|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 16:05 |
Nara |
Todaiji Total Cultural Center |
A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) SITE2012-71 IA2012-109 |
In Wi-Fi and Bluetooth connection, by specifications, devices exchange their unique assigned device addresses in the cle... [more] |
SITE2012-71 IA2012-109 pp.249-254 |
IT, ISEC, WBS |
2010-03-05 13:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89 |
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] |
IT2009-110 ISEC2009-118 WBS2009-89 pp.255-260 |
RECONF |
2009-05-15 11:00 |
Fukui |
|
Development and Evaluation of Cryptographic Hardware Generated by Behavior-level Synthesis Yohei Hori, Mai Itoh (Chuo Univ.), Hideki Imai (Chuo Univ./AIST) RECONF2009-12 |
Cryptography is widely applied to various consumer electronics to
protect digital contents, users' privacy, product co... [more] |
RECONF2009-12 pp.67-72 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103 |
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] |
IT2008-90 ISEC2008-148 WBS2008-103 pp.301-306 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 09:30 |
Okayama |
Okayama Univ. |
On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba) |
[more] |
ISEC2006-46 pp.43-52 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|