|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
ISEC, SITE, LOIS |
2022-11-18 17:45 |
Online |
Online |
Aggregate Entity Authentication with Group Testing Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30 |
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] |
ISEC2022-46 SITE2022-50 LOIS2022-30 pp.100-106 |
ISEC, IT, WBS |
2020-03-11 10:45 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Remark on Improving Aggregate Message Authentication Codes with Detecting Functionality Lu Cao, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2019-111 ISEC2019-107 WBS2019-60 |
An aggregate message authentication code (AMAC) can compress multiple MAC tags into a short aggregate tag. An aggregate ... [more] |
IT2019-111 ISEC2019-107 WBS2019-60 pp.143-150 |
ICSS |
2019-11-13 16:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Study on evaluation system for aggregate message authentication and its application to IoT systems Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67 |
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] |
ICSS2019-67 pp.41-46 |
IT, ISEC, WBS |
2019-03-08 09:00 |
Tokyo |
University of Electro-Communications |
History-Free Sequential Aggregate MAC without Pseudorandom Permutation Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102 |
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] |
IT2018-101 ISEC2018-107 WBS2018-102 pp.155-162 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:10 |
Hokkaido |
San-Refure Hakodate |
Forward-Secure Sequential Aggregate Message Authentication Revisited Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 |
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more] |
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 pp.163-170 |
RCS, NS, USN (Joint) |
2012-07-20 09:00 |
Iwate |
Iwate Univ. |
A Cooperative MAC-Based Protocol for Blacklisting in Network Coded Networks Juan Camilo Corena, Tomoaki Ohtsuki (Keio Univ.) RCS2012-84 |
Network Coding is a dierent paradigm for routing, where intermediate nodes transform incoming packets as they are route... [more] |
RCS2012-84 pp.55-60 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|