-15:45 |
Error-Trellis Construction for Tailbiting Convolutional Codes |
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) |
(14) |
15:45-16:10 |
Error Probability of Information and Position Estimation of Mobile Optical Transmitter using Viterbi Algorithm |
Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.) |
(15) |
16:10-16:35 |
Construction of multiple error correcting WOM-Code |
Hidetoshi Utsunomiya, Hiroshi Kamabe (Gifu Univ.) |
(16) |
16:35-17:00 |
Estimation of Block Orthogonal Modulation with Cyclostationarity |
Takafumi Kinugasa, Ikuo Oka, Shingo Ata (Osaka City Univ.) |
(17) |
17:00-17:25 |
Error Exponents of Linear Codes for Slepian-Wolf Source Coding |
Tomohiko Uyematsu (Tokyo Inst. Tech.) |
Thu, Mar 1 10:30 - 12:10 |
(18) |
10:30-10:55 |
Adjacent Channel Interference Cancellation using Orthogonal Precoding for Fractional Sampling OFDM Receiver |
Eisuke Sakai, Haruki Nishimura, Mamiko Inamori, Yukitoshi Sanada (Keio Univ.) |
(19) |
10:55-11:20 |
A Study on Single-RF Diversity Using Multiple Element ESPAR Antenna for IEEE 802.15.4 |
Yudai Katsuda, Minoru Okada (NAIST) |
(20) |
11:20-11:45 |
Prototype of Ultra Wideband-based Wireless Body Area Networks
-- Consideration of CAP and CFP slots allocation in human walking motion -- |
Yuichiro Takei, Hiroki Katsuta (Meiji Univ.), Kenichi Takizawa (NICT), Tetsushi Ikegami (Meiji Univ.), Kiyoshi Hamaguchi (NICT) |
(21) |
11:45-12:10 |
Proposal of Green Receive Diversity Using White-spaces
-- Receive Diversity with ESPAR Antenna Using Arbitrary Frequency Band -- |
Masato Saito, Wataru Arita (Ryukyu Univ.) |
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
Fri, Mar 2 09:00 - 17:50 |
(22) |
09:00-09:25 |
Searchable Symmetric Encryption with small information leakage in index update |
Toshinori Araki (NEC) |
(23) |
09:25-09:50 |
Software Implementation of Privacy Preserving Statistical Computations based on Homomorphic Encryption |
Toshiyuki Isshiki, Satoshi Obana, Kengo Mori (NEC) |
(24) |
09:50-10:15 |
Improved Left-to-Right Scalar Multiplication Algorithms |
Atsuko Miyaji, Yiren Mo (JAIST) |
|
10:15-10:50 |
Break ( 35 min. ) |
(25) |
10:50-11:15 |
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization |
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.) |
(26) |
11:15-11:40 |
Properties of Public-Keys for Knapsack Cryptosystems and the Low-density Attack |
Shogo Takai, Akira Hayashi (KIT) |
(27) |
11:40-12:05 |
Computer experiments on Shamir's attack against knapsack cryptosystems |
Jun Hashimoto, Akira Hayashi (KIT) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
(28) |
13:25-14:25 |
[Invited Talk]
Information Theoretically Secure Secret Key Agreement |
Shun Watanabe (Univ. Tokushima), Ryutaroh Matsumoto, Tomohiko Uyematsu (TITECH) |
(29) |
14:25-15:25 |
[Invited Talk]
Physical Attacks and Countermeasures on Cryptographic Devices |
Akashi Satoh (AIST) |
(30) |
15:25-16:25 |
[Invited Talk]
Human Activity Sensing Using Radio Waves for Safe and Secure Life |
Tomoaki Ohtsuki (Keio Univ.) |
|
16:25-16:35 |
Break ( 10 min. ) |
(31) |
16:35-17:00 |
Secure Tabular Data Analysis Allowing Partial Disclosure of Statistics |
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.) |
(32) |
17:00-17:25 |
Image Authentication Based on Interleaving and Cyclic Hamming Code |
Hiroaki Fujimoto, Ryuji Hamabe (FIT) |
(33) |
17:25-17:50 |
A New Watermarking Method with Block Diffusion and Biased-Chirp Transformation |
Kazuo Ohzeki, Yuan-Yu Wei, Mao Kuraki, Yutaka Hirakawa (SIT), Kiyotsugu Sato (CIT) |
Fri, Mar 2 09:00 - 17:50 |
(34) |
09:00-09:25 |
Healthcare Telemonitoring System by Relay-Assisted Communications in 400MHz band |
Kenichi Takizawa, Ryu Miura (NICT) |
(35) |
09:25-09:50 |
Study on RAKE Reception using Multicarrier Template Waveform in UWB-IR System |
Junpei Ohno, Kohei Ohno, Makoto Itami (TUS) |
(36) |
09:50-10:15 |
Transmission Performance Improvement with Dynamic Channel Allocation in MU-MIMO Systems |
Toshiro Nakahira, Hidekazu Murata, Susumu Yoshida, Koji Yamamoto (Kyoto Univ.), Daisuke Umehara (Kyoto Tech.), Satoshi Denno (Okayama Univ.), Masahiro Morikura (Kyoto Univ.) |
|
10:15-10:50 |
Break ( 35 min. ) |
(37) |
10:50-11:40 |
[Invited Talk]
Trends, Technical and Regulatory Problems, and Standardization for Commercialization of Wireless Power Transmission Technologies |
Hiroki Shoki (Toshiba) |
|
11:40-13:00 |
Lunch Break ( 80 min. ) |
|
- |
Break |
(38) |
16:35-17:00 |
A note on separation conditions of source and channel coding for sources with two-output terminal and channels with two-input and one-output terminals |
Ken-ichi Iwata, Nobu Mori (Univ. of Fukui) |
(39) |
17:00-17:25 |
A Note on Cyclic-Equivalent Codewords for Constant-Weight Codes from Cyclic Difference Sets |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.) |
(40) |
17:25-17:50 |
Theoretical analysis of bit error probability for punctured convolutional codes |
Hideki Yoshikawa (Tohoku Gakuin Univ.) |