IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online On the Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.)
 [more]
ISEC, SITE, LOIS 2022-11-18
17:45
Online Online Aggregate Entity Authentication with Group Testing
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom)
 [more]
IT, ISEC, RCC, WBS 2022-03-10
12:00
Online Online Bit-Labeling Optimization of BICM Systems for the Gaussian Wiretap Channel
Toshiki Matsumine, Hideki Ochiai, junji shikata (Yokohama National Univ.) IT2021-98 ISEC2021-63 WBS2021-66 RCC2021-73
 [more] IT2021-98 ISEC2021-63 WBS2021-66 RCC2021-73
pp.95-100
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] IT2020-128 ISEC2020-58 WBS2020-47
pp.104-109
WBS, IT, ISEC 2021-03-05
09:00
Online Online Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] IT2020-143 ISEC2020-73 WBS2020-62
pp.187-194
WBS, IT, ISEC 2021-03-05
10:55
Online Online Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] IT2020-147 ISEC2020-77 WBS2020-66
pp.213-218
WBS, IT, ISEC 2021-03-05
11:20
Online Online Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] IT2020-148 ISEC2020-78 WBS2020-67
pp.219-224
ISEC, IT, WBS 2020-03-11
10:45
Hyogo University of Hyogo
(Cancelled but technical report was issued)
A Remark on Improving Aggregate Message Authentication Codes with Detecting Functionality
Lu Cao, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2019-111 ISEC2019-107 WBS2019-60
An aggregate message authentication code (AMAC) can compress multiple MAC tags into a short aggregate tag. An aggregate ... [more] IT2019-111 ISEC2019-107 WBS2019-60
pp.143-150
ICSS 2019-11-13
16:45
Miyazaki MRT Terrace(Miyazaki) Study on evaluation system for aggregate message authentication and its application to IoT systems
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] ICSS2019-67
pp.41-46
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Implementation and evaluation of aggregate message authentication method
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73
 [more] ICSS2018-73
pp.29-33
IT, ISEC, WBS 2019-03-08
09:00
Tokyo University of Electro-Communications History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] IT2018-101 ISEC2018-107 WBS2018-102
pp.155-162
IT, ISEC, WBS 2019-03-08
14:20
Tokyo University of Electro-Communications On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more]
IT2018-124 ISEC2018-130 WBS2018-125
pp.297-302
ISEC 2018-09-07
12:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Lower Bounds on Lattice Enumeration with Extreme Pruning (from Crypto 2018)
Yoshinori Aono (NICT), Phong Q. Nguyen (Inria/CNRS/JFLI/Tokyo Univ.), Takenobu Seito (BoJ), Junji Shikata (YNU) ISEC2018-56
We give an introduction to the paper “Lower Bounds on Lattice Enumeration with Extreme Pruning” in Crypto 2018. We prove... [more] ISEC2018-56
p.29
QIT
(2nd)
2018-06-04
13:20
Hiroshima ICCH Ran [Poster Presentation] Attacks using Quantum Computers and its countermeasures in Symmetric Key Cryptography
Takenobu Seito (BOJ), Junji Shikata (Yokohama National Univ.)
 [more]
WBS, IT, ISEC 2018-03-09
10:15
Tokyo Katsusika Campas, Tokyo University of Science Information-Theoretically Secure Authentication Codes with Arbitration using Non-Uniformly Random Keys
Miho Ishikawa, Junji Shikata (Yokohama National Univ.) IT2017-142 ISEC2017-130 WBS2017-123
The authentication code (A-code) is an information-theoretically secure authentication system which detects messages for... [more] IT2017-142 ISEC2017-130 WBS2017-123
pp.231-236
WBS, IT, ISEC 2018-03-09
11:15
Tokyo Katsusika Campas, Tokyo University of Science Secure Communications over the Two-Way Wiretap Channel II with Noisy Main Channel Using Cooperative Jamming
Hiroki Iizuka, Ryota Tanaka, Junji Shikata (Yokohama National Univ.) IT2017-144 ISEC2017-132 WBS2017-125
In two-way communications, interference is a factor of lowering the transmission rate. The legitimate
users cooperate t... [more]
IT2017-144 ISEC2017-132 WBS2017-125
pp.245-251
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) ICSS2015-58
The malicious JavaScript is a common springboard for attackers to launch several types of network attacks, such as Drive... [more] ICSS2015-58
pp.65-70
ICSS 2015-03-03
15:40
Okinawa Meio Univiersity A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more]
ICSS2014-69
pp.37-42
ISEC, IT, WBS 2014-03-10
15:45
Aichi Nagoya Univ., Higashiyama Campus [Invited Talk] Information-Theoretic Cryptography -- Survey and Challenge --
Junji Shikata (Yokohama National Univ.) IT2013-74 ISEC2013-103 WBS2013-63
 [more] IT2013-74 ISEC2013-103 WBS2013-63
p.127
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan