IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 38  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:00
Hokkaido Hokkaido Jichiro Kaikan Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
pp.45-51
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] ICSS2021-81
pp.135-140
ISEC 2021-05-19
15:00
Online Online [Invited Talk] Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020)
Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] ISEC2021-8
p.33
AP, SANE, SAT
(Joint)
2020-07-15
15:05
Online Online Numerical investigation on the application of polar codes to free-space quantum key distribution
Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] SAT2020-5
pp.13-18
SeMI, RCS, NS, SR, RCC
(Joint)
2019-07-11
10:40
Osaka I-Site Nanba(Osaka) [Poster Presentation] A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks
Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40
pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI)
CPSY, DC, IPSJ-ARC
(Joint) [detail]
2018-07-30
18:30
Kumamoto Kumamoto City International Center DC2018-18 Wireless sensor networks (hereinafter, referred to as WSNs) are susceptible to eavesdrop, since a sensor node utilizes w... [more] DC2018-18
pp.27-32
IT 2016-07-28
12:05
Fukuoka Seminar House, Fukuoka Univ. Polar coding for bidirectional broadcast channel with non-binary output alphabets
Akinori Inaba, Hideki Yagi (Univ. of Electro-Comm.) IT2016-24
The bidirectional broadcast channel:(BBC), one of the many-to-many communication channels, has a bidirectional relaying ... [more] IT2016-24
pp.19-24
AP 2015-05-21
14:00
Nara Naraken Shakai Fukushi Sougou Center (Kashihara City) [Tutorial Lecture] Information Security at Physical Layer Based on Radio Propagation Characteristics
Hideichi Sasaoka (Doshisha Univ.) AP2015-21
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] AP2015-21
pp.13-18
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] ICSS2014-91
pp.169-174
NS, IN
(Joint)
2015-03-02
09:30
Okinawa Okinawa Convention Center A Multipath Routing Method for Secure Dispersed Data Transfer Method to Consider Varying Node Density in Ad Hoc Networks
Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) NS2014-177
In ad hoc networks utilizing wireless multi-hop communication functions, two or more nodes can communicate with each oth... [more] NS2014-177
pp.7-12
NS, IN
(Joint)
2014-03-07
08:50
Miyazaki Miyazaki Seagia A method for effective routing protocol deployment in Quantum Key Distribution network systems
Yoshimichi Tanizawa, Ririka Takahashi, Alexander R. Dixon (Toshiba) IN2013-159
Quantum Key Distribution (QKD) is a technique to share encryption keys between two adjacent nodes in an unconditionally ... [more] IN2013-159
pp.95-99
LOIS 2013-03-07
14:50
Okinawa   Improved Algorithms for Computing Relational Algebra Operators for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT) LOIS2012-82
We propose algorithms that efficiently computes relational algebra operations over secure function evaluation. Relationa... [more] LOIS2012-82
pp.77-82
NS, IN
(Joint)
2013-03-07
10:00
Okinawa Okinawa Zanpamisaki Royal Hotel On multipath routing method to reduce the number of bottleneck nodes for secure dispersed data transfer in ad hoc networks
Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) IN2012-162
Ad hoc networks are autonomous distributed networks without the fixed communication infrastructures such as base station... [more] IN2012-162
pp.47-52
EMM 2013-01-30
13:30
Miyagi Tohoku Univ. Speech Encryption Method Using Speech Segments for Speech Synthesis
Minoru Kohata (Chiba Institute of Tech.) EMM2012-103
The risk of speech tapping by decryption attack has increased as a result of the increasing availability ofimmense compu... [more] EMM2012-103
pp.71-76
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
14:45
Hokkaido   A Batch Mapping Algorithm for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT) ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28
We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function ev... [more] ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28
pp.195-199
EMM 2012-03-16
10:00
Osaka   Secure Speech Coding Method Using Speech Synthesis
Minoru Kohata (Chiba Insutitute of Tech.) EMM2011-66
Several analog speech encryption methods were proposed so far. Nowadays, most of speech encryptionsystems employs digita... [more] EMM2011-66
pp.13-18
NLP 2011-12-15
13:50
Aomori Iwaki Hall AB, Hirosaki Univ. Applicability of Augmented Lorenz Equations to Chaos-Based Secure Communications
Kenichiro Cho, Takaya Miyano (Ritsumeikan Univ.) NLP2011-119
We have developed a chaotic gas turbine which simulates the dynamical behavior of turbulent Rayleigh-Bénard conve... [more] NLP2011-119
pp.13-18
RCS 2011-06-23
11:50
Okinawa Ryukyu Univ. Personal modulation
Eiji Okamoto (Nagoya Inst. Tech.) RCS2011-43
In this paper, we propose a use of the modulation as a personal identification in wireless communications. In multi-hop ... [more] RCS2011-43
pp.49-54
RCS 2011-04-21
16:05
Kanagawa Keio University [Invited Talk] Information Security in Wireless Communication at Physical Layer Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.) RCS2011-10
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] RCS2011-10
pp.53-58
ISEC, IT, WBS 2011-03-03
13:00
Osaka Osaka University [Invited Talk] Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.) IT2010-72 ISEC2010-76 WBS2010-51
As a countermeasure for the risk to eavesdrop by intercept a wireless communication, it is usual to apply the cryptograp... [more] IT2010-72 ISEC2010-76 WBS2010-51
pp.31-36
 Results 1 - 20 of 38  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan