|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 14:10 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Joint Design of Transmission Blocklength and Charging Time for Realizing Secure URLLC using Energy Harvesting Kenta Miwa (UEC), Kengo Ando, Giuseppe Abreu (CU), Koji Ishibashi (UEC) RCS2024-101 |
This paper investigates short packet communications that balance reliability, low latency, and secrecy in point-to-point... [more] |
RCS2024-101 pp.88-93 |
RCS |
2022-06-16 10:00 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Secure Precoded OFDM Transmission Using Randomized Unitary Matrix Naoki Isono, Kengo Ando, Koji Ishibashi (UEC) RCS2022-42 |
This paper considers a network consisting of a base station (BS), a legitimate user equipment (UE), and an eavesdropper ... [more] |
RCS2022-42 pp.108-113 |
IT |
2017-07-14 10:25 |
Chiba |
Chiba University (Chiba) |
Polar Codes Achieving Strong Secrecy for Broadcast Channel with Confidential Messages Takahiro Fujita, Hideki Yagi (UEC) IT2017-28 |
Polar codes, invented by Arikan, achieve the capacity of the discrete memoryless channel with low computational and spac... [more] |
IT2017-28 pp.67-72 |
SITE, IPSJ-EIP |
2016-06-02 14:50 |
Kanagawa |
Institute of Information Security (Kanagawa) |
Secrecy Laws in Japan and communication technologies Makoto Koike (MK Microwave Research) SITE2016-4 |
Conventionally, the National Government Official Act, the Local Government Official Act, and the Self Defense Forces Act... [more] |
SITE2016-4 pp.37-41 |
RCS, CCS, SR, SRW (Joint) |
2016-03-02 17:20 |
Tokyo |
Tokyo Institute of Technology (Tokyo) |
A Lower Bound on Secrecy Capacity for MIMO Wiretap Channel Aided by a Cooperative Jammer with Channel Estimation Error Shunya Iwata, Tomoaki Ohtsuki (Keio Univ.) RCS2015-360 |
We consider a multiple-input multiple-output (MIMO) wiretap channel with one transmitter, one receiver, one cooperative ... [more] |
RCS2015-360 pp.163-168 |
SS, MSS |
2016-01-25 14:00 |
Ishikawa |
Shiinoki-Geihin-Kan (Ishikawa) |
A Verification Tool for k-Secrecy of XML Databases and Its Optimization Takatoshi Asai, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2015-43 SS2015-52 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
MSS2015-43 SS2015-52 pp.47-52 |
RCS, SAT (Joint) |
2015-08-18 10:55 |
Fukuoka |
Fukuoka Univ. (Fukuoka) |
Wireless Security Schemes using Random Phases for MISO-OFDM Communications Kaikai Huang, Kazuhiko Fukawa, Yuyuan Chang (Tokyo Tech) RCS2015-150 |
This report proposes new physical-layer security schemes for multiple-input single-output (MISO)-OFDM wireless communica... [more] |
RCS2015-150 pp.109-114 |
RCS |
2015-06-25 10:29 |
Hokkaido |
Hokkaido Univ. (Hokkaido) |
On Secrecy Rate Analysis of MIMO Wiretap Channel Aided by A Cooperative Jammer with Channel Estimation Error Shunya Iwata, Tomoaki Ohtsuki (Keio Univ.) RCS2015-68 |
In this report, we consider multiple-input multiple-output (MIMO) wiretap channel with one transmitter, one receiver, on... [more] |
RCS2015-68 pp.131-136 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|