|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:45 |
Hokkaido |
San-Refure Hakodate |
Data authentication scheme suitable for broadcast in the sensor networks Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 |
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] |
ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 pp.155-162 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:50 |
Aomori |
Hirosaki University |
Image Authentication with Access Control Based on Reversible Data Hiding Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2010-19 SITE2010-15 ICSS2010-25 |
This paper proposes an image authentication with access control based on reversible data hiding. The proposed method gen... [more] |
ISEC2010-19 SITE2010-15 ICSS2010-25 pp.81-86 |
WBS, IT, ISEC |
2009-03-10 13:00 |
Hokkaido |
Hakodate Mirai Univ. |
A Note on the Security of Cryptographic Hash Functions Shoichi Hirose (Univ. Fukui) IT2008-85 ISEC2008-143 WBS2008-98 |
This article discusses relationships between preimage resistance, second-preimage resistance and universal one-wayness o... [more] |
IT2008-85 ISEC2008-143 WBS2008-98 pp.267-271 |
SIP, IE |
2008-04-17 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Hierarchical Encryption Method for JPEG 2000 Coded Images with Sub-Resistance to Collusion Attacks Noriaki Hashimoto (Tokyo Inst. of Tech.), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2008-1 IE2008-1 |
This paper proposes an encryption method to enable hierarchical access
controls for JPEG 2000 codestreams. The proposed... [more] |
SIP2008-1 IE2008-1 pp.1-6 |
WBS, SIP |
2007-08-07 10:55 |
Kochi |
Green Hall (2nd fl.), Kochi Green-Kaikan |
On Applying Cipher to the Lossless Image Tamper Detection Method Ryo Hosaka, Seungwu Han, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2007-77 WBS2007-26 |
This paper improves the tamper detecting ability of the conventional lossless image tamper detection method by applying ... [more] |
SIP2007-77 WBS2007-26 pp.31-36 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|