IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2013-03-15
16:05
Nara Todaiji Total Cultural Center A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication
Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) SITE2012-71 IA2012-109
In Wi-Fi and Bluetooth connection, by specifications, devices exchange their unique assigned device addresses in the cle... [more] SITE2012-71 IA2012-109
pp.249-254
IT, ISEC, WBS 2010-03-05
13:50
Nagano Nagano-Engineering Campus, Shinshu University Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] IT2009-110 ISEC2009-118 WBS2009-89
pp.255-260
RECONF 2009-05-15
11:00
Fukui   Development and Evaluation of Cryptographic Hardware Generated by Behavior-level Synthesis
Yohei Hori, Mai Itoh (Chuo Univ.), Hideki Imai (Chuo Univ./AIST) RECONF2009-12
Cryptography is widely applied to various consumer electronics to
protect digital contents, users' privacy, product co... [more]
RECONF2009-12
pp.67-72
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions
Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] IT2008-90 ISEC2008-148 WBS2008-103
pp.301-306
ISEC, SITE, IPSJ-CSEC 2006-07-21
09:30
Okayama Okayama Univ. On the Standardization of Information Security -- Report on the Madrid Meeting in May, 2006 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba)
 [more] ISEC2006-46
pp.43-52
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan