Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2012-03-01 10:30 |
Kanagawa |
|
A Clone Resistance Evaluation of Visible-Light Paper Artifact-Metrics Yuki Kondo, Yasuhiro Takeuchi, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.) IT2011-46 ISEC2011-73 WBS2011-47 |
Visible-light paper artifact-metric system is a type of authentication system using visible light patterns of paper as i... [more] |
IT2011-46 ISEC2011-73 WBS2011-47 pp.1-8 |
IT, ISEC, WBS |
2012-03-01 10:55 |
Kanagawa |
|
Object Verification System from Artifact-Metrics Based on Printed Ink Spread Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST) IT2011-47 ISEC2011-74 WBS2011-48 |
Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thin... [more] |
IT2011-47 ISEC2011-74 WBS2011-48 pp.9-13 |
IT, ISEC, WBS |
2012-03-01 11:20 |
Kanagawa |
|
A Method to Divide Application for Deterring Unauthorized Use by Outsourcee Satomi Honda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IT2011-48 ISEC2011-75 WBS2011-49 |
Cloud computing services in which users delegate the execution of their application software to cloud service providers ... [more] |
IT2011-48 ISEC2011-75 WBS2011-49 pp.15-22 |
IT, ISEC, WBS |
2012-03-01 11:45 |
Kanagawa |
|
Analysis of interdependency of information security in Japan Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.) IT2011-49 ISEC2011-76 WBS2011-50 |
In the economy, the activities of the Internet is essential in all
industrial sector.
Therefore, it is also necessar... [more] |
IT2011-49 ISEC2011-76 WBS2011-50 pp.23-29 |
IT, ISEC, WBS |
2012-03-01 13:30 |
Kanagawa |
|
Reducing the Message Size in Oblivious Automata Evaluation Yuji Watanabe, Takaaki Tateishi (IBM) IT2011-50 ISEC2011-77 WBS2011-51 |
[more] |
IT2011-50 ISEC2011-77 WBS2011-51 pp.31-35 |
IT, ISEC, WBS |
2012-03-01 13:55 |
Kanagawa |
|
Extension of Fuzzy Commitment Schemes Naoki Tani, Junji Shikata, Tsutomu Matsumoto (YNU) IT2011-51 ISEC2011-78 WBS2011-52 |
In this paper, we newly propose a model of fuzzy commitment schemes in which a secret-key can be used. The significance ... [more] |
IT2011-51 ISEC2011-78 WBS2011-52 pp.37-40 |
IT, ISEC, WBS |
2012-03-01 14:20 |
Kanagawa |
|
Consideration for IT-secure password protected secret sharing Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53 |
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] |
IT2011-52 ISEC2011-79 WBS2011-53 pp.41-43 |
IT, ISEC, WBS |
2012-03-01 15:20 |
Kanagawa |
|
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kobe Univ.) IT2011-53 ISEC2011-80 WBS2011-54 |
[more] |
IT2011-53 ISEC2011-80 WBS2011-54 pp.45-51 |
IT, ISEC, WBS |
2012-03-01 15:45 |
Kanagawa |
|
New Saturation Characteristics of HyRAL Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55 |
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] |
IT2011-54 ISEC2011-81 WBS2011-55 pp.53-60 |
IT, ISEC, WBS |
2012-03-01 10:30 |
Kanagawa |
|
Wyner-Ziv video coding with a quantizer using correlations between frames Michiaki Ohkawa, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech) IT2011-56 ISEC2011-83 WBS2011-57 |
Wyner-Ziv video coding is a video coding using information from neighbor frames at decoding with exploiting the correlat... [more] |
IT2011-56 ISEC2011-83 WBS2011-57 pp.67-72 |
IT, ISEC, WBS |
2012-03-01 10:55 |
Kanagawa |
|
Super-resolution using information-theoretic priori information of image histogram Shimpei Tanemori, Hiroyuki Kudo (Tsukuba Univ.) IT2011-57 ISEC2011-84 WBS2011-58 |
Image super-resolution techniques aim to reconstruct a high-resolution image from low-resolution ones. Conventional met... [more] |
IT2011-57 ISEC2011-84 WBS2011-58 pp.73-78 |
IT, ISEC, WBS |
2012-03-01 11:20 |
Kanagawa |
|
An Efficient Quadtree-based Image Coder with Predictive Set Partitioning Hidetoshi Imamura, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2011-58 ISEC2011-85 WBS2011-59 |
This paper describes an efficient wavelet coding algorithm based on quadtree partition. There are 2 main types of method... [more] |
IT2011-58 ISEC2011-85 WBS2011-59 pp.79-83 |
IT, ISEC, WBS |
2012-03-01 15:20 |
Kanagawa |
|
Error-Trellis Construction for Tailbiting Convolutional Codes Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) IT2011-59 ISEC2011-86 WBS2011-60 |
In this paper, we present an error-trellis construction for tailbiting convolutional codes. A tailbiting error-trellis i... [more] |
IT2011-59 ISEC2011-86 WBS2011-60 pp.85-90 |
IT, ISEC, WBS |
2012-03-01 15:45 |
Kanagawa |
|
Error Probability of Information and Position Estimation of Mobile Optical Transmitter using Viterbi Algorithm Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2011-60 ISEC2011-87 WBS2011-61 |
In free-space optical communications, such as intersatellite or satellite-earth station communication, a quadrant detect... [more] |
IT2011-60 ISEC2011-87 WBS2011-61 pp.91-94 |
IT, ISEC, WBS |
2012-03-01 16:10 |
Kanagawa |
|
Construction of multiple error correcting WOM-Code Hidetoshi Utsunomiya, Hiroshi Kamabe (Gifu Univ.) IT2011-61 ISEC2011-88 WBS2011-62 |
Memory devices on which data can be written only once are called write
once memories (WOM). A WOM code is a code which... [more] |
IT2011-61 ISEC2011-88 WBS2011-62 pp.95-100 |
IT, ISEC, WBS |
2012-03-01 16:35 |
Kanagawa |
|
Estimation of Block Orthogonal Modulation with Cyclostationarity Takafumi Kinugasa, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2011-62 ISEC2011-89 WBS2011-63 |
The modulation identifications is one of the key issues in the cognitive radio. Modulation identification and modulation... [more] |
IT2011-62 ISEC2011-89 WBS2011-63 pp.101-104 |
IT, ISEC, WBS |
2012-03-01 17:00 |
Kanagawa |
|
Error Exponents of Linear Codes for Slepian-Wolf Source Coding Tomohiko Uyematsu (Tokyo Inst. Tech.) IT2011-55 ISEC2011-82 WBS2011-56 |
The Slepian-Wolf coding problem is one of the most fundamental problems
in the area of multiterminal source coding. In ... [more] |
IT2011-55 ISEC2011-82 WBS2011-56 pp.61-66 |
IT, ISEC, WBS |
2012-03-01 10:30 |
Kanagawa |
|
Adjacent Channel Interference Cancellation using Orthogonal Precoding for Fractional Sampling OFDM Receiver Eisuke Sakai, Haruki Nishimura, Mamiko Inamori, Yukitoshi Sanada (Keio Univ.) IT2011-63 ISEC2011-90 WBS2011-64 |
[more] |
IT2011-63 ISEC2011-90 WBS2011-64 pp.105-110 |
IT, ISEC, WBS |
2012-03-01 10:55 |
Kanagawa |
|
A Study on Single-RF Diversity Using Multiple Element ESPAR Antenna for IEEE 802.15.4 Yudai Katsuda, Minoru Okada (NAIST) IT2011-64 ISEC2011-91 WBS2011-65 |
This paper presents improvement of reliability for spread spectrum receiver based on IEEE 802.15.4 standard. Since the c... [more] |
IT2011-64 ISEC2011-91 WBS2011-65 pp.111-115 |
IT, ISEC, WBS |
2012-03-01 11:20 |
Kanagawa |
|
Prototype of Ultra Wideband-based Wireless Body Area Networks
-- Consideration of CAP and CFP slots allocation in human walking motion -- Yuichiro Takei, Hiroki Katsuta (Meiji Univ.), Kenichi Takizawa (NICT), Tetsushi Ikegami (Meiji Univ.), Kiyoshi Hamaguchi (NICT) IT2011-65 ISEC2011-92 WBS2011-66 |
This paper presents the experimental evaluation of communication in human waking motion, using the MAC evaluation system... [more] |
IT2011-65 ISEC2011-92 WBS2011-66 pp.117-122 |