|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-28 13:20 |
Kagoshima |
|
Study of the Hardware Trojan for Embedded Processor Yasushi Tsukada, Shuhei Itaya, Takeshi Kumaki (Ritsumeikan Univ.), Masaya Yoshikawa (Meijou Univ), Takeshi Fujino (Ritsumeikan Univ.) CPSY2013-64 |
In recent years, much attention is paid to the threat and measure of LSI Hardware Trojan.
Hardware Trojan is the circui... [more] |
CPSY2013-64 pp.29-34 |
EMM |
2012-03-16 17:30 |
Osaka |
|
A study of effective information hiding method for embedded systems Kei Nakao, Shuhei Itaya, Masahiro Osawa, Takeshi Kumaki, Takeshi Fujino (Ritsumeikan Univ.) EMM2011-76 |
[more] |
EMM2011-76 pp.71-76 |
CQ, MVE, IE (Joint) [detail] |
2011-03-08 10:15 |
Nagasaki |
Yasuragi IOUJIMA |
Implementation and Evaluation of degital Wartermarking based on max-plus algebra morphological wavelet transform Shuhei Itaya, Masahiro Osawa, Takeshi Kumaki, Takeshi Fujino (Ritsumeikan Univ.) IE2010-183 MVE2010-171 |
[more] |
IE2010-183 MVE2010-171 pp.219-224 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|