IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure Identity-Based Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
EE 2024-03-11
11:05
Tokyo
(Primary: On-site, Secondary: Online)
Steering of the economy for a country to prosper with power electronics as a key infrastructure
Daisuke Arai, Yu Yonezawa, Jun Imaoka, Masayoshi Yamamoto (Nagoya Univ.) EE2023-62
The first day of the year 2024 began with the “Noto Peninsula Earthquake”. This earthquake destroyed or damaged infrastr... [more] EE2023-62
pp.32-37
LOIS, SITE, ISEC 2023-11-10
11:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] ISEC2023-66 SITE2023-60 LOIS2023-24
pp.78-85
IT 2023-08-04
11:00
Kanagawa Shonan Institute of Technology
(Primary: On-site, Secondary: Online)
The Outer Bounds for the General Secret-Private Key Capacity Region for Three Terminals
Gustavo Oliveira, Shun Watanabe (TUAT) IT2023-24
We consider the general model for secret key generation between three terminals in which they are required to generate o... [more] IT2023-24
pp.56-61
ISEC 2023-05-17
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. Equivalent Secret Key-Recovery Attack on Knapsack Public Key Cryptosystem
Ryuichi Sakai, Yasuyuki Murakami (OECU) ISEC2023-9
Shamir proposed an attack on Merkle-Hellman’s knapsack public key cryptosystem. This attack uses integer programming to ... [more] ISEC2023-9
pp.49-53
IN, RCS, NV
(Joint)
2022-05-26
11:50
Kanagawa Keio University (Hiyoshi Campus)
(Primary: On-site, Secondary: Online)
Application of Darwinian Neurodynamics Model for Dynamic TDD Resource Allocation
Lu Chen, Masayuki Murata (Osaka Univ.) IN2022-3
Following the launch of 5G mobile network services, private 5G networks are getting started to be available, and have a ... [more] IN2022-3
pp.13-18
IT, ISEC, RCC, WBS 2022-03-11
16:00
Online Online Analyzing Average Bit Length of Private Keys Obtained by the Improved Key Set Protocol
Takeshi Undo, Koichi Koizumi, Ohtsuki Masanobu (Fukushima KOSEN) IT2021-130 ISEC2021-95 WBS2021-98 RCC2021-105
(To be available after the conference date) [more] IT2021-130 ISEC2021-95 WBS2021-98 RCC2021-105
pp.275-280
RCS, SR, SRW
(Joint)
2021-03-03
16:20
Online Online [Invited Lecture] NICT's R&D Activities on the Future Terrestrial Wireless Communication Systems toward B5G/6G -- Integrated Communication Systems That Harmonize Requirements with Environments --
Fumihide Kojima, Takeshi Matsumura (NICT) RCS2020-220 SR2020-67 SRW2020-58
NICT is promoting radio and development activities on enhanced radio access technologies, expanded radio systems deploym... [more] RCS2020-220 SR2020-67 SRW2020-58
pp.82-87(RCS), pp.23-28(SR), pp.23-28(SRW)
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
13:45
Kochi Kochi University of Technology 3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification -- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application --
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55
Considering the current situation, where personal verification with digital authentication is becoming important in the ... [more] ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55
pp.341-346
ISEC 2018-09-07
09:55
Tokyo Kikai-Shinko-Kaikan Bldg. Proposal of Commercial Use of Social Number with Special Device
Kento Iijima, Ryuya Uda (Tokyo Univ. of Tech.) ISEC2018-52
In recent years, the use of private numbers has been considered due to the appearance of the My Number system, but a pra... [more] ISEC2018-52
pp.15-22
ISEC 2017-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] ISEC2017-42
pp.7-14
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] ICSS2015-62
pp.89-94
IN 2015-10-15
15:20
Osaka Osaka University A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] IN2015-55
pp.13-18
SITE, IPSJ-CE 2011-12-17
15:15
Shimane   On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy -- Part 1 --
Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] SITE2011-28
pp.19-24
SWIM 2009-09-11
15:40
Tokyo   Trends and Directions of OSS-based Private Cloud Computing -- Intalio Cloud as Enterprise Cloud Platform --
Tomoaki Sawada (Intalio) SWIM2009-8
With the emergence of cloud computing, there occurred new trends to import the same computing platform within the firewa... [more] SWIM2009-8
pp.17-22
AP, SAT
(Joint)
2009-07-08
15:40
Hokkaido Otaru city, Hokkaido Improvement of Tolerance for Eavesdropping in Wireless Key Agreement Scheme using ESPAR Antenna based on Interference Transmission
Masahiro Onishi, Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2009-54
As a countermeasure scheme against an eavesdropper in wireless communications, a key agreement scheme using an ESPAR ant... [more] AP2009-54
pp.59-64
ISEC 2008-09-12
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Estimating RSA Private-Keys Generated in Security Chips
Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] ISEC2008-71
pp.55-62
AP 2007-09-06
09:20
Tokyo Kikai-Shinko-Kaikan Bldg. An analysis on estimation characteristics of propagation channel
Keisuke Inoue, Toshihiro Tango, Hisato Iwai, Hideichi Sasaoka (Doushisha Univ.) AP2007-74
In multipath fading environments, it is generally difficult to estimate received signal characteristics at a certain dis... [more] AP2007-74
pp.1-6
AP 2007-01-25
10:50
Fukui Fukui Univ. Evaluation of channel characteristics estimation accuracy based on received signals at different locations by computer simulations.
Keisuke Inoue, Toshihiro Tango, Hisato Iwai, Hideichi Sasaoka (Doushisha Univ.) AP2006-112
In multipath fading environments, it is generally difficult to estimate received signal characteristics at a certain dis... [more] AP2006-112
pp.13-18
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan