|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2023-12-17 14:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
The universality of the second law of information thermodynamics in quantum feedback protocols Shintaro Minagawa (Nagoya Univ.), M. Hamed Mohammady (ULB), Kenta Sakai, Kohtaro Kato, Francesco Buscemi (Nagoya Univ.) |
Maxwell’s demon is a paradox in which feedback control appears to violate the second law of thermodynamics. Maxwell’s de... [more] |
|
AP, SANE, SAT (Joint) |
2023-07-12 14:40 |
Hokkaido |
The Citizen Activity Center (Primary: On-site, Secondary: Online) |
Improvement of key generation efficiency of free-space optical physical layer cryptography using polar code Ryuto Terada (Nitech), Hiroyuki Endo (NICT), Kensuke Yamaura, Eiji Okamoto (Nitech), Mitsuo Kitamura (NICT), Ryosuke Shimizu (UEC), Morio Toyoshima, Mikio Hujiwara, Masahide Sasaki (NICT) SAT2023-12 |
Quantum key distribution is known as a secure key sharing technology against all physically possible attacks. However, t... [more] |
SAT2023-12 pp.13-18 |
EMM, IT |
2023-05-11 13:50 |
Kyoto |
Rakuyu Kaikan (Kyoto Univ. Yoshida-South Campus) (Primary: On-site, Secondary: Online) |
A Note on a New Method for Reducing Computation Time in Private Coded Computation Atsushi Miki, Shenzhe Gao, Koki Kazama, Toshiyasu Matsushima (Waseda Univ.) IT2023-3 EMM2023-3 |
Coded Computation is a mechanism for accelerating computations through distributed processing using multiple servers. Th... [more] |
IT2023-3 EMM2023-3 pp.12-17 |
RCC, ISEC, IT, WBS |
2023-03-15 13:00 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
An Achievable Cost Region for Information Erasure Using a Common Random Number for Distributed Information Tetsunao Matsuta (Saitama Univ.) IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132 |
Confidential information kept by companies and individuals is often stored in a storage device. Considering the migratio... [more] |
IT2022-135 ISEC2022-114 WBS2022-132 RCC2022-132 pp.427-432 |
IT, ISEC, WBS |
2019-03-08 10:50 |
Tokyo |
University of Electro-Communications |
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC) IT2018-118 ISEC2018-124 WBS2018-119 |
In Wyner's wiretap channel, information leakage is defined as mutual information between transmitter's messages and eave... [more] |
IT2018-118 ISEC2018-124 WBS2018-119 pp.263-268 |
IT |
2018-07-19 15:55 |
Nara |
Yamato Kaigishitsu |
On the Minimum Cost of Information Erasure for Stationary Memoryless Sources Naruaki Amada, Hideki Yagi (Univ. of Electro-Comm.) IT2018-17 |
In order to erase data including confidential information stored in the storage device, overwriting an unrelated and ran... [more] |
IT2018-17 pp.25-29 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|