IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 135  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
OPE, LQE, OCS 2024-10-17
16:15
Yamaguchi   AES Algorithm Modified Symbol Block Ciphering
Hodaka Amano, Takahiro Kodama (Kagawa Univ.)
(To be available after the conference date) [more] OCS2023-36 OPE2023-91 LQE2023-38
pp.47-52
EMM 2023-03-02
13:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Poster Presentation] A Video Data Hiding Scheme Using Dynamic Programming on Feature Sequences
Tamaki Yonemaru, Tetsuya Kojima, Raito Matsuzaki, Akira Tanaka (NIT, Tokyo College) EMM2022-73
A video data hiding scheme based on the differences between two successive frames has been proposed. In this scheme, a w... [more] EMM2022-73
pp.34-37
RCS, SR, SRW
(Joint)
2023-03-01
16:40
Tokyo Tokyo Institute of Technology, and Online
(Primary: On-site, Secondary: Online)
Design of SVD-Precoded Faster-Than-Nyquist Signaling Considered Inter-Block-Interference
Yuto Ikarashi, Kenta Umebayashi (TUAT) RCS2022-266
Singular-Value-Decomposition-Precoded Faster-Than-Nyquist Signaling(SVD-FTNS) is considered as method to efficiently uti... [more] RCS2022-266
pp.112-117
HWS, ICD 2022-10-25
16:15
Shiga
(Primary: On-site, Secondary: Online)
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON
Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] HWS2022-41 ICD2022-33
pp.64-69
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes
Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2020-130 ISEC2020-60 WBS2020-49
This study considers variable-to-fixed length codes and investigates the non-asymptotic converse theorem on the threshol... [more] IT2020-130 ISEC2020-60 WBS2020-49
pp.115-116
WBS, IT, ISEC 2021-03-05
14:20
Online Online Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] IT2020-156 ISEC2020-86 WBS2020-75
pp.273-280
HWS, VLD [detail] 2021-03-04
13:25
Online Online A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design
Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] VLD2020-83 HWS2020-58
pp.85-90
SITE, IA, IPSJ-IOT [detail] 2021-03-01
11:20
Online Online Report on Blockchain Adoption in Securities -- Study About Blockchain System for Corporate Bonds Under Japanese Law --
Kohei Ichihara (SMFG) SITE2020-40 IA2020-36
In many blockchain technologies, the nodes that create the blockchain network can execute the program codes. In Japan, a... [more] SITE2020-40 IA2020-36
pp.7-14
IT 2019-09-06
09:45
Oita Yufuin Kenshujo, Nippon Bunri University Encoding Algorithm of Binary and Non-binary Irregular LDPC Codes via Block Triangular Matrices with Low Weight Diagonal Submatrices
Yuta Iketoh, Takayuki Nozaki (Yamaguchi Univ) IT2019-26
In this report, we propose a low complexity encoding algorithm for the binary and non-binary irregular LDPC codes.
This... [more]
IT2019-26
pp.1-6
IN, NS
(Joint)
2019-03-04
10:10
Okinawa Okinawa Convention Center Proposal of Distributed Trading Protocol for Sensor Data Using Blockchain
Daisuke Yokomori, Aki Kobayashi (Kogakuin Univ.) IN2018-93
With the spread of IoT, the demand for sensor data transactions is increasing. While research on platforms for sensor da... [more] IN2018-93
pp.55-60
IN, NS
(Joint)
2019-03-05
10:50
Okinawa Okinawa Convention Center Implementing Capability-Based Access Control Using Ethereum Blockchain for the Internet of Things -- Constructing Capabilities at Action Level --
Yuta Nakamura, Zhang Yuanyu, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2018-252
As the most fundamental platform for the Society 5.0, the Internet of Things urgently requires distributed and trustwort... [more] NS2018-252
pp.349-354
ISEC 2018-09-07
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018)
Kan Yasuda (NTT) ISEC2018-55
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] ISEC2018-55
p.27
IT 2018-09-05
09:45
Iwate Seionsou An Upper Bound on the Generalized Cayley Distance
Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2018-28
Generalized Cayley distance is one of distances which are considered in permutation codes. The generalized Cayley distan... [more] IT2018-28
pp.7-12
ICM 2018-07-06
10:20
Aomori   [Encouragement Talk] Scope Expansions and Component-based Architecture Design of Operational Smart-Contract for Permissioned Blockchain System
Tatsuya Sato, Yosuke Himura, Jun Nemoto (Hitachi) ICM2018-18
Enterprises have paid attention to permissioned blockchain (BC) characterized with smart-contract (SC), where business t... [more] ICM2018-18
pp.41-46
WBS, IT, ISEC 2018-03-08
11:40
Tokyo Katsusika Campas, Tokyo University of Science Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation
Kotaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-109 ISEC2017-97 WBS2017-90
A $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS) is a kind of secret sharing schemes for digital images.
In... [more]
IT2017-109 ISEC2017-97 WBS2017-90
pp.37-42
SS 2018-03-07
12:00
Okinawa   A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection
Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] SS2017-74
pp.57-62
RCS, SR, SRW
(Joint)
2018-02-28
09:00
Kanagawa YRP A Distributed Antenna Downlink System using Linearly Precoded MU-MIMO
Nobuaki Shimakawa, Yasunori Iwanami (N.I.T.) RCS2017-317
Recently, Muti-User MIMO (MU-MIMO) downlink system which uses multiple antennas at Base Station (BS) and accommodates mu... [more] RCS2017-317
pp.1-6
SAT, SANE
(Joint)
2018-02-22
09:55
Yamaguchi The Yamaguchi Chamber of Commerce and Industry A Novel AFC Scheme for WHCDM Based on Inter-Code Interference Due to Carrier Frequency Offset
Yuki Kanamaru, Toshiharu Kojima (UEC) SAT2017-58
In helicopter satellite communications, the periodic channel blockage due to rotor blades and time-varying Doppler shift... [more] SAT2017-58
pp.13-18
IN 2018-01-22
13:25
Aichi WINC AICHI Media Content Management System using Blockchain Technology
Yuya Sato, Kunitake Kaneko (Keio Univ.) IN2017-75
Recently, in order to distribute media contents on the Internet, blockchain technology is expected as a media content ma... [more] IN2017-75
pp.31-36
LOIS, ICM 2018-01-19
13:05
Kumamoto Sojo University Smart-Contract-based System Operations Execution Method for Permissioned Blockchain Systems
Tatsuya Sato (Hitachi) ICM2017-48 LOIS2017-64
Enterprises have paid attention to permissioned blockchain (BC) characterized with smart-contract, where business transa... [more] ICM2017-48 LOIS2017-64
pp.81-86
 Results 1 - 20 of 135  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan