1 | -- | 0 | Atsushi Fujioka. Foreword |
2 | -- | 10 | Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida. Towards Minimizing RAM Requirement for Implementation of Grain-128a on ARM Cortex-M3 |
11 | -- | 20 | Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto. Laser-Induced Controllable Instruction Replacement Fault Attack |
21 | -- | 32 | Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka. Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications |
33 | -- | 40 | Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto. Efficient Inner Product Functional Encryption with Full-Hiding Security |
41 | -- | 73 | Tatsuaki Okamoto, Katsuyuki Takashima. Decentralized Attribute-Based Encryption and Signatures |
74 | -- | 106 | Katsuyuki Takashima. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption |
107 | -- | 113 | Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura. Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption |
114 | -- | 124 | Yu Zhang, Yansong Zhao, Yifan Wang, Yin Li. Searchable Public Key Encryption Supporting Simple Boolean Keywords Search |
125 | -- | 140 | Keita Emura, Takuya Hayashi 0001. A Revocable Group Signature Scheme with Scalability from Simple Assumptions |
141 | -- | 149 | Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki. A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption |
150 | -- | 164 | Goichiro Hanaoka, Yusuke Sakai 0001, Toshiya Shimizu, Takeshi Shimoyama, SeongHan Shin. A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications |
165 | -- | 172 | Yusuke Sakai 0001, Goichiro Hanaoka. Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model |
173 | -- | 182 | Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. On the Complexity of the LWR-Solving BKW Algorithm |
183 | -- | 194 | Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai 0001, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka. Verifiable Privacy-Preserving Data Aggregation Protocols |
195 | -- | 211 | Seiko Arita, Sari Handa. Fully Homomorphic Encryption Scheme Based on Decomposition Ring |
212 | -- | 214 | Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe 0001. Security of Related-Key Differential Attacks on TWINE, Revisited |
215 | -- | 220 | Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Kui Xu 0001. Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model |
221 | -- | 224 | Shaojing Fu, Yunpeng Yu, Ming Xu 0002. A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations |
225 | -- | 0 | Takayoshi Yokota. Foreword |
226 | -- | 230 | Koichi Sakai. Public Transport Promotion and Mobility-as-a-Service |
231 | -- | 242 | Mahmud Dwi Sulistiyo, Yasutomo Kawanishi, Daisuke Deguchi, Ichiro Ide, Takatsugu Hirayama, Jiang Yu Zheng, Hiroshi Murase. Attribute-Aware Loss Function for Accurate Semantic Segmentation Considering the Pedestrian Orientations |
243 | -- | 251 | Akira John Suzuki, Masahiro Yamamoto, Kiyoshi Mizui. Visible Light V2V Communication and Ranging System Prototypes Using Spread Spectrum Techniques |
252 | -- | 264 | Abraham Monrroy, Eijiro Takeuchi, Shinpei Kato, Masato Edahiro. An Open Multi-Sensor Fusion Toolbox for Autonomous Vehicles |
265 | -- | 267 | Chi-Hua Chen. A Cell Probe-Based Method for Vehicle Speed Estimation |
268 | -- | 0 | Minoru Okada. Foreword |
269 | -- | 277 | Huan-Bang Li, Kenichi Takizawa, Fumihide Kojima. Accelerating Outdoor UWB - Domestic Regulation Transition and Standardization within IEEE 802.15 |
278 | -- | 286 | Takamasa Shimada, Noriko Konno, Atsuya Yokoi, Noriharu Miyaho. Psychological and Physiological Effects of Visible Light Communication Using Versatile CSK Code Patterns |
287 | -- | 294 | Ran Sun, Hiromasa Habuchi, Yusuke Kozawa. Free Space Optical Turbo Coded Communication System with Hybrid PPM-OOK Signaling |
295 | -- | 296 | Deng-Fong Lu, Chin Hsia, Kun-Chu Lee. An Integrated Wideband Operational Transconductance Amplifier with Complementary Slew-Rate Enhancer |
297 | -- | 302 | Yun Zhang, Bingrui Li, Shujuan Yu, Meisheng Zhao. Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication |
303 | -- | 312 | Sou Nobukawa, Hirotaka Doho, Natsusaku Shibata, Haruhiko Nishimura, Teruya Yamanishi. Chaos-Chaos Intermittency Synchronization Controlled by External Feedback Signals in Chua's Circuits |
313 | -- | 324 | Takanori Isobe 0001, Kazuhiko Minematsu. Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE |
325 | -- | 333 | Ramy Taki ElDin, Hajime Matsui. Run-Length Constraint of Cyclic Reverse-Complement and Constant GC-Content DNA Codes |
334 | -- | 345 | Toshihiro Niinomi, Hideki Yagi, Shigeichi Hirasawa. Decision Feedback Scheme with Criterion LR+Th for the Ensemble of Linear Block Codes |
346 | -- | 355 | Shu Fujita, Keita Takahashi, Toshiaki Fujii. Good Group Sparsity Prior for Light Field Interpolation |
356 | -- | 360 | Xingyu Zhang, Xia Zou, Meng Sun 0001, Penglong Wu, Yimin Wang, Jun He. On the Complementary Role of DNN Multi-Level Enhancement for Noisy Robust Speaker Recognition in an I-Vector Framework |
361 | -- | 365 | Wei Jhang, Shiaw-Wu Chen, Ann-Chen Chang. Computationally Efficient DOA Estimation for Massive Uniform Linear Array |
366 | -- | 369 | Deng Tang. A Note on the Algebraic Immunity of the Enhanced Boolean Functions |
370 | -- | 375 | Yang Ding, Xiaohua Lu. Galois Hulls of Cyclic Codes over Finite Fields |
376 | -- | 381 | Feng Liu 0004, Xuecheng He, Conggai Li, YanLi Xu. CsiNet-Plus Model with Truncation and Noise on CSI Feedback |
382 | -- | 388 | Shengnan Yan, Mingxin Liu, Jingjing Si. Distributed Collaborative Spectrum Sensing Using 1-Bit Compressive Sensing in Cognitive Radio Networks |