Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, RCS (Joint) |
2023-12-15 14:25 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Development of a Sensor Network MAC Protocol Verification System using Wireless Modems Kenta Asahi, David Asano, Yasushi Fuwa (Shinshu Univ.) NS2023-147 |
Wireless sensor network systems have different specifications required depending on the environment and applications in ... [more] |
NS2023-147 pp.120-125 |
NS, RCS (Joint) |
2023-12-15 14:50 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Development of a Transition Diagram-Based MAC Protocol Design Environment for Sensor Network Verification Systems Ryo Kobayashi, Asano David, Yasushi Fuwa (Shinshu Univ.) NS2023-148 |
Our wireless sensor network requires new communication protocols to be designed for each specific scenario. We have eval... [more] |
NS2023-148 pp.126-131 |
NS, RCS (Joint) |
2023-12-15 15:15 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Investigation on Shortening the Time to Fix Transmission Timing in Wireless Sensor Networks Using Reinforcement Learning Kureha Ikeda, Yasushi Fuwa, David Asano (Shinshu Univ.) NS2023-149 |
This study proposes a novel approach to optimizing transmission timing in Wireless Sensor Networks (WSNs) by applying re... [more] |
NS2023-149 pp.132-137 |
RCC, ISEC, IT, WBS |
2023-03-15 11:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input Yuji Suga (IIJ) IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112 |
We consider card-based protocols in which the input is defined by a Likert scale and the output is only the closeness of... [more] |
IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112 pp.297-304 |
RCS, NS (Joint) |
2022-12-15 15:45 |
Aichi |
Nagoya Institute of Technology, and Online (Primary: On-site, Secondary: Online) |
A method to shorten the time to determine transmission timing at terminals and transponders in wireless sensor networks Keiichiro Sonoda, Yasushi Fuwa, David Asano (Shinshu Univ.) NS2022-138 |
In a wireless sensor network system consisting of terminals that periodically transmit information and transponders that... [more] |
NS2022-138 pp.48-53 |
VLD, HWS [detail] |
2022-03-08 09:30 |
Online |
Online |
A Study on Interface Circuits Using Click Element Between Synchronous-asynchronous Domains Shogo Semba, Hiroshi Saito (UoA) VLD2021-91 HWS2021-68 |
In this paper, we propose interface circuits using Click Element between synchronous and asynchronous domains. The propo... [more] |
VLD2021-91 HWS2021-68 pp.81-86 |
ISEC |
2021-05-19 10:00 |
Online |
Online |
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1 |
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] |
ISEC2021-1 pp.1-8 |
NS |
2021-04-16 13:50 |
Online |
Online |
A Metamodel for Network Configuration Information Nagi Arai, Hikofumi Suzuki, Shinpei Ogata, Kozo Okano (Shinshu Univ) NS2021-14 |
In terms of communication protocols and network device configuration information used at the Layer 3 level and above, it... [more] |
NS2021-14 pp.77-82 |
NS, ICM, CQ, NV (Joint) |
2019-11-22 11:15 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
A Note on Routing Protocol Utilizing Drones in Delay Tolerant Networks Katsuyuki Takenaka, Kazuya Sakai (TMU) NS2019-132 |
In Delay tolerant networks, many routing protocols only using nodes which have probabilistic behavior are proposed. Howe... [more] |
NS2019-132 pp.67-70 |
CS, CQ (Joint) |
2019-04-18 14:35 |
Osaka |
Osaka Univ. Library |
Revealing Benefits of Quality-based Routing Aomi Jokoji (UVic), Takuto Kimura, Arifumi Matsumoto, Jun Okamoto (NTT) CQ2019-4 |
Current Internet backbone routing is topology-based, which selects routes with the shortest AS-path length. Therefore, c... [more] |
CQ2019-4 pp.19-24 |
IN, NS (Joint) |
2019-03-04 10:10 |
Okinawa |
Okinawa Convention Center |
Transmission Delay Evaluations of IoT Communication Protocols over IoT Networks Hibiki Sekine, Kenji Kanai, Jiro Katto (Waseda Univ.) NS2018-213 |
In recent years, the era of Internet of Things (IoT) has been approaching, and massive IoT devices are connecting to the... [more] |
NS2018-213 pp.117-122 |
RCS, NS (Joint) |
2018-12-20 09:30 |
Hiroshima |
Onomichi City Hall |
An Autonomous Arbitration Protocol for the Transmission Timing of Terminals and Transponders in Wireless Sensor Networks Satono Masuda, David Asano, Yasushi Fuwa (Shinshu Univ.), Mitsuru Komatsu (Okayama Univ.), Masato Futagawa (Shizuoka Univ.) RCS2018-216 |
At present, we are developing hiker monitoring system using LoRa as one type of system to protect regional security and ... [more] |
RCS2018-216 pp.1-6 |
IT |
2018-12-18 15:50 |
Fukushima |
Spa Resort Hawaiians |
[Invited Talk]
Secure Delegated Quantum Computation Takeshi Koshiba (Waseda Univ.) IT2018-33 |
In this manuscript, we take secure delegated quantum computation (SDQC).
First, we explain the basics of measurement-ba... [more] |
IT2018-33 pp.13-18 |
COMP |
2018-09-18 13:00 |
Fukuoka |
Kyusyu Institute of Technology |
Mediated population protocols with a base station for line and ring construction Yuumi Yoshikawa, Yuuichi Sudou (Osaka Univ.), Fukuhito Ooshita (NAIST), Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2018-12 |
A mediated population protocol model is a computational model that abstracts a wireless network composed of numerous low... [more] |
COMP2018-12 pp.23-27 |
ISEC |
2018-05-16 11:30 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
The Minimum Number of Cards in Practical Card-Based Protocols (from ASIACRYPT 2017) Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-4 |
In this invited talk, we introduce the paper ``The Minimum Number of Cards in Practical Card-Based Protocols'' by J. Kas... [more] |
ISEC2018-4 p.25 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105 |
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] |
IT2017-124 ISEC2017-112 WBS2017-105 pp.121-128 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106 |
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more] |
IT2017-125 ISEC2017-113 WBS2017-106 pp.129-135 |
ISEC |
2017-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42 |
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] |
ISEC2017-42 pp.7-14 |
COMP, ISEC |
2016-12-21 15:10 |
Hiroshima |
Hiroshima University |
A Loosely-Stabilizing Population Protocol for Maximal Independent Set Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) ISEC2016-78 COMP2016-39 |
Self–stabilizing population protocols are impossible to design for some problems. For example, leader election on ... [more] |
ISEC2016-78 COMP2016-39 pp.43-49 |
CQ |
2016-08-30 15:25 |
Ibaraki |
Tsukubasan |
Throughput Analysis of CSMA with Imperfect Collision Detection in WLAN Systems Megumi Kaneko (NII), Tomoo Hirose (Kyoto Univ.) CQ2016-70 |
[more] |
CQ2016-70 pp.117-121 |