IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IE, IMQ, MVE, CQ
(Joint) [detail]
2016-03-07
15:20
Okinawa   [Poster Presentation] Comparison of Theatrical Speeches with Synthesized Speeches by the Image Evaluation
Kenko Ota, Shiho Aoki, Naoki Otani, Yuki Idei, Takuya Nakashima (NIT) CQ2015-130
 [more] CQ2015-130
pp.127-130
CQ 2015-09-01
11:40
Kyoto Kyoto Institute of Technology A Study on Acoustic Features Affecting the Quality of Theatrical Speech based on the Image Evaluation
Kenko Ota, Yuki Idei, Shiho Aoki, Naoki Otani (Nippon Inst. of Tech.), Takuya Nakashima (Graduate School of Nippon Inst. of Tech.) CQ2015-47
 [more] CQ2015-47
pp.43-48
AP, ITE-BCT 2012-02-09
10:20
Hiroshima NHK Hiroshima Evaluation of Fundamental Characteristics of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics
Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2011-187
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] AP2011-187
pp.13-18
AP, WPT
(Joint)
2011-10-13
13:25
Kanagawa Kanagawa Womens Center Experimental Evaluation of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics
Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2011-80
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] AP2011-80
pp.19-24
AP 2011-01-20
11:20
Saga Saga Univ. Development of Secret Key Agreement and Radio Source Localization Experimental System Based on Radio Propagation Characteristics Using Array Antennas
Naoki Otani, Takayasu Kitano, Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2010-138
As a countermeasure for eavesdropping and spoofing attack in wireless communications, new secret key agreement schemes a... [more] AP2010-138
pp.31-36
RCS 2010-06-18
14:00
Kyoto Kyoto Univ. Preliminary Analysis of Terminal Authentication Scheme Based on Radio Propagation
Naoki Otani, Shunichi Kawamura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) RCS2010-42
As a countermeasure for spoofing attack in wireless communication, a new authentication scheme based on radio propagatio... [more] RCS2010-42
pp.145-150
VLD, IPSJ-SLDM 2007-05-11
10:20
Kyoto Kyodai Kaikan A Clock Deskew Method using PDE with Discrete Delay
Yuko Hashizume, Naoki Otani, Yasuhiro Takashima (Univ. of Kitakyushu), Yuichi Nakamura (NEC) VLD2007-9
In deep-submicron technology, process variations can severely affect the performance and the yield of VLSI chips. As a c... [more] VLD2007-9
pp.13-18
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan