Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AP, SANE, SAT (Joint) |
2020-07-15 15:05 |
Online |
Online |
Numerical investigation on the application of polar codes to free-space quantum key distribution Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5 |
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] |
SAT2020-5 pp.13-18 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 10:40 |
Osaka |
I-Site Nanba(Osaka) |
[Poster Presentation]
A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 |
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] |
RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI) |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
LOIS |
2013-03-07 14:50 |
Okinawa |
|
Improved Algorithms for Computing Relational Algebra Operators for Secure Function Evaluation Koki Hamada, Dai Ikarashi, Koji Chida (NTT) LOIS2012-82 |
We propose algorithms that efficiently computes relational algebra operations over secure function evaluation. Relationa... [more] |
LOIS2012-82 pp.77-82 |
EMM |
2013-01-30 13:30 |
Miyagi |
Tohoku Univ. |
Speech Encryption Method Using Speech Segments for Speech Synthesis Minoru Kohata (Chiba Institute of Tech.) EMM2012-103 |
The risk of speech tapping by decryption attack has increased as a result of the increasing availability ofimmense compu... [more] |
EMM2012-103 pp.71-76 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 14:45 |
Hokkaido |
|
A Batch Mapping Algorithm for Secure Function Evaluation Koki Hamada, Dai Ikarashi, Koji Chida (NTT) ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 |
We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function ev... [more] |
ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 pp.195-199 |
EMM |
2012-03-16 10:00 |
Osaka |
|
Secure Speech Coding Method Using Speech Synthesis Minoru Kohata (Chiba Insutitute of Tech.) EMM2011-66 |
Several analog speech encryption methods were proposed so far. Nowadays, most of speech encryptionsystems employs digita... [more] |
EMM2011-66 pp.13-18 |
NLP |
2011-12-15 13:50 |
Aomori |
Iwaki Hall AB, Hirosaki Univ. |
Applicability of Augmented Lorenz Equations to Chaos-Based Secure Communications Kenichiro Cho, Takaya Miyano (Ritsumeikan Univ.) NLP2011-119 |
We have developed a chaotic gas turbine which simulates the dynamical behavior of turbulent Rayleigh-Bénard conve... [more] |
NLP2011-119 pp.13-18 |
RCS |
2011-06-23 11:50 |
Okinawa |
Ryukyu Univ. |
Personal modulation Eiji Okamoto (Nagoya Inst. Tech.) RCS2011-43 |
In this paper, we propose a use of the modulation as a personal identification in wireless communications. In multi-hop ... [more] |
RCS2011-43 pp.49-54 |
RCS, MoNA, SR (Joint) |
2011-03-04 10:00 |
Kanagawa |
YRP |
A chaos-based MIMO cooperative relay transmission scheme for secure communications Eiji Okamoto (Nagoya Inst. of Tech.) RCS2010-284 |
Recently, a cooperative communication is much studied as an effective diversity scheme on multihop transmission. Usually... [more] |
RCS2010-284 pp.205-210 |
NS, IN (Joint) |
2010-03-05 13:00 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
Communication Architecture Evolution that is enabled by Introducing Specific IP address for Each Session
-- Unified Multiplex -- Hiroshi Kitamura (NEC Corp./Univ. of Electro-Comm.), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.) IN2009-212 |
We have proposed a new communication architecture called “Unified Multiplex Communication Architecture.” Two new types o... [more] |
IN2009-212 pp.405-410 |
EMCJ |
2008-09-26 16:20 |
Osaka |
Osaka Univ. |
Spatially Separation of Propagation Areas Using Wireless Mesh Networks for Secure Wireless Communication Masataka Araki, Shinichi Miyamoto, Seiichi Sampei (Osaka Univ.) EMCJ2008-57 |
Secure communications against eavesdropper is oen of the important requirements in wireless networks, because the propag... [more] |
EMCJ2008-57 pp.43-48 |
IT |
2008-07-24 16:20 |
Chiba |
University of Tokyo, Kashiwa Campus |
[Invited Talk]
Information Security Schemes in Wireless Communications Based on Radio Propagation Characteristics Hideichi Sasaoka (Doshisha Univ.) IT2008-15 |
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] |
IT2008-15 pp.39-44 |
SR |
2008-01-24 15:20 |
Nagano |
Tateyama Prince hotel (Ohmachi city, Nagano prefecture) |
[Invited Talk]
Ad-Hoc Network and Digital Disaster Prevention Administrative Radio System Shiro Handa (Shinshu Univ.) SR2007-68 |
This presentation introduces the results of the study about Ad-hoc network and Disaster prevention administrative digita... [more] |
SR2007-68 p.23 |
EMCJ |
2007-09-21 14:50 |
Kyoto |
Doshisha University |
Electromagnetic Environment Control Techniques using Wireless Mesh Network System for Secure Wireless Communication Shinichi Miyamoto, Masataka Araki, Seiichi Sampei (Osaka Univ.) EMCJ2007-50 |
For construction of private ubiquitous smart space, how to flexibly introduce wireless communication would be the most c... [more] |
EMCJ2007-50 pp.43-48 |