Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, EMM |
2022-05-18 10:50 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Binarized Neural Networks and Trainable ISTA based Signature Code with Channel Estimation for Multiple Access Rayleigh Fading Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.) IT2022-10 EMM2022-10 |
User Identification (UI) and Channel Estimation (CE) schemes are essential issues in wireless networks with massive user... [more] |
IT2022-10 EMM2022-10 pp.50-55 |
EMM |
2022-03-08 10:50 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
Improve Method of Signature Classification with Machine Learning on Poor Written Environment Daiki Goto, Ryuya Uda (Tokyo Univ. of Tech. Graduate School) EMM2021-113 |
In the real world, it is difficult to obtain characteristics such as the angle or the pressure of the pen. And there is ... [more] |
EMM2021-113 pp.112-117 |
RCS, SIP, IT |
2022-01-20 10:30 |
Online |
Online |
Signature Code Designed by Binarized Neural Networks Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.) IT2021-34 SIP2021-42 RCS2021-202 |
In multi-user communication systems, user identification and channel estimation scheme depending on signature code are i... [more] |
IT2021-34 SIP2021-42 RCS2021-202 pp.34-39 |
IT |
2020-07-16 11:20 |
Online |
Online |
User Identification and Channel Estimation by Iterative DNN-Based Decoder on Multiple-Access Fading Channel Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.), Jun Cheng (Doshisha Univ.) IT2020-12 |
The user identification scheme for multiple-access fading channel based on the random generated (0,1,-1)-signature code ... [more] |
IT2020-12 pp.7-12 |
IT, ISEC, WBS |
2019-03-07 12:10 |
Tokyo |
University of Electro-Communications |
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings. Kaoru Takemure, Bagus Santoso (UEC) IT2018-81 ISEC2018-87 WBS2018-82 |
Most identification schemes based on the hardness of ideal lattice problems are built upon the Ring-SIS or Ring-LWE prob... [more] |
IT2018-81 ISEC2018-87 WBS2018-82 pp.39-44 |
ISEC |
2017-09-04 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46 |
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] |
ISEC2017-46 pp.35-42 |
EMM, IT |
2017-05-23 11:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Digital signature type QR code with personal identification function Ken-ichi Sakina (QR Tech.) IT2017-11 EMM2017-11 |
In this study, we propose a digital signature type QR code (DSQR code) that incorporates an elliptic curve digital signa... [more] |
IT2017-11 EMM2017-11 pp.61-66 |
EMT, IEE-EMT |
2015-10-29 15:25 |
Miyazaki |
Holiday Inn ANA Resort Miyazaki |
Radar signal processing based on a state transition model and its application to target identification Masahiko Nishimoto (Kumamoto Univ.) EMT2015-66 |
This report discusses an approach for radar target classification and identification using multi-aspect radar data. Firs... [more] |
EMT2015-66 pp.115-118 |
IN, NS, CS, NV (Joint) |
2015-09-04 10:35 |
Iwate |
Iwate-ken Kokaido |
[Encouragement Talk]
Identification of Mobile Applications via In-Network Machine Learning Using N-gram for Application-Specific Traffic Control Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2015-78 |
Identifying the application transmitting a given flow of network traffic is beneficial for network management, especiall... [more] |
NS2015-78 pp.41-46 |
ISEC, LOIS |
2013-11-29 13:05 |
Miyagi |
Tohoku Univ. |
A Lossy Identification Scheme from the Subgroup Decision Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34 |
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] |
ISEC2013-68 LOIS2013-34 pp.57-63 |
RCS, SR, SRW (Joint) |
2013-02-27 15:15 |
Tokyo |
Waseda Univ. |
Improvement on Specific Emitter Identification by Nonlinear Control in Baseband Satoshi Aoki, Yohtaro Umeda, Yusuke Kozawa (Tokyo Univ. of Science), Osamu Takyu (Shinshu Univ.) SR2012-90 |
This paper presents the deliberation about nonlinear estimation for specific emitter identification (SEI) in IEEE802.11a... [more] |
SR2012-90 pp.39-44 |
ISEC |
2012-09-21 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) ISEC2012-51 |
The Fiat-Shamir heuristic is a well-known technique for converting commitment-challenge-response identification schemes ... [more] |
ISEC2012-51 p.39 |
ET |
2012-06-23 16:10 |
Aichi |
|
A discussion on an examinee authentication method based on features of writing and character Haruki Kanamori (Tokyo Univ. of Science), Takehiro Furuta (Nara Univ. education), Takahito Tomoto, Takako Akakura (Tokyo Univ. of Science) ET2012-18 |
It is easy for examinees to cheating and spoofing taking a test by e-Testing. We think it is necessary to prevent them. ... [more] |
ET2012-18 pp.29-34 |
LOIS |
2012-03-09 12:50 |
Okinawa |
Meio Univ. |
A proposed method for authority transfer using mobile-phones Kimihiro Yamakoshi, Hideaki Yamamoto, Tetsushi Morita, Takeshi Suganuma (NTT) LOIS2011-100 |
We propose an authentication method for personal identification using a smart-phone utilizing a personal identification ... [more] |
LOIS2011-100 pp.165-170 |
SANE |
2011-10-19 10:15 |
Overseas |
Udayana University, Bali, Indonesia |
Assessment of Variability in Target Scattering Mechanism Contribution in SAR Polarimetric Decomposition Bindi Pradip Shastri (CEPT University), Ram Lal Mehta, Dr. Shiv Mohan (SAC, ISRO), Professor Anjana Vyas (CEPT University) SANE2011-111 |
In the present study, full polarimetric L-band ALOS PALSAR cata covering parts of Nagaur distric in Rajasthan, has been ... [more] |
SANE2011-111 pp.259-268 |
ISEC |
2011-09-09 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A proposal of identification system using mobile phone Kimihiro Yamakoshi, Hideaki Yamamoto, Tetsushi Morita, Takeshi Suganuma (NTT) ISEC2011-29 |
A personal identification system with IC-card is introduced in a local government and used for making important public d... [more] |
ISEC2011-29 pp.17-24 |
IT, ISEC, WBS |
2010-03-04 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55 |
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] |
IT2009-76 ISEC2009-84 WBS2009-55 pp.31-38 |
IT, ISEC, WBS |
2010-03-04 11:40 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Construction of secure Group Identification based on Digital Signature Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56 |
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more] |
IT2009-77 ISEC2009-85 WBS2009-56 pp.39-43 |
CAS |
2010-01-28 15:00 |
Kyoto |
Kyoudai-Kaikan Bldg. |
User keystroke identification among small reference data by large personal data Yoshihiro Kaneko (Gifu Univ.) CAS2009-68 |
User keystroke authentication research has been done for decades and some methods have been proposed and validated. For ... [more] |
CAS2009-68 pp.25-30 |
IN, NS (Joint) |
2009-03-04 11:30 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A proposal of new ID base identification Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IN2008-172 |
Kurosawa and Heng proposed a transformation from digital signature scheme to identity-based(ID-based) identification sch... [more] |
IN2008-172 pp.237-241 |