IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, EMM 2022-05-18
10:50
Gifu Gifu University
(Primary: On-site, Secondary: Online)
Binarized Neural Networks and Trainable ISTA based Signature Code with Channel Estimation for Multiple Access Rayleigh Fading
Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.) IT2022-10 EMM2022-10
User Identification (UI) and Channel Estimation (CE) schemes are essential issues in wireless networks with massive user... [more] IT2022-10 EMM2022-10
pp.50-55
EMM 2022-03-08
10:50
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
Improve Method of Signature Classification with Machine Learning on Poor Written Environment
Daiki Goto, Ryuya Uda (Tokyo Univ. of Tech. Graduate School) EMM2021-113
In the real world, it is difficult to obtain characteristics such as the angle or the pressure of the pen. And there is ... [more] EMM2021-113
pp.112-117
RCS, SIP, IT 2022-01-20
10:30
Online Online Signature Code Designed by Binarized Neural Networks
Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.) IT2021-34 SIP2021-42 RCS2021-202
In multi-user communication systems, user identification and channel estimation scheme depending on signature code are i... [more] IT2021-34 SIP2021-42 RCS2021-202
pp.34-39
IT 2020-07-16
11:20
Online Online User Identification and Channel Estimation by Iterative DNN-Based Decoder on Multiple-Access Fading Channel
Lantian Wei, Shan Lu, Hiroshi Kamabe (Gifu Univ.), Jun Cheng (Doshisha Univ.) IT2020-12
The user identification scheme for multiple-access fading channel based on the random generated (0,1,-1)-signature code ... [more] IT2020-12
pp.7-12
IT, ISEC, WBS 2019-03-07
12:10
Tokyo University of Electro-Communications Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.
Kaoru Takemure, Bagus Santoso (UEC) IT2018-81 ISEC2018-87 WBS2018-82
Most identification schemes based on the hardness of ideal lattice problems are built upon the Ring-SIS or Ring-LWE prob... [more] IT2018-81 ISEC2018-87 WBS2018-82
pp.39-44
ISEC 2017-09-04
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings
Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] ISEC2017-46
pp.35-42
EMM, IT 2017-05-23
11:30
Yamagata Yamagata University(Yonezawa Campus) Digital signature type QR code with personal identification function
Ken-ichi Sakina (QR Tech.) IT2017-11 EMM2017-11
In this study, we propose a digital signature type QR code (DSQR code) that incorporates an elliptic curve digital signa... [more] IT2017-11 EMM2017-11
pp.61-66
EMT, IEE-EMT 2015-10-29
15:25
Miyazaki Holiday Inn ANA Resort Miyazaki Radar signal processing based on a state transition model and its application to target identification
Masahiko Nishimoto (Kumamoto Univ.) EMT2015-66
This report discusses an approach for radar target classification and identification using multi-aspect radar data. Firs... [more] EMT2015-66
pp.115-118
IN, NS, CS, NV
(Joint)
2015-09-04
10:35
Iwate Iwate-ken Kokaido [Encouragement Talk] Identification of Mobile Applications via In-Network Machine Learning Using N-gram for Application-Specific Traffic Control
Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2015-78
Identifying the application transmitting a given flow of network traffic is beneficial for network management, especiall... [more] NS2015-78
pp.41-46
ISEC, LOIS 2013-11-29
13:05
Miyagi Tohoku Univ. A Lossy Identification Scheme from the Subgroup Decision
Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] ISEC2013-68 LOIS2013-34
pp.57-63
RCS, SR, SRW
(Joint)
2013-02-27
15:15
Tokyo Waseda Univ. Improvement on Specific Emitter Identification by Nonlinear Control in Baseband
Satoshi Aoki, Yohtaro Umeda, Yusuke Kozawa (Tokyo Univ. of Science), Osamu Takyu (Shinshu Univ.) SR2012-90
This paper presents the deliberation about nonlinear estimation for specific emitter identification (SEI) in IEEE802.11a... [more] SR2012-90
pp.39-44
ISEC 2012-09-21
14:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT) ISEC2012-51
The Fiat-Shamir heuristic is a well-known technique for converting commitment-challenge-response identification schemes ... [more] ISEC2012-51
p.39
ET 2012-06-23
16:10
Aichi   A discussion on an examinee authentication method based on features of writing and character
Haruki Kanamori (Tokyo Univ. of Science), Takehiro Furuta (Nara Univ. education), Takahito Tomoto, Takako Akakura (Tokyo Univ. of Science) ET2012-18
It is easy for examinees to cheating and spoofing taking a test by e-Testing. We think it is necessary to prevent them. ... [more] ET2012-18
pp.29-34
LOIS 2012-03-09
12:50
Okinawa Meio Univ. A proposed method for authority transfer using mobile-phones
Kimihiro Yamakoshi, Hideaki Yamamoto, Tetsushi Morita, Takeshi Suganuma (NTT) LOIS2011-100
We propose an authentication method for personal identification using a smart-phone utilizing a personal identification ... [more] LOIS2011-100
pp.165-170
SANE 2011-10-19
10:15
Overseas Udayana University, Bali, Indonesia Assessment of Variability in Target Scattering Mechanism Contribution in SAR Polarimetric Decomposition
Bindi Pradip Shastri (CEPT University), Ram Lal Mehta, Dr. Shiv Mohan (SAC, ISRO), Professor Anjana Vyas (CEPT University) SANE2011-111
In the present study, full polarimetric L-band ALOS PALSAR cata covering parts of Nagaur distric in Rajasthan, has been ... [more] SANE2011-111
pp.259-268
ISEC 2011-09-09
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. A proposal of identification system using mobile phone
Kimihiro Yamakoshi, Hideaki Yamamoto, Tetsushi Morita, Takeshi Suganuma (NTT) ISEC2011-29
A personal identification system with IC-card is introduced in a local government and used for making important public d... [more] ISEC2011-29
pp.17-24
IT, ISEC, WBS 2010-03-04
11:15
Nagano Nagano-Engineering Campus, Shinshu University A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] IT2009-76 ISEC2009-84 WBS2009-55
pp.31-38
IT, ISEC, WBS 2010-03-04
11:40
Nagano Nagano-Engineering Campus, Shinshu University Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more]
IT2009-77 ISEC2009-85 WBS2009-56
pp.39-43
CAS 2010-01-28
15:00
Kyoto Kyoudai-Kaikan Bldg. User keystroke identification among small reference data by large personal data
Yoshihiro Kaneko (Gifu Univ.) CAS2009-68
User keystroke authentication research has been done for decades and some methods have been proposed and validated. For ... [more] CAS2009-68
pp.25-30
IN, NS
(Joint)
2009-03-04
11:30
Okinawa Okinawa-Zanpamisaki Royal Hotel A proposal of new ID base identification
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IN2008-172
Kurosawa and Heng proposed a transformation from digital signature scheme to identity-based(ID-based) identification sch... [more] IN2008-172
pp.237-241
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan