IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2010)

Search Results: Keywords 'from:2011-03-03 to:2011-03-03'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 62 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel
Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.) IT2010-88 ISEC2010-92 WBS2010-67
In this paper, the frame error rate performance (FER) of Unequal-Power-Allocation-Typed (UPA) turbo code on relay channe... [more] IT2010-88 ISEC2010-92 WBS2010-67
pp.123-126
ISEC, IT, WBS 2011-03-03
16:10
Osaka Osaka University Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences
Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.) IT2010-89 ISEC2010-93 WBS2010-68
 [more] IT2010-89 ISEC2010-93 WBS2010-68
pp.127-130
ISEC, IT, WBS 2011-03-03
16:35
Osaka Osaka University A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2010-90 ISEC2010-94 WBS2010-69
In this paper, N-CSK (N parallel Codes Shift Keying) using modified pseudo orthogonal M-sequence sets (MPOMS) for applyi... [more] IT2010-90 ISEC2010-94 WBS2010-69
pp.131-135
ISEC, IT, WBS 2011-03-03
17:00
Osaka Osaka University Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications
Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.) IT2010-91 ISEC2010-95 WBS2010-70
In this paper, an MPPM-PSM scheme, that is a fusion of the Multi-pulse Pulse Position Modulation(MPPM) scheme and the Pu... [more] IT2010-91 ISEC2010-95 WBS2010-70
pp.137-142
ISEC, IT, WBS 2011-03-04
09:00
Osaka Osaka University Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2010-92 ISEC2010-96 WBS2010-71
The GHS attack transfers the discrete logarithm problem(DLP) in the group of rational points of an elliptic curve over a... [more] IT2010-92 ISEC2010-96 WBS2010-71
pp.143-150
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] IT2010-93 ISEC2010-97 WBS2010-72
pp.151-157
ISEC, IT, WBS 2011-03-04
09:50
Osaka Osaka University Proposition of precomputation schemes considering memory
Taiki Sasahara, Atsuko Miyaji (JAIST) IT2010-94 ISEC2010-98 WBS2010-73
Elliptic Curve Cryptography (ECC) attract attention as a effective Public Key Cryptography. A central arithmetic on EC... [more] IT2010-94 ISEC2010-98 WBS2010-73
pp.159-166
ISEC, IT, WBS 2011-03-04
10:25
Osaka Osaka University Performance Evaluations of Robust Group Key Exchange Protocols
Takashi Sato, Atsuko Miyaji (JAIST) IT2010-95 ISEC2010-99 WBS2010-74
Group Key Exchange (GKE) allows a large group of $n$ parties to share a common secret key over insecure channels.
As t... [more]
IT2010-95 ISEC2010-99 WBS2010-74
pp.167-175
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] IT2010-96 ISEC2010-100 WBS2010-75
pp.177-184
ISEC, IT, WBS 2011-03-04
11:15
Osaka Osaka University Improved POSH scheme using hash chains among sensors
Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.) IT2010-97 ISEC2010-101 WBS2010-76
In wireless sensor networks, WSNs, it is important to evaluate resistance against adversary. Posh
scheme was proposed ... [more]
IT2010-97 ISEC2010-101 WBS2010-76
pp.185-190
ISEC, IT, WBS 2011-03-04
13:25
Osaka Osaka University An anomaly detection method using gamma-divergence and its application to system call sequence
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.) IT2010-98 ISEC2010-102 WBS2010-77
Nowadays, damage by malwares is increasing. In this paper, we discuss anomaly detection by machine learning and its appl... [more] IT2010-98 ISEC2010-102 WBS2010-77
pp.191-197
ISEC, IT, WBS 2011-03-04
13:50
Osaka Osaka University Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) IT2010-99 ISEC2010-103 WBS2010-78
In this paper, we consider the oblivious symmetric key encryption protocol
and its application to the {\em privacy-pres... [more]
IT2010-99 ISEC2010-103 WBS2010-78
pp.199-203
ISEC, IT, WBS 2011-03-04
14:15
Osaka Osaka University A Note on serviceability between personal certificate and server sertificate on PKI
Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST) IT2010-100 ISEC2010-104 WBS2010-79
 [more] IT2010-100 ISEC2010-104 WBS2010-79
pp.205-212
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more]
IT2010-101 ISEC2010-105 WBS2010-80
pp.213-220
ISEC, IT, WBS 2011-03-04
15:20
Osaka Osaka University Robust image hashing against geometric attacks using image normalization and SVD decomposition
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX) IT2010-102 ISEC2010-106 WBS2010-81
This paper uses SVD decomposition and image normalization algorithm to generate a hash value of a digital image. SVD dec... [more] IT2010-102 ISEC2010-106 WBS2010-81
pp.221-226
ISEC, IT, WBS 2011-03-04
15:45
Osaka Osaka University Visual Card Games for Boys and Girls
Miyuki Uno, Mikio Kano (Ibaraki Univ.) IT2010-103 ISEC2010-107 WBS2010-82
We propose a new visual card game for two parties
$\mathcal{X}$ and $\mathcal{Y}$ of boys and girls, respectively.
In ... [more]
IT2010-103 ISEC2010-107 WBS2010-82
pp.227-234
ISEC, IT, WBS 2011-03-04
09:00
Osaka Osaka University An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation
Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo) IT2010-104 ISEC2010-108 WBS2010-83
For the PPM data compression algorithm, several methods have been proposed to estimate the ESC probability, where ESC re... [more] IT2010-104 ISEC2010-108 WBS2010-83
pp.235-242
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University A Practical Algorithm of Universal Source Coding by the Most Frequent Substring
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech) IT2010-105 ISEC2010-109 WBS2010-84
In the grammar based code proposed by Kieffer and Yang, a context-free grammar which only produces the input sequence is... [more] IT2010-105 ISEC2010-109 WBS2010-84
pp.243-248
ISEC, IT, WBS 2011-03-04
09:50
Osaka Osaka University A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure -- When Both Discrete and Continuous Data are Present --
Joe Suzuki (Osaka Univ.) IT2010-106 ISEC2010-110 WBS2010-85
We propose the MDL principle without assuming the source to be discrete.
As an application, we consider estimation of B... [more]
IT2010-106 ISEC2010-110 WBS2010-85
pp.249-254
ISEC, IT, WBS 2011-03-04
10:25
Osaka Osaka University Error exponent for channel coding with noisy feedback and bin coding
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo) IT2010-107 ISEC2010-111 WBS2010-86
The error exponent of the forward channel can be increased if a feedback channel is available.
We proposed a generalize... [more]
IT2010-107 ISEC2010-111 WBS2010-86
pp.255-262
 Results 21 - 40 of 62 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan