===============================================
Technical Committee on Wideband System (WBS)
Chair: Makoto Itami (Tokyo Univ. of Science)
Vice Chair: Yukitoshi Sanada (Keio Univ.), Shigenobu Sasaki (Niigata Univ.)
Secretary: Kenichi Takizawa (NICT), Fumie Ono (Yokohama National Univ.)
Assistant: Nobuyoshi Komuro (Chiba Univ.), Isao Matsunami (Nagasaki Univ.)
===============================================
Technical Committee on Information Theory (IT)
Chair: Hiroshi Kamabe (Gifu Univ.) Vice Chair: Masayoshi Ohashi (KDDI Labs.)
Secretary: Hiroki Koga (Univ. of Tsukuba), Motohiko Isaka (Kwansei Gakuin Univ.)
Assistant: Hidenori Kuwakado (Kobe Univ.)
===============================================
Technical Committee on Information Security (ISEC)
Chair: Naoya Torii (Fujitsu Labs.)
Vice Chair: Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.)
Secretary: Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.)
Assistant: Tetsuya Izu (Fujitsu Labs.)
DATE:
Thu, Mar 1, 2012 10:30 - 17:25
Fri, Mar 2, 2012 09:00 - 17:50
PLACE:
Hiyoshi Campus, Keio University(4-1-1 Hiyoshi, Kohoku-ku, Yokohama-shi, Kanagaw, Japan. Get off at Hiyoshi station; the 1-minute walk. http://www.keio.ac.jp/ja/access/hiyoshi.html. Prof. Yukitoshi Sanada)
TOPICS:
----------------------------------------
Thu, Mar 1 (10:30 - 16:10)
----------------------------------------
(1) 10:30 - 10:55
A Clone Resistance Evaluation of Visible-Light Paper Artifact-Metrics
Yuki Kondo, Yasuhiro Takeuchi, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.)
(2) 10:55 - 11:20
Object Verification System from Artifact-Metrics Based on Printed Ink Spread
Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST)
(3) 11:20 - 11:45
A Method to Divide Application for Deterring Unauthorized Use by Outsourcee
Satomi Honda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(4) 11:45 - 12:10
Analysis of interdependency of information security in Japan
Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.)
----- Lunch Break ( 80 min. ) -----
(5) 13:30 - 13:55
Reducing the Message Size in Oblivious Automata Evaluation
Yuji Watanabe, Takaaki Tateishi (IBM)
(6) 13:55 - 14:20
Extension of Fuzzy Commitment Schemes
Naoki Tani, Junji Shikata, Tsutomu Matsumoto (YNU)
(7) 14:20 - 14:45
Consideration for IT-secure password protected secret sharing
Atsushi Waseda, Ryo Nojima (NICT)
----- Break ( 35 min. ) -----
(8) 15:20 - 15:45
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kobe Univ.)
(9) 15:45 - 16:10
New Saturation Characteristics of HyRAL
Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
----------------------------------------
Thu, Mar 1 (10:30 - 17:25)
----------------------------------------
(10) 10:30 - 10:55
Wyner-Ziv video coding with a quantizer using correlations between frames
Michiaki Ohkawa, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech)
(11) 10:55 - 11:20
Super-resolution using information-theoretic priori information of image histogram
Shimpei Tanemori, Hiroyuki Kudo (Tsukuba Univ.)
(12) 11:20 - 11:45
An Efficient Quadtree-based Image Coder with Predictive Set Partitioning
Hidetoshi Imamura, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
----- Lunch Break ( 80 min. ) -----
----- Break -----
(13) 15:20 - 15:45
Error-Trellis Construction for Tailbiting Convolutional Codes
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
(14) 15:45 - 16:10
Error Probability of Information and Position Estimation of Mobile Optical Transmitter using Viterbi Algorithm
Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
(15) 16:10 - 16:35
Construction of multiple error correcting WOM-Code
Hidetoshi Utsunomiya, Hiroshi Kamabe (Gifu Univ.)
(16) 16:35 - 17:00
Estimation of Block Orthogonal Modulation with Cyclostationarity
Takafumi Kinugasa, Ikuo Oka, Shingo Ata (Osaka City Univ.)
(17) 17:00 - 17:25
Error Exponents of Linear Codes for Slepian-Wolf Source Coding
Tomohiko Uyematsu (Tokyo Inst. Tech.)
----------------------------------------
Thu, Mar 1 (10:30 - 12:10)
----------------------------------------
(18) 10:30 - 10:55
Adjacent Channel Interference Cancellation using Orthogonal Precoding for Fractional Sampling OFDM Receiver
Eisuke Sakai, Haruki Nishimura, Mamiko Inamori, Yukitoshi Sanada (Keio Univ.)
(19) 10:55 - 11:20
A Study on Single-RF Diversity Using Multiple Element ESPAR Antenna for IEEE 802.15.4
Yudai Katsuda, Minoru Okada (NAIST)
(20) 11:20 - 11:45
Prototype of Ultra Wideband-based Wireless Body Area Networks
-- Consideration of CAP and CFP slots allocation in human walking motion --
Yuichiro Takei, Hiroki Katsuta (Meiji Univ.), Kenichi Takizawa (NICT), Tetsushi Ikegami (Meiji Univ.), Kiyoshi Hamaguchi (NICT)
(21) 11:45 - 12:10
Proposal of Green Receive Diversity Using White-spaces
-- Receive Diversity with ESPAR Antenna Using Arbitrary Frequency Band --
Masato Saito, Wataru Arita (Ryukyu Univ.)
----- Lunch Break ( 80 min. ) -----
----------------------------------------
Fri, Mar 2 (09:00 - 17:50)
----------------------------------------
(22) 09:00 - 09:25
Searchable Symmetric Encryption with small information leakage in index update
Toshinori Araki (NEC)
(23) 09:25 - 09:50
Software Implementation of Privacy Preserving Statistical Computations based on Homomorphic Encryption
Toshiyuki Isshiki, Satoshi Obana, Kengo Mori (NEC)
(24) 09:50 - 10:15
Improved Left-to-Right Scalar Multiplication Algorithms
Atsuko Miyaji, Yiren Mo (JAIST)
----- Break ( 35 min. ) -----
(25) 10:50 - 11:15
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.)
(26) 11:15 - 11:40
Properties of Public-Keys for Knapsack Cryptosystems and the Low-density Attack
Shogo Takai, Akira Hayashi (KIT)
(27) 11:40 - 12:05
Computer experiments on Shamir's attack against knapsack cryptosystems
Jun Hashimoto, Akira Hayashi (KIT)
----- Lunch Break ( 80 min. ) -----
(28) 13:25 - 14:25
[Invited Talk]
Information Theoretically Secure Secret Key Agreement
Shun Watanabe (Univ. Tokushima), Ryutaroh Matsumoto, Tomohiko Uyematsu (TITECH)
(29) 14:25 - 15:25
[Invited Talk]
Physical Attacks and Countermeasures on Cryptographic Devices
Akashi Satoh (AIST)
(30) 15:25 - 16:25
[Invited Talk]
Human Activity Sensing Using Radio Waves for Safe and Secure Life
Tomoaki Ohtsuki (Keio Univ.)
----- Break ( 10 min. ) -----
(31) 16:35 - 17:00
Secure Tabular Data Analysis Allowing Partial Disclosure of Statistics
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.)
(32) 17:00 - 17:25
Image Authentication Based on Interleaving and Cyclic Hamming Code
Hiroaki Fujimoto, Ryuji Hamabe (FIT)
(33) 17:25 - 17:50
A New Watermarking Method with Block Diffusion and Biased-Chirp Transformation
Kazuo Ohzeki, Yuan-Yu Wei, Mao Kuraki, Yutaka Hirakawa (SIT), Kiyotsugu Sato (CIT)
----------------------------------------
Fri, Mar 2 (09:00 - 17:50)
----------------------------------------
(34) 09:00 - 09:25
Healthcare Telemonitoring System by Relay-Assisted Communications in 400MHz band
Kenichi Takizawa, Ryu Miura (NICT)
(35) 09:25 - 09:50
Study on RAKE Reception using Multicarrier Template Waveform in UWB-IR System
Junpei Ohno, Kohei Ohno, Makoto Itami (TUS)
(36) 09:50 - 10:15
Transmission Performance Improvement with Dynamic Channel Allocation in MU-MIMO Systems
Toshiro Nakahira, Hidekazu Murata, Susumu Yoshida, Koji Yamamoto (Kyoto Univ.), Daisuke Umehara (Kyoto Tech.), Satoshi Denno (Okayama Univ.), Masahiro Morikura (Kyoto Univ.)
----- Break ( 35 min. ) -----
(37) 10:50 - 11:40
[Invited Talk]
Trends, Technical and Regulatory Problems, and Standardization for Commercialization of Wireless Power Transmission Technologies
Hiroki Shoki (Toshiba)
----- Lunch Break ( 80 min. ) -----
----- Break -----
(38) 16:35 - 17:00
A note on separation conditions of source and channel coding for sources with two-output terminal and channels with two-input and one-output terminals
Ken-ichi Iwata, Nobu Mori (Univ. of Fukui)
(39) 17:00 - 17:25
A Note on Cyclic-Equivalent Codewords for Constant-Weight Codes from Cyclic Difference Sets
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.)
(40) 17:25 - 17:50
Theoretical analysis of bit error probability for punctured convolutional codes
Hideki Yoshikawa (Tohoku Gakuin Univ.)
# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
# CONFERENCE SPONSORS:
- This conference is co-sponsored by IEEE IT Society Japan Chapter.
=== Technical Committee on Wideband System (WBS) ===
# FUTURE SCHEDULE:
Thu, May 24, 2012 - Fri, May 25, 2012: Iwate Prefectural University [Mon, Mar 12], Topics: Coding, Modulation, Signal Processing and others.
# SECRETARY:
Nobuyoshi Komuro (Chiba University)
TEL/FAX: +81-43-290-3274
E-mail: kmrfultyba-u
=== Technical Committee on Information Theory (IT) ===
# FUTURE SCHEDULE:
Fri, May 25, 2012: [Mon, Mar 12]
# SECRETARY:
E-mail:it-c(to IT Secretaries)
.
Hiroki Koga (University of Tsukuba)
Motohiko Isaka (Kwansei Gakuin University)
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Fri, May 18, 2012: Kikai-Shinko-Kaikan Bldg. [Mon, Mar 12]
# SECRETARY:
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-mail: ic-c (to ISEC secretaries)
Last modified: 2012-02-28 14:05:59
|
Notification: Mail addresses are partially hidden against SPAM.
|