|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2011-02-28 16:30 |
Kagoshima |
KKR Kagoshima Keitenkaku |
[Invited Talk]
Secure Photonic Networks
-- Potential Attacks and Security Enhancement -- Ken-ichi Kitayama (Osaka Univ.), Masahide Sasaki (NICT), Soichiro Araki (NEC), Makoto Tsubokawa (Waseda Univ.), Akihisa Tomita (Hokkaido Univ.), Kyo Inoue (Osaka Univ.), Katsuyoshi Harasawa (Hitachi information & Communication Eng), Yuki Nagasako (NTT Labs.), Atsushi Takada (Tokushima Univ) PN2010-68 |
[more] |
PN2010-68 pp.65-68 |
CS, OCS (Joint) |
2010-01-29 11:20 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111 |
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] |
OCS2009-111 pp.67-71 |
OPE, LQE, OCS |
2009-10-22 16:35 |
Fukuoka |
|
An Evaluation on Eavesdropper's Capability for Intensity Modulated Y-00 Cryptosystem Yuki Nagasako (nternet Research Inst/Tamagawa Univ.) OCS2009-57 OPE2009-123 LQE2009-82 |
Yuen 2000 Protocol (Y-00) is a multi-signal level quantum transmission system that utilizes quantum noises to establish ... [more] |
OCS2009-57 OPE2009-123 LQE2009-82 pp.81-86 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|