IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
15:10
Hokkaido Hokkaido Jichiro Kaikan Extended $k^m$-anonymity for randomization
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
pp.255-260
ICD, HWS [detail] 2020-10-26
13:50
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
pp.48-53
LOIS 2013-03-07
14:50
Okinawa   Improved Algorithms for Computing Relational Algebra Operators for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT) LOIS2012-82
We propose algorithms that efficiently computes relational algebra operations over secure function evaluation. Relationa... [more] LOIS2012-82
pp.77-82
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
14:45
Hokkaido   A Batch Mapping Algorithm for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT) ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28
We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function ev... [more] ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28
pp.195-199
LOIS 2012-03-09
13:30
Okinawa Meio Univ. Privacy preserving medical data analysis using a secure function evaluation system
Koki Hamada (NTT), Shigeki Ohtake (Kanazawa Univ.), Dai Ikarashi (NTT), Daichi Takenouchi (NTT-AT), Koji Chida, Hitoshi Fuji, Katsumi Takahashi, Setsuko Murata, Fusayoshi Kumada (NTT) LOIS2011-102
In clinical study, the personal information of patients is analyzed.Since the personal information is highly sensitive, ... [more] LOIS2011-102
pp.177-181
ISEC 2009-09-25
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Bit-Decomposition Protocol Using the Baby-Step-Giant-Step Algorithm
Koji Chida, Dai Ikarashi, Katsumi Takahashi (NTT) ISEC2009-41
 [more] ISEC2009-41
pp.9-14
IT, ISEC, WBS 2007-03-16
08:55
Gunma Gunma Univ. (Kiryu Campus) On a Secure Function Evaluation for Comparator Networks
Koji Chida (NTT), Hiroaki Kikuchi (Tokai Univ.), Gembu Morohashi, Keiichi Hirota (NTT)
 [more] IT2006-94 ISEC2006-149 WBS2006-91
pp.53-58
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:20
Okayama Okayama Univ. Batch Processing of Interactive Proofs
Tsuyoshi Yamamoto, Koji Chida (NTT)
 [more] ISEC2006-25 SITE2006-22
pp.119-124
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:45
Okayama Okayama Univ. Efficient Implementation of Secure Circuit Evaluation Using Batch Processing
Koji Chida, Tsuyoshi Yamamoto (NTT)
 [more] ISEC2006-26 SITE2006-23
pp.125-132
SITE 2006-02-23
10:55
Tokyo Univ. of Elecro. Comminucation A note on anonymity, pseudonymity, identity in decentralized
Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai (NTT)
 [more] SITE2005-53
pp.7-12
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:25
Iwate Iwate Prefectural University Partially Blind Signatures with Traceability
Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT)
Until now, it is not sufficiently discussed about how to construct a provably secure ``partially blind signature with tr... [more] ISEC2005-32 SITE2005-30
pp.173-178
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:10
Iwate Iwate Prefectural University On a secure circuit evaluation protocol using ElGamal encryption
Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT)
 [more] ISEC2005-47
pp.33-40
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan