Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
Efficient Searchable Encryption Schemes Against Frequency Analysis Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2010-68 ISEC2010-72 WBS2010-47 pp.1-6 |
ISEC, IT, WBS |
2011-03-03 10:25 |
Osaka |
Osaka University |
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric) IT2010-69 ISEC2010-73 WBS2010-48 |
Hattori et al. proposed privacy-preserving biometric authentication protocols with generic 2-DNF homomorphic encryption ... [more] |
IT2010-69 ISEC2010-73 WBS2010-48 pp.7-14 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
ISEC, IT, WBS |
2011-03-03 13:00 |
Osaka |
Osaka University |
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
IT2010-72 ISEC2010-76 WBS2010-51 pp.31-36 |
ISEC, IT, WBS |
2011-03-03 14:00 |
Osaka |
Osaka University |
[Invited Talk]
Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) IT2010-73 ISEC2010-77 WBS2010-52 |
In this paper, we present a code/error-trellis construction for convolutional codes using shifted code/error-subsequence... [more] |
IT2010-73 ISEC2010-77 WBS2010-52 pp.37-44 |
ISEC, IT, WBS |
2011-03-03 15:00 |
Osaka |
Osaka University |
[Invited Talk]
Linear Cryptanalysis
-- History and Open Problems -- Mitsuru Matsui (Mitsubishi Electric) IT2010-74 ISEC2010-78 WBS2010-53 |
[more] |
IT2010-74 ISEC2010-78 WBS2010-53 p.45 |
ISEC, IT, WBS |
2011-03-03 16:10 |
Osaka |
Osaka University |
Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics Tsutomu Matsumoto (Yokohama Nat Univ.) IT2010-75 ISEC2010-79 WBS2010-54 |
[more] |
IT2010-75 ISEC2010-79 WBS2010-54 pp.47-48 |
ISEC, IT, WBS |
2011-03-03 16:35 |
Osaka |
Osaka University |
RFID Identification Protocol with Reduced Reader Computational Cost Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.) IT2010-76 ISEC2010-80 WBS2010-55 |
In the general setting of the RFID system, as each tag has its unique secret key, the reader needs to exhaustively searc... [more] |
IT2010-76 ISEC2010-80 WBS2010-55 pp.49-55 |
ISEC, IT, WBS |
2011-03-03 17:00 |
Osaka |
Osaka University |
Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States Kazuho Kakiwaki, Atsuko Miyaji (JAIST) IT2010-77 ISEC2010-81 WBS2010-56 |
[more] |
IT2010-77 ISEC2010-81 WBS2010-56 pp.57-64 |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.) IT2010-78 ISEC2010-82 WBS2010-57 |
The partition of cyclic codes defined by the defining sets and
concept of a sequence of the defining set are induced.
... [more] |
IT2010-78 ISEC2010-82 WBS2010-57 pp.65-68 |
ISEC, IT, WBS |
2011-03-03 10:25 |
Osaka |
Osaka University |
Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric) IT2010-79 ISEC2010-83 WBS2010-58 |
It is known that the error floor performance of LDPC codes depends on the girth in the underlying Tanner graphs. In this... [more] |
IT2010-79 ISEC2010-83 WBS2010-58 pp.69-74 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning Ken Enokizono, Hideki Ochiai (Yokohama National Univ.) IT2010-80 ISEC2010-84 WBS2010-59 |
In recent wireless standards, variable frame length turbo codes are
adopted and thus they require variable-length inter... [more] |
IT2010-80 ISEC2010-84 WBS2010-59 pp.75-80 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.) IT2010-81 ISEC2010-85 WBS2010-60 |
In order to carry out the streaming,in which video data is downloaded and played simultaneously, every frame needs to be... [more] |
IT2010-81 ISEC2010-85 WBS2010-60 pp.81-86 |
ISEC, IT, WBS |
2011-03-03 16:10 |
Osaka |
Osaka University |
Han-Kobayashi Rate Region for Gray-Wyner Source Coding System Shigeaki Kuzuoka (Wakayama Univ.) IT2010-82 ISEC2010-86 WBS2010-61 |
A unied treatment for multiterminal lossless source coding problems developed by Han and Kobayashi
is applied to the o... [more] |
IT2010-82 ISEC2010-86 WBS2010-61 pp.87-92 |
ISEC, IT, WBS |
2011-03-03 16:35 |
Osaka |
Osaka University |
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui) IT2010-83 ISEC2010-87 WBS2010-62 |
[more] |
IT2010-83 ISEC2010-87 WBS2010-62 pp.93-98 |
ISEC, IT, WBS |
2011-03-03 17:00 |
Osaka |
Osaka University |
A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property Takuya Koyama, Ken-ichi Iwata (Univ of Fukui) IT2010-84 ISEC2010-88 WBS2010-63 |
We consider a problem to build good prefix-free codes for stationary
memoryless sources over finite-state noiseless ch... [more] |
IT2010-84 ISEC2010-88 WBS2010-63 pp.99-104 |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.) IT2010-85 ISEC2010-89 WBS2010-64 |
Many real-world wireless channels tend to exhibit impulse responses with a relative small number of nonzero channel taps... [more] |
IT2010-85 ISEC2010-89 WBS2010-64 pp.105-111 |
ISEC, IT, WBS |
2011-03-03 10:25 |
Osaka |
Osaka University |
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.) IT2010-86 ISEC2010-90 WBS2010-65 |
In asynchronous cooperative communication systems with several relay nodes using amplify-and-forward (AF) protocol, OFD... [more] |
IT2010-86 ISEC2010-90 WBS2010-65 pp.113-118 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.) IT2010-87 ISEC2010-91 WBS2010-66 |
In this paper, the modified binary countdown scheme is considered for the media access control scheme
in the Ad-Hoc net... [more] |
IT2010-87 ISEC2010-91 WBS2010-66 pp.119-122 |