IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 64 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2014-09-05
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. Fail-Stop Signature Scheme with TTP and Its UC-Security
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] ISEC2014-49
pp.13-20
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:40
Hokkaido San-Refure Hakodate A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals
Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
pp.9-16
ISEC, IT, WBS 2014-03-11
11:00
Aichi Nagoya Univ., Higashiyama Campus A Note on Indistinguishability of Fail-Stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] IT2013-79 ISEC2013-108 WBS2013-68
pp.155-161
EMM 2014-03-07
15:00
Ishikawa JAIST [Poster Presentation] Compatible 2d-code having tamper detection system with QR-code
Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2013-106
pp.39-44
LOIS, ICM 2014-01-16
15:40
Nagasaki Nagasaki Museum of History and Culture A study on cooperation between the public sector and the private sector by utilizing the Public Certification Service for Individuals.
Kazushige Fujita, Takashi Obi, Chikahiro Miyokawa, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Inst. of Tech.) ICM2013-40 LOIS2013-44
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] ICM2013-40 LOIS2013-44
pp.29-34
BioX
(2nd)
2013-05-24
17:40
Toyama Toyama Prefectural University [Poster Presentation] Lazy Signature: A non-registered Digital Signature Using Biometrics
Yuta Yoneyama (Shizuoka Univ.), Kenta Takahashi (Hitachi Ltd.), Eisei Honbu, Masakatsu Nishigaki (Shizuoka Univ.)
The conventional digital signature is implemented and operated as the function of registered stamp or signature for digi... [more]
ISEC 2013-05-23
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking
Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) ISEC2013-4
When implementing advanced automotive services in cooperation with external data centers, it is very important to ensure... [more] ISEC2013-4
pp.23-28
EMM 2013-03-07
13:30
Kyoto   Information hiding for QR-code using Wet Paper Code
Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2012-107
pp.1-6
IT, ISEC, WBS 2013-03-07
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] IT2012-67 ISEC2012-85 WBS2012-53
pp.31-38
ICSS 2012-11-22
10:45
Hiroshima Miyajima Mori-no-Yado On Distribution of Certificate Revocation List Using Random Network Coding for VANET
Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] ICSS2012-45
pp.1-6
ICSS, IA 2012-06-21
14:55
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A Proposal of a Functional Extension Framework for Authn & Authz Federation Infrastructure using Web Browser Add-on
Toyokazu Akiyama (Kyoto Sangyo Univ.), Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura (NII) IA2012-3 ICSS2012-3
We have constructed an academic authn \& authz infrastructure by
using Web single sign-on in a community, named GakuNin... [more]
IA2012-3 ICSS2012-3
pp.13-18
ITS, WBS
(Joint)
2011-12-15
13:50
Nagasaki   Online/offline Authentication Protocol in Car to Car/Infrastructure Communication Systems
Eriko Ando, Hisayoshi Sato, Yasuko Fukuzawa (Hitachi) ITS2011-22
Services such as sending a pre-crash sensing warning and traffic condition warning are expected to be provided in car-to... [more] ITS2011-22
pp.13-18
ISEC, LOIS 2011-11-14
14:45
Osaka Osaka Electro-Communication University Hidden Pair of Bijection Signature system (2) -- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] ISEC2011-42 LOIS2011-36
pp.55-60
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] IT2010-71 ISEC2010-75 WBS2010-50
pp.23-30
ISEC, IT, WBS 2011-03-04
11:15
Osaka Osaka University Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-122 ISEC2010-126 WBS2010-101
This paper proposes a digital watermark method with maximum detection amplitude value of complex signature impulse.
Si... [more]
IT2010-122 ISEC2010-126 WBS2010-101
pp.361-366
ISEC, IT, WBS 2011-03-04
11:40
Osaka Osaka University Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-123 ISEC2010-127 WBS2010-102
This paper proposes an digital watermark method using extended smear-desmearing transform and high-pass filter.In this m... [more] IT2010-123 ISEC2010-127 WBS2010-102
pp.367-372
PRMU 2011-02-17
16:00
Saitama   Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features
Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] PRMU2010-216
pp.49-54
VLD 2010-09-27
16:30
Kyoto Kyoto Institute of Technology [Invited Talk] An Automatic Test Generation Framework for Digitally-Assisted Analog Circuit
Satoshi Komatsu, Mohamed Abbas (Univ. of Tokyo), Yasuo Furukawa (Advantest), Kunihiro Asada (Univ. of Tokyo) VLD2010-46
This paper presents a new analog ATPG (AATPG) framework that generates near-optimal test stimulus for the digitally-assi... [more] VLD2010-46
pp.25-30
ISEC 2010-09-10
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. On the Extension of Rank Attacks to MPKC
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more]
ISEC2010-44
pp.35-40
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:00
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
pp.107-112
 Results 21 - 40 of 64 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan