IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2012)

Search Results: Keywords 'from:2013-03-07 to:2013-03-07'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2013-03-07
15:05
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(IV)PKC, Constructed Based on Maximum Length Code
Masao Kasahara (Waseda Univ.) IT2012-82 ISEC2012-100 WBS2012-68
 [more] IT2012-82 ISEC2012-100 WBS2012-68
pp.131-138
IT, ISEC, WBS 2013-03-07
15:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A knapsack cryptosystem with a randomly signed key
Akira Hayashi (Kanazawa Inst. of Tech.) IT2012-83 ISEC2012-101 WBS2012-69
The knapsack cryptosystem invented by Merkle and Hellman is broken with high probability by Shamir's attack. A novel cr... [more] IT2012-83 ISEC2012-101 WBS2012-69
pp.139-141
IT, ISEC, WBS 2013-03-07
15:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] IT2012-84 ISEC2012-102 WBS2012-70
pp.143-147
IT, ISEC, WBS 2013-03-07
15:05
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A Study on Sparse Channel Estimation in Single Carrier Communications
Yuki Nishizawa, Teruyuki Miyajima (Ibaraki Univ.) IT2012-85 ISEC2012-103 WBS2012-71
It has been reported that when channel estimation performance is unsatisfactory when conventional estimation methods are... [more] IT2012-85 ISEC2012-103 WBS2012-71
pp.149-154
IT, ISEC, WBS 2013-03-07
15:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Performance Comparison of OFDMA and SC-FDMA with Clipping and Filtering
Nguyen Huu Bao Trung, Hideki Ochiai (Yokohama National Univ.) IT2012-86 ISEC2012-104 WBS2012-72
Recently, orthogonal frequency-division multiple access (OFDMA) has been considered as a promis- ing candidate for next-... [more] IT2012-86 ISEC2012-104 WBS2012-72
pp.155-160
IT, ISEC, WBS 2013-03-07
15:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Performance Evaluation of Spatial Modulation OFDM with Frequency-Domain Precoding and Iterative Parallel Interference Canceller
Shosuke Nakamura, Tadatomo Sato (Tokyo City Univ.) IT2012-87 ISEC2012-105 WBS2012-73
In this paper, we focus on spatial modulation OFDM (SM-OFDM) which attracts attention as a new technique to realize high... [more] IT2012-87 ISEC2012-105 WBS2012-73
pp.161-166
IT, ISEC, WBS 2013-03-07
16:35
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus [Invited Talk] Road of IT security standard -- From cryptography to cloud and M2M security --
Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] IT2012-88 ISEC2012-106 WBS2012-74
p.167
IT, ISEC, WBS 2013-03-07
17:25
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus [Invited Talk] Space-Time Coding Technologies for Fast Time-Varying Channels
Hiroshi Kubo (Ritsumeikan Univ.) IT2012-89 ISEC2012-107 WBS2012-75
This paper discusses differential space-time coding for fast time-varying channels. Differential space-time coding, whic... [more] IT2012-89 ISEC2012-107 WBS2012-75
pp.169-174
IT, ISEC, WBS 2013-03-08
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A Note on Linear Complexity for Constant-Weight Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.) IT2012-90 ISEC2012-108 WBS2012-76
For cyclic codes (periodic sequences) over finite set from cyclic difference set proposed by authors, the Hamming weight... [more] IT2012-90 ISEC2012-108 WBS2012-76
pp.175-179
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more]
IT2012-91 ISEC2012-109 WBS2012-77
pp.181-188
IT, ISEC, WBS 2013-03-08
11:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus On fundamental defect of rate theory of quantum key distribution and quantum repeater
Osamu Hirota (Tamagawa Univ.) IT2012-92 ISEC2012-110 WBS2012-78
It has been pointed out many times by several researchers that the security theory of quantum key distribution(QKD) orig... [more] IT2012-92 ISEC2012-110 WBS2012-78
pp.189-194
IT, ISEC, WBS 2013-03-08
10:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Laser Fault Injection Attack on Non-Decapped Contact Smart Card
Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79
 [more] IT2012-93 ISEC2012-111 WBS2012-79
pp.195-202
IT, ISEC, WBS 2013-03-08
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Preventing Unauthorized CAN Transmission by Surveillance Mechanism Built in Electronic Control Unit
Daiki Sekiguchi, Masato Tanabe, Masato Hata, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) IT2012-94 ISEC2012-112 WBS2012-80
(To be available after the conference date) [more] IT2012-94 ISEC2012-112 WBS2012-80
pp.203-210
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Software Implementation Using Quadruple-Rail Representation Against Power Analysis
Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC) IT2012-95 ISEC2012-113 WBS2012-81
Power analysis is an attack against a crypto device that extracts the secret key by using the relation between the power... [more] IT2012-95 ISEC2012-113 WBS2012-81
pp.211-216
IT, ISEC, WBS 2013-03-08
11:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Nano Artifact-metrics based on Resist Collapsing
Tsutomu Matsumoto, Kenta Hanaki, Ryosuke Suzuki, Daiki Sekiguchi (Yokohama National Univ.), Morihisa Hoga, Yasuyuki Ohyagi (DNP), Makoto Naruse (NICT), Naoya Tate, Motoichi Ohtsu (Univ. of Tokyo) IT2012-96 ISEC2012-114 WBS2012-82
Artifact-metrics is an automated method of utilizing physical artifacts based on their measurable intrinsic characterist... [more] IT2012-96 ISEC2012-114 WBS2012-82
pp.217-222
IT, ISEC, WBS 2013-03-08
10:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus On Methods for Introducing Quiet Period into Wireless LAN over TV White Space
Masumi Yuki, Shigenobu Sasaki (Niigata Univ.) IT2012-97 ISEC2012-115 WBS2012-83
In this paper, performance of two different methods for introducing quiet period (QP) into wireless LAN (WLAN) are evalu... [more] IT2012-97 ISEC2012-115 WBS2012-83
pp.223-228
IT, ISEC, WBS 2013-03-08
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A study on accuracy of acquisition for DS/UWB packet radio transmission
Takuya Inoko, Shigenobu Sasaki (Niigata Univ.) IT2012-98 ISEC2012-116 WBS2012-84
 [more] IT2012-98 ISEC2012-116 WBS2012-84
pp.229-234
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Theoretical analysis of tracking error on DLL with modified pseudo ternary M-sequence pair
Masaya Yamagata, Hiromasa Habuchi (Ibaraki Univ.) IT2012-99 ISEC2012-117 WBS2012-85
In this paper, the proposed tracking method for bi-orthogonal modulation system is used for the internal synchronization... [more] IT2012-99 ISEC2012-117 WBS2012-85
pp.235-239
IT, ISEC, WBS 2013-03-08
13:40
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus [Invited Talk] Distributed Source Coding and its Application to Media Processing
Takayuki Nakachi (NTT) IT2012-100 ISEC2012-118 WBS2012-86
Distributed Source Coding (DSC) concerns encoding of correlated information sources, without letting the sources communi... [more] IT2012-100 ISEC2012-118 WBS2012-86
pp.241-246
IT, ISEC, WBS 2013-03-08
14:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Word Prediction by PPM Algorithm in English and Thai Languages
Soukalom Sosouphanh, Tomohiro Ogawa (Univ. of Electro- Comm.) IT2012-101 ISEC2012-119 WBS2012-87
It is possible to develop word prediction systems in English or Japanese
by using the Trie which is constructed based o... [more]
IT2012-101 ISEC2012-119 WBS2012-87
pp.247-250
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan