|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, EMM |
2022-05-17 16:40 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Codes with List Decoding Yujie Gu (Kyudai) IT2022-8 EMM2022-8 |
In this paper, we consider secure codes for protecting the copyright of multimedia content against collusion attacks. We... [more] |
IT2022-8 EMM2022-8 pp.41-43 |
WBS, IT, ISEC |
2021-03-05 09:25 |
Online |
Online |
Construction of non-malleable codes based on graph theory Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.) IT2020-144 ISEC2020-74 WBS2020-63 |
Non-malleable codes protect communications against adversarial tampering of data, which can be seen as a relaxation of e... [more] |
IT2020-144 ISEC2020-74 WBS2020-63 pp.195-200 |
IT |
2020-12-03 11:20 |
Online |
Online |
On private information retrieval with graph-based storage system Bar Sadeh (TAU), Yujie Gu (Kyudai), Itzhak Tamo (TAU) IT2020-50 |
[more] |
IT2020-50 pp.144-145 |
IT |
2020-12-03 11:40 |
Online |
Online |
Introduction on Information Theory and Its Applications at Tel Aviv University
-- Class of "Codes and Sequences" for Graduate Students -- Kouichi Sakurai, YuJie GU (Kyushu Univ.) IT2020-51 |
[more] |
IT2020-51 pp.146-147 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|