Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 14:40 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Illumination-light xASK-CodeSK System using (2,2)-Threshold Secret Sharing Scheme Junya Yada, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(To be available after the conference date) [more] |
|
RCS |
2022-06-17 15:20 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66 |
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] |
RCS2022-66 pp.247-252 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) ICSS2021-81 |
A secret sharing scheme that can be executed on a single server using TTP has been proposed. In this method, the entire ... [more] |
ICSS2021-81 pp.135-140 |
RCS |
2021-06-23 10:30 |
Online |
Online |
A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35 |
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] |
RCS2021-35 pp.37-42 |
WBS, MICT |
2019-07-16 12:30 |
Ibaraki |
Ibaraki University(Mito Campus) |
[Poster Presentation]
A Study of Data Transmission Scheme in Interference Area of VN-CSK Illumination Light Communication Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2019-13 MICT2019-14 |
The Variable N-parallel code-shift-keying (VN-CSK) system has been proposed for solving the dimming control problem and ... [more] |
WBS2019-13 MICT2019-14 pp.17-22 |
QIT (2nd) |
2018-06-04 13:20 |
Hiroshima |
ICCH Ran |
[Poster Presentation]
Proposal of simple authentication and secret-key-sharing system using a threshold-type single photon detector Shin Arahira, Hitoshi Murai (OKI) |
We report a quantum-mechanics-based authentication and secret-key-sharing system using intensity modulated light pulses ... [more] |
|
IT, SIP, RCS |
2017-01-19 13:05 |
Osaka |
Osaka City Univ. |
A study on application of one time pad to enhance information secrecy in wireless distributed transmission Jingbo Zou (Hiroshima Univ.), Masaaki Yamanaka (JCGA), Shuichi Ohno (Hiroshima Univ.), Shinichi Miyamoto (Wakayama Univ.), Seiichi Sampei (Osaka Univ.) IT2016-60 SIP2016-98 RCS2016-250 |
The authors have proposed a secure distributed transmission method by providing multiple transmission routes to a destin... [more] |
IT2016-60 SIP2016-98 RCS2016-250 pp.81-86 |
ICSS, IA |
2016-06-06 15:40 |
Saga |
Saga University |
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4 |
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] |
IA2016-4 ICSS2016-4 pp.19-24 |
RCS, IN (Joint) |
2015-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Using Signal Strength to prevent sessinon hijacking in IEEE 802.11 Nariaki Tamaki, Takehiro Kawata (NTT) IN2015-12 |
We propose a method for detecting malicious frames used to disconnect legitimate sessions, and preventing session hijack... [more] |
IN2015-12 pp.55-60 |
SWIM |
2014-05-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4 |
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] |
SWIM2014-4 pp.19-24 |
SIS |
2013-12-13 13:10 |
Tottori |
Torigin Bunka Kaikan (Tottori) |
A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding Shoichiro Yamasaki, Tomoko K. Matsushima, Shigeyoshi Ohno (Polytechnic Univ.) SIS2013-51 |
A secret sharing is a method in which the source information is divided into n shares and the source data is reconstruct... [more] |
SIS2013-51 pp.131-136 |
EMM |
2013-01-30 11:10 |
Miyagi |
Tohoku Univ. |
A Secret Sharing Method for String Data Incorporating Their Transformation Kana Tsukui, Hidetoshi Yokoo (Gunma Univ.) EMM2012-100 |
Most real data are essentially string data, i.e., sequences of symbols.
This paper proposes a practical secret sharing... [more] |
EMM2012-100 pp.53-58 |
QIT (2nd) |
2012-11-27 11:20 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
A Quantum Relay using Quantum Scret Sharing Takashi Suzuki, Akihisa Tomita (Hokkaido Univ) |
In order to relax the demand for the trusted relay points in a quantum relay, we propose a protocol of the quantum relay... [more] |
|
AP |
2012-03-16 10:25 |
Shizuoka |
Chuo public hall (Atami City) |
Active Tapping Approach against Wireless Secret Key Sharing System Katsuhiro Fujiki, Tadafumi Yoshida, Takafumi Saito, Naoki Sakai, Hideyuki Uehara, Takashi Ohira (Toyohashi Tech) AP2011-206 |
Against the wireless secret key sharing system, this paper proposes a new active tapping approach that uses generation o... [more] |
AP2011-206 pp.43-48 |
IA, ICSS |
2011-06-17 10:25 |
Fukuoka |
Kyushu Institute of Technology |
Secure and Traceable Online Image Sharing Scheme for Service Providers Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2011-8 ICSS2011-8 |
We propose a scheme for application service providers to provide a secure and traceable online image sharing service. To... [more] |
IA2011-8 ICSS2011-8 pp.41-46 |
AN, USN, SR, RCS (Joint) |
2010-10-28 09:30 |
Osaka |
Osaka University |
Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22 |
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] |
RCS2010-116 SR2010-49 AN2010-26 USN2010-22 pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN) |
IPSJ-AVM, MoNA |
2010-07-16 10:55 |
Hokkaido |
Hokkaido Univ. |
An Approach to Reduce Illegal Content Redistributions of P2P Video Sharing System Using Multiple Secret Sharing Scheme Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Univ. of Tokyo.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) MoMuC2010-23 |
CGM (Consumer Generated Media) based video sharing services are one of the killer applications among the current Interne... [more] |
MoMuC2010-23 pp.57-62 |
ISEC |
2010-05-21 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Attribute-based Encryption Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6 |
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] |
ISEC2010-6 pp.33-39 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |
IN, NS (Joint) |
2009-03-03 10:30 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
An Approach to Reduce Illegal Content Redistributions on P2P Video Sharing System and Its Evaluation Liang Wang, Yoshihiro Kawahara, Tohru Asami (The Univ. of Tokyo) IN2008-149 |
CGM(Consumer Generated Media) based video sharing service are one of the killer applications among the current Internet ... [more] |
IN2008-149 pp.103-108 |