Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OPE, LQE, OCS |
2024-10-17 16:15 |
Yamaguchi |
|
AES Algorithm Modified Symbol Block Ciphering Hodaka Amano, Takahiro Kodama (Kagawa Univ.) |
(To be available after the conference date) [more] |
OCS2023-36 OPE2023-91 LQE2023-38 pp.47-52 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
A Video Data Hiding Scheme Using Dynamic Programming on Feature Sequences Tamaki Yonemaru, Tetsuya Kojima, Raito Matsuzaki, Akira Tanaka (NIT, Tokyo College) EMM2022-73 |
A video data hiding scheme based on the differences between two successive frames has been proposed. In this scheme, a w... [more] |
EMM2022-73 pp.34-37 |
RCS, SR, SRW (Joint) |
2023-03-01 16:40 |
Tokyo |
Tokyo Institute of Technology, and Online (Primary: On-site, Secondary: Online) |
Design of SVD-Precoded Faster-Than-Nyquist Signaling Considered Inter-Block-Interference Yuto Ikarashi, Kenta Umebayashi (TUAT) RCS2022-266 |
Singular-Value-Decomposition-Precoded Faster-Than-Nyquist Signaling(SVD-FTNS) is considered as method to efficiently uti... [more] |
RCS2022-266 pp.112-117 |
HWS, ICD |
2022-10-25 16:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33 |
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] |
HWS2022-41 ICD2022-33 pp.64-69 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2020-130 ISEC2020-60 WBS2020-49 |
This study considers variable-to-fixed length codes and investigates the non-asymptotic converse theorem on the threshol... [more] |
IT2020-130 ISEC2020-60 WBS2020-49 pp.115-116 |
WBS, IT, ISEC |
2021-03-05 14:20 |
Online |
Online |
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75 |
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] |
IT2020-156 ISEC2020-86 WBS2020-75 pp.273-280 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-01 11:20 |
Online |
Online |
Report on Blockchain Adoption in Securities
-- Study About Blockchain System for Corporate Bonds Under Japanese Law -- Kohei Ichihara (SMFG) SITE2020-40 IA2020-36 |
In many blockchain technologies, the nodes that create the blockchain network can execute the program codes. In Japan, a... [more] |
SITE2020-40 IA2020-36 pp.7-14 |
IT |
2019-09-06 09:45 |
Oita |
Yufuin Kenshujo, Nippon Bunri University |
Encoding Algorithm of Binary and Non-binary Irregular LDPC Codes via Block Triangular Matrices with Low Weight Diagonal Submatrices Yuta Iketoh, Takayuki Nozaki (Yamaguchi Univ) IT2019-26 |
In this report, we propose a low complexity encoding algorithm for the binary and non-binary irregular LDPC codes.
This... [more] |
IT2019-26 pp.1-6 |
IN, NS (Joint) |
2019-03-04 10:10 |
Okinawa |
Okinawa Convention Center |
Proposal of Distributed Trading Protocol for Sensor Data Using Blockchain Daisuke Yokomori, Aki Kobayashi (Kogakuin Univ.) IN2018-93 |
With the spread of IoT, the demand for sensor data transactions is increasing. While research on platforms for sensor da... [more] |
IN2018-93 pp.55-60 |
IN, NS (Joint) |
2019-03-05 10:50 |
Okinawa |
Okinawa Convention Center |
Implementing Capability-Based Access Control Using Ethereum Blockchain for the Internet of Things
-- Constructing Capabilities at Action Level -- Yuta Nakamura, Zhang Yuanyu, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2018-252 |
As the most fundamental platform for the Society 5.0, the Internet of Things urgently requires distributed and trustwort... [more] |
NS2018-252 pp.349-354 |
ISEC |
2018-09-07 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018) Kan Yasuda (NTT) ISEC2018-55 |
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] |
ISEC2018-55 p.27 |
IT |
2018-09-05 09:45 |
Iwate |
Seionsou |
An Upper Bound on the Generalized Cayley Distance Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2018-28 |
Generalized Cayley distance is one of distances which are considered in permutation codes. The generalized Cayley distan... [more] |
IT2018-28 pp.7-12 |
ICM |
2018-07-06 10:20 |
Aomori |
|
[Encouragement Talk]
Scope Expansions and Component-based Architecture Design of Operational Smart-Contract for Permissioned Blockchain System Tatsuya Sato, Yosuke Himura, Jun Nemoto (Hitachi) ICM2018-18 |
Enterprises have paid attention to permissioned blockchain (BC) characterized with smart-contract (SC), where business t... [more] |
ICM2018-18 pp.41-46 |
WBS, IT, ISEC |
2018-03-08 11:40 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation Kotaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-109 ISEC2017-97 WBS2017-90 |
A $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS) is a kind of secret sharing schemes for digital images.
In... [more] |
IT2017-109 ISEC2017-97 WBS2017-90 pp.37-42 |
SS |
2018-03-07 12:00 |
Okinawa |
|
A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74 |
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] |
SS2017-74 pp.57-62 |
RCS, SR, SRW (Joint) |
2018-02-28 09:00 |
Kanagawa |
YRP |
A Distributed Antenna Downlink System using Linearly Precoded MU-MIMO Nobuaki Shimakawa, Yasunori Iwanami (N.I.T.) RCS2017-317 |
Recently, Muti-User MIMO (MU-MIMO) downlink system which uses multiple antennas at Base Station (BS) and accommodates mu... [more] |
RCS2017-317 pp.1-6 |
SAT, SANE (Joint) |
2018-02-22 09:55 |
Yamaguchi |
The Yamaguchi Chamber of Commerce and Industry |
A Novel AFC Scheme for WHCDM Based on Inter-Code Interference Due to Carrier Frequency Offset Yuki Kanamaru, Toshiharu Kojima (UEC) SAT2017-58 |
In helicopter satellite communications, the periodic channel blockage due to rotor blades and time-varying Doppler shift... [more] |
SAT2017-58 pp.13-18 |
IN |
2018-01-22 13:25 |
Aichi |
WINC AICHI |
Media Content Management System using Blockchain Technology Yuya Sato, Kunitake Kaneko (Keio Univ.) IN2017-75 |
Recently, in order to distribute media contents on the Internet, blockchain technology is expected as a media content ma... [more] |
IN2017-75 pp.31-36 |
LOIS, ICM |
2018-01-19 13:05 |
Kumamoto |
Sojo University |
Smart-Contract-based System Operations Execution Method for Permissioned Blockchain Systems Tatsuya Sato (Hitachi) ICM2017-48 LOIS2017-64 |
Enterprises have paid attention to permissioned blockchain (BC) characterized with smart-contract, where business transa... [more] |
ICM2017-48 LOIS2017-64 pp.81-86 |