Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, WBS, IT |
2017-03-10 10:25 |
Tokyo |
TOKAI University |
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation Gavin Lynn Stewart (JAIST), Yuichi Futa (TUT), Atsuko Miyaji (JAIST/Osaka Univ.) IT2016-100 ISEC2016-90 WBS2016-76 |
[more] |
IT2016-100 ISEC2016-90 WBS2016-76 pp.7-14 |
ISEC, WBS, IT |
2017-03-10 11:20 |
Tokyo |
TOKAI University |
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96 |
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] |
IT2016-120 ISEC2016-110 WBS2016-96 pp.137-144 |
ISEC, WBS, IT |
2017-03-10 11:45 |
Tokyo |
TOKAI University |
Diagonally Witness-Indistinguishable Proof Systems Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) IT2016-121 ISEC2016-111 WBS2016-97 |
We propose a witness-indistinguishable proof system which is a kind of parallel composition of witness-indistinguishable... [more] |
IT2016-121 ISEC2016-111 WBS2016-97 pp.145-148 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98 |
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] |
IT2016-122 ISEC2016-112 WBS2016-98 pp.149-154 |
ISEC, WBS, IT |
2017-03-10 10:55 |
Tokyo |
TOKAI University |
Studies on evaluationg system for q-ary linear block codes based on q-input r-output symmetric channels(2) Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC) IT2016-123 ISEC2016-113 WBS2016-99 |
Kawashima and Yamaguchi proposed method to compute probability of decoding error of soft decision decoding for q-ary lin... [more] |
IT2016-123 ISEC2016-113 WBS2016-99 pp.155-160 |
ISEC, WBS, IT |
2017-03-10 11:20 |
Tokyo |
TOKAI University |
MRI Acceleration by Super Resolution Ayaka Nakashima, Masanori Kawakita, Yutaka Jitsumatsu (Kyushu Univ.), Shigehide Kuhara (Kyorin Univ.), Jun'ichi Takeuchi (Kyushu Univ.) IT2016-124 ISEC2016-114 WBS2016-100 |
MR imaging currently takes a long imaging time in some applications such as 3D imaging and faster imaging speed is requi... [more] |
IT2016-124 ISEC2016-114 WBS2016-100 pp.161-166 |
ISEC, WBS, IT |
2017-03-10 11:45 |
Tokyo |
TOKAI University |
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN Norisato Suga, Naoto Egashira, Kazuto Yano, Tomoaki Kumagai (ATR) IT2016-125 ISEC2016-115 WBS2016-101 |
This paper proposes a BER (bit error rate) prediction method for COFDM (coded orthogonal frequency division multiplexin... [more] |
IT2016-125 ISEC2016-115 WBS2016-101 pp.167-172 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.) IT2016-126 ISEC2016-116 WBS2016-102 |
We consider the variable-length coding allowing the error probability up to some constant. The optimum mean codeword len... [more] |
IT2016-126 ISEC2016-116 WBS2016-102 pp.173-178 |
ISEC, WBS, IT |
2017-03-10 13:45 |
Tokyo |
TOKAI University |
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC Masao Kasahara (Waseda Univ.) IT2016-127 ISEC2016-117 WBS2016-103 |
[more] |
IT2016-127 ISEC2016-117 WBS2016-103 pp.179-185 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104 |
(To be available after the conference date) [more] |
IT2016-128 ISEC2016-118 WBS2016-104 pp.187-193 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Efficient Verifiable Attribute-Based Keyword Search Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105 |
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] |
IT2016-129 ISEC2016-119 WBS2016-105 pp.195-202 |
ISEC, WBS, IT |
2017-03-10 13:45 |
Tokyo |
TOKAI University |
Index Coding with Information-Theoretic Secrecy for Unintended Message Mami Takei, Hiroki Koga (Univ. Tsukuba) IT2016-130 ISEC2016-120 WBS2016-106 |
In this paper we consider the index coding problem, where multiple receivers decode respective intended messages from th... [more] |
IT2016-130 ISEC2016-120 WBS2016-106 pp.203-208 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
Spectrum Sensing in Cooperative with Some Secondary Users Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2016-131 ISEC2016-121 WBS2016-107 |
The cognitive radio has attracted attention as a measure to utilize the radio spectrum more efficiently in order to cope... [more] |
IT2016-131 ISEC2016-121 WBS2016-107 pp.209-214 |
ISEC, WBS, IT |
2017-03-10 14:35 |
Tokyo |
TOKAI University |
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing Ryutaroh Matsumoto (Tokyo Tech.) IT2016-132 ISEC2016-122 WBS2016-108 |
We show a simple example of a secret sharing scheme
encoding classical secret to quantum shares
that can realize an ac... [more] |
IT2016-132 ISEC2016-122 WBS2016-108 pp.215-216 |
ISEC, WBS, IT |
2017-03-10 15:35 |
Tokyo |
TOKAI University |
Secret Sharing Schemes using Modulo-2^m Operations Hidenori Kuwakado (Kansai Univ.) IT2016-133 ISEC2016-123 WBS2016-109 |
[more] |
IT2016-133 ISEC2016-123 WBS2016-109 pp.217-221 |
ISEC, WBS, IT |
2017-03-10 16:00 |
Tokyo |
TOKAI University |
Development of Security Incident Symptomatic Analysis function in SIAS Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR) IT2016-134 ISEC2016-124 WBS2016-110 |
(To be available after the conference date) [more] |
IT2016-134 ISEC2016-124 WBS2016-110 pp.223-228 |
ISEC, WBS, IT |
2017-03-10 15:10 |
Tokyo |
TOKAI University |
Performance of Error Correcting Codes for RGB-LED Parallel Transmission Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) IT2016-135 ISEC2016-125 WBS2016-111 |
The LED for visible light communications has only 3 base colors: red, green and blue(RGB). Since the channel has a diffe... [more] |
IT2016-135 ISEC2016-125 WBS2016-111 pp.229-232 |
ISEC, WBS, IT |
2017-03-10 15:35 |
Tokyo |
TOKAI University |
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) IT2016-136 ISEC2016-126 WBS2016-112 |
The indoor visible light communications utilizing LED light that are available for not only the illumination but also da... [more] |
IT2016-136 ISEC2016-126 WBS2016-112 pp.233-238 |
ISEC, WBS, IT |
2017-03-10 16:00 |
Tokyo |
TOKAI University |
A Study on Relay Communication using UAV with Buffer Higashi Takahiro, Ochiai Hideki (Yokohama National Univ.) IT2016-137 ISEC2016-127 WBS2016-113 |
For urgent recovery from information disconnection caused by large-scale disasters, wireless relay network using UAV (Un... [more] |
IT2016-137 ISEC2016-127 WBS2016-113 pp.239-244 |
ISEC, WBS, IT |
2017-03-10 16:35 |
Tokyo |
TOKAI University |
[Invited Talk]
A Survey on Space-, Time-, and Frequency-Domain Index Modulation Shinya Sugiura (TUAT) IT2016-138 ISEC2016-128 WBS2016-114 |
In this report, we review the recent studies on index modulation that is applied to the dimensions of space, time, and f... [more] |
IT2016-138 ISEC2016-128 WBS2016-114 pp.245-249 |