Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.) IT2010-88 ISEC2010-92 WBS2010-67 |
In this paper, the frame error rate performance (FER) of Unequal-Power-Allocation-Typed (UPA) turbo code on relay channe... [more] |
IT2010-88 ISEC2010-92 WBS2010-67 pp.123-126 |
ISEC, IT, WBS |
2011-03-03 16:10 |
Osaka |
Osaka University |
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.) IT2010-89 ISEC2010-93 WBS2010-68 |
[more] |
IT2010-89 ISEC2010-93 WBS2010-68 pp.127-130 |
ISEC, IT, WBS |
2011-03-03 16:35 |
Osaka |
Osaka University |
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2010-90 ISEC2010-94 WBS2010-69 |
In this paper, N-CSK (N parallel Codes Shift Keying) using modified pseudo orthogonal M-sequence sets (MPOMS) for applyi... [more] |
IT2010-90 ISEC2010-94 WBS2010-69 pp.131-135 |
ISEC, IT, WBS |
2011-03-03 17:00 |
Osaka |
Osaka University |
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.) IT2010-91 ISEC2010-95 WBS2010-70 |
In this paper, an MPPM-PSM scheme, that is a fusion of the Multi-pulse Pulse Position Modulation(MPPM) scheme and the Pu... [more] |
IT2010-91 ISEC2010-95 WBS2010-70 pp.137-142 |
ISEC, IT, WBS |
2011-03-04 09:00 |
Osaka |
Osaka University |
Construction of non-hyperelliptic coverings for elliptic curves on extension fields Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2010-92 ISEC2010-96 WBS2010-71 |
The GHS attack transfers the discrete logarithm problem(DLP) in the group of rational points of an elliptic curve over a... [more] |
IT2010-92 ISEC2010-96 WBS2010-71 pp.143-150 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72 |
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] |
IT2010-93 ISEC2010-97 WBS2010-72 pp.151-157 |
ISEC, IT, WBS |
2011-03-04 09:50 |
Osaka |
Osaka University |
Proposition of precomputation schemes considering memory Taiki Sasahara, Atsuko Miyaji (JAIST) IT2010-94 ISEC2010-98 WBS2010-73 |
Elliptic Curve Cryptography (ECC) attract attention as a effective Public Key Cryptography. A central arithmetic on EC... [more] |
IT2010-94 ISEC2010-98 WBS2010-73 pp.159-166 |
ISEC, IT, WBS |
2011-03-04 10:25 |
Osaka |
Osaka University |
Performance Evaluations of Robust Group Key Exchange Protocols Takashi Sato, Atsuko Miyaji (JAIST) IT2010-95 ISEC2010-99 WBS2010-74 |
Group Key Exchange (GKE) allows a large group of $n$ parties to share a common secret key over insecure channels.
As t... [more] |
IT2010-95 ISEC2010-99 WBS2010-74 pp.167-175 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
Verification Points of Security Against a Passive Attack for Key Exchange Protocols Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75 |
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] |
IT2010-96 ISEC2010-100 WBS2010-75 pp.177-184 |
ISEC, IT, WBS |
2011-03-04 11:15 |
Osaka |
Osaka University |
Improved POSH scheme using hash chains among sensors Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.) IT2010-97 ISEC2010-101 WBS2010-76 |
In wireless sensor networks, WSNs, it is important to evaluate resistance against adversary. Posh
scheme was proposed ... [more] |
IT2010-97 ISEC2010-101 WBS2010-76 pp.185-190 |
ISEC, IT, WBS |
2011-03-04 13:25 |
Osaka |
Osaka University |
An anomaly detection method using gamma-divergence and its application to system call sequence Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.) IT2010-98 ISEC2010-102 WBS2010-77 |
Nowadays, damage by malwares is increasing. In this paper, we discuss anomaly detection by machine learning and its appl... [more] |
IT2010-98 ISEC2010-102 WBS2010-77 pp.191-197 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback Ryo Nojima (NICT), Youki Kadobayashi (NAIST) IT2010-99 ISEC2010-103 WBS2010-78 |
In this paper, we consider the oblivious symmetric key encryption protocol
and its application to the {\em privacy-pres... [more] |
IT2010-99 ISEC2010-103 WBS2010-78 pp.199-203 |
ISEC, IT, WBS |
2011-03-04 14:15 |
Osaka |
Osaka University |
A Note on serviceability between personal certificate and server sertificate on PKI Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST) IT2010-100 ISEC2010-104 WBS2010-79 |
[more] |
IT2010-100 ISEC2010-104 WBS2010-79 pp.205-212 |
ISEC, IT, WBS |
2011-03-04 14:55 |
Osaka |
Osaka University |
User Authentication Using Neural Network Based on Keystroke Characteristics Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80 |
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more] |
IT2010-101 ISEC2010-105 WBS2010-80 pp.213-220 |
ISEC, IT, WBS |
2011-03-04 15:20 |
Osaka |
Osaka University |
Robust image hashing against geometric attacks using image normalization and SVD decomposition Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX) IT2010-102 ISEC2010-106 WBS2010-81 |
This paper uses SVD decomposition and image normalization algorithm to generate a hash value of a digital image. SVD dec... [more] |
IT2010-102 ISEC2010-106 WBS2010-81 pp.221-226 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Visual Card Games for Boys and Girls Miyuki Uno, Mikio Kano (Ibaraki Univ.) IT2010-103 ISEC2010-107 WBS2010-82 |
We propose a new visual card game for two parties
$\mathcal{X}$ and $\mathcal{Y}$ of boys and girls, respectively.
In ... [more] |
IT2010-103 ISEC2010-107 WBS2010-82 pp.227-234 |
ISEC, IT, WBS |
2011-03-04 09:00 |
Osaka |
Osaka University |
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo) IT2010-104 ISEC2010-108 WBS2010-83 |
For the PPM data compression algorithm, several methods have been proposed to estimate the ESC probability, where ESC re... [more] |
IT2010-104 ISEC2010-108 WBS2010-83 pp.235-242 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech) IT2010-105 ISEC2010-109 WBS2010-84 |
In the grammar based code proposed by Kieffer and Yang, a context-free grammar which only produces the input sequence is... [more] |
IT2010-105 ISEC2010-109 WBS2010-84 pp.243-248 |
ISEC, IT, WBS |
2011-03-04 09:50 |
Osaka |
Osaka University |
A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure
-- When Both Discrete and Continuous Data are Present -- Joe Suzuki (Osaka Univ.) IT2010-106 ISEC2010-110 WBS2010-85 |
We propose the MDL principle without assuming the source to be discrete.
As an application, we consider estimation of B... [more] |
IT2010-106 ISEC2010-110 WBS2010-85 pp.249-254 |
ISEC, IT, WBS |
2011-03-04 10:25 |
Osaka |
Osaka University |
Error exponent for channel coding with noisy feedback and bin coding Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo) IT2010-107 ISEC2010-111 WBS2010-86 |
The error exponent of the forward channel can be increased if a feedback channel is available.
We proposed a generalize... [more] |
IT2010-107 ISEC2010-111 WBS2010-86 pp.255-262 |