IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2010)

Search Results: Keywords 'from:2011-03-03 to:2011-03-03'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 41 - 60 of 62 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University Rate-Splitting for Multiple Receiver Channels
Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.) IT2010-108 ISEC2010-112 WBS2010-87
Generalized time-sharing schemes, in which rate-splitting and successive decoding are used, have been developed for memo... [more] IT2010-108 ISEC2010-112 WBS2010-87
pp.263-269
ISEC, IT, WBS 2011-03-04
11:15
Osaka Osaka University Performance evaluation of MC-CDMA system which permits time and frequency offsets
Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.) IT2010-109 ISEC2010-113 WBS2010-88
In code division multiple access (CDMA) systems, spreading code is introduced as the third axis in addition
to the time... [more]
IT2010-109 ISEC2010-113 WBS2010-88
pp.271-276
ISEC, IT, WBS 2011-03-04
11:40
Osaka Osaka University Performance Evaluation of Non-binary LDPC Code with APSK Modulation
Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.) IT2010-110 ISEC2010-114 WBS2010-89
Non-binary LDPC codes are known to perform better than binary LDPC codes. On the other hand, the use of higher-order mod... [more] IT2010-110 ISEC2010-114 WBS2010-89
pp.277-282
ISEC, IT, WBS 2011-03-04
13:25
Osaka Osaka University Secure Multiplex Coding with a Common Message
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS) IT2010-111 ISEC2010-115 WBS2010-90
We determine the capacity region of the secure multiplex coding
with a common message, improve the exponent of mutual i... [more]
IT2010-111 ISEC2010-115 WBS2010-90
pp.283-287
ISEC, IT, WBS 2011-03-04
13:50
Osaka Osaka University A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2010-112 ISEC2010-116 WBS2010-91
A key distribution scheme (KDS) is a method of distributing secret keys in the network. In the conventional KDS, the sec... [more] IT2010-112 ISEC2010-116 WBS2010-91
pp.289-294
ISEC, IT, WBS 2011-03-04
14:15
Osaka Osaka University Dual universality of hash functions and its applications to quantum cryptography
Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS) IT2010-113 ISEC2010-117 WBS2010-92
 [more] IT2010-113 ISEC2010-117 WBS2010-92
pp.295-302
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.) IT2010-114 ISEC2010-118 WBS2010-93
In this paper, an extended version of Rashmi-Shah-Kumar Minimum Storage Regenerating(MSR) codes is proposed. In Rashmi-S... [more] IT2010-114 ISEC2010-118 WBS2010-93
pp.303-310
ISEC, IT, WBS 2011-03-04
15:20
Osaka Osaka University A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
Kazuya Koyano, Hiroki Koga (Tsukuba Univ.) IT2010-115 ISEC2010-119 WBS2010-94
 [more] IT2010-115 ISEC2010-119 WBS2010-94
pp.311-318
ISEC, IT, WBS 2011-03-04
15:45
Osaka Osaka University Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane
Yusuke Fujii, Hiroki Koga (Tsukuba Univ.) IT2010-116 ISEC2010-120 WBS2010-95
 [more] IT2010-116 ISEC2010-120 WBS2010-95
pp.319-326
ISEC, IT, WBS 2011-03-04
09:00
Osaka Osaka University Efficient Privacy Amplification Algorithms for Quantum Key Distribution
Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation) IT2010-117 ISEC2010-121 WBS2010-96
 [more] IT2010-117 ISEC2010-121 WBS2010-96
pp.327-332
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] IT2010-118 ISEC2010-122 WBS2010-97
pp.333-339
ISEC, IT, WBS 2011-03-04
09:50
Osaka Osaka University Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] IT2010-119 ISEC2010-123 WBS2010-98
pp.341-347
ISEC, IT, WBS 2011-03-04
10:25
Osaka Osaka University A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics
Masao Kasahara (O.G.U) IT2010-120 ISEC2010-124 WBS2010-99
In this paper, we present a new secret sharing scheme, referred to as KSS(I) on the basis of systematic Reed-Solomon cod... [more] IT2010-120 ISEC2010-124 WBS2010-99
pp.349-352
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more]
IT2010-121 ISEC2010-125 WBS2010-100
pp.353-360
ISEC, IT, WBS 2011-03-04
11:15
Osaka Osaka University Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-122 ISEC2010-126 WBS2010-101
This paper proposes a digital watermark method with maximum detection amplitude value of complex signature impulse.
Si... [more]
IT2010-122 ISEC2010-126 WBS2010-101
pp.361-366
ISEC, IT, WBS 2011-03-04
11:40
Osaka Osaka University Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-123 ISEC2010-127 WBS2010-102
This paper proposes an digital watermark method using extended smear-desmearing transform and high-pass filter.In this m... [more] IT2010-123 ISEC2010-127 WBS2010-102
pp.367-372
ISEC, IT, WBS 2011-03-04
13:25
Osaka Osaka University A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC
Masao Kasahara (Osaka Gakuin Univ.) IT2010-124 ISEC2010-128 WBS2010-103
In this paper, we present a new class of knapsack type PKC referred to as K(?)ΣPKC. In a sharp contrast with the convent... [more] IT2010-124 ISEC2010-128 WBS2010-103
pp.373-376
ISEC, IT, WBS 2011-03-04
13:50
Osaka Osaka University Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC -- Modification of K(VII)SE(1)PKC --
Masao Kasahara (Osaka Gakuin Univ.) IT2010-125 ISEC2010-129 WBS2010-104
In this paper, we present a new class of public-key cryptosystems, K(VIII)SE(1)PKC and K(XI)SE(2)PKC based on error-corr... [more] IT2010-125 ISEC2010-129 WBS2010-104
pp.377-382
ISEC, IT, WBS 2011-03-04
14:15
Osaka Osaka University Proposal of Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) IT2010-126 ISEC2010-130 WBS2010-105
 [more] IT2010-126 ISEC2010-130 WBS2010-105
pp.383-388
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University On the self-reducibility and the many-one-like reducibilities for multi-valued functions
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2010-127 ISEC2010-131 WBS2010-106
In this paper, we investigate a relationship between the self-reducibility and the many-one-like reducibilities for mult... [more] IT2010-127 ISEC2010-131 WBS2010-106
pp.389-394
 Results 41 - 60 of 62 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan