Online ISSN : 1745-1361

IEICE TRANSACTIONS on Information and Systems
open access publishing via
0.70 1.4 [Whole issue]:PDF (30.9MB)
Volume E99-D No.8  (Publication Date:2016/08/01)
Previous | 
Special Section on Security, Privacy and Anonymity of Internet of Things

pp.1964-1965  FOREWORD  Open Access Paper
Guojun WANG  
Summary | FreeFull Text:PDF(76.3KB)

pp.1966-1973  INVITED PAPER  Open Access Paper
Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things
Huaqun WANG  Keqiu LI  Kaoru OTA  Jian SHEN  
(Publicized: 2016/05/31)  Summary | FreeFull Text:PDF(506.5KB)

pp.1974-1981  INVITED PAPER  Open Access Paper
Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
Remi ANDO  Shigeyoshi SHIMA  Toshihiko TAKEMURA  
(Publicized: 2016/05/31)  Summary | FreeFull Text:PDF(686.3KB)

pp.1982-1990  INVITED PAPER  Open Access Paper
Challenges of Fully Homomorphic Encryptions for the Internet of Things
Licheng WANG  Jing LI  Haseeb AHMAD  
(Publicized: 2016/05/31)  Summary | FreeFull Text:PDF(310.1KB)

pp.1991-2001  PAPER
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense
Zhikai XU  Hongli ZHANG  Xiangzhan YU  Shen SU  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (1MB) >>
Buy this Article

pp.2002-2009  PAPER
BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (654.9KB) >>
Buy this Article

pp.2010-2018  PAPER
MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs
Anfeng LIU  Xiao LIU  He LI  Jun LONG  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (2MB) >>
Buy this Article

pp.2019-2026  PAPER
Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (776.6KB) >>
Buy this Article

pp.2027-2035  PAPER
A Secure RFID Application Revocation Scheme for IoT
Kai FAN  Zhao DU  Yuanyuan GONG  Yue WANG  Tongjiang YAN  Hui LI  Yintang YANG  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (612KB) >>
Buy this Article

pp.2036-2043  PAPER
CloudS: A Multi-Cloud Storage System with Multi-Level Security
Lu SHEN  Shifang FENG  Jinjin SUN  Zhongwei LI  Ming SU  Gang WANG  Xiaoguang LIU  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (968KB) >>
Buy this Article

 | Errata[Uploaded on November 1,2016]

pp.2044-2055  PAPER
A Matrix Based ORAM: Design, Implementation and Experimental Analysis
Steven GORDON  Atsuko MIYAJI  Chunhua SU  Karin SUMONGKAYOTHIN  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (1.6MB) >>
Buy this Article

pp.2056-2060  PAPER
Implementation of µNaCl on 32-bit ARM Cortex-M0
Toshifumi NISHINAGA  Masahiro MAMBO  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (178KB) >>
Buy this Article

pp.2061-2068  PAPER
Behavioral Equivalence of Security-Oriented Interactive Systems
Guanjun LIU  Changjun JIANG  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (563.6KB) >>
Buy this Article

pp.2069-2078  PAPER
Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
Mohammad Rasool SARRAFI AGHDAM  Noboru SONEHARA  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (1.2MB) >>
Buy this Article

pp.2079-2089  PAPER
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  
(Publicized: 2016/05/31)  Summary | Full Text:PDF (494KB) >>
Buy this Article

Regular Section

pp.2090-2099  PAPER-Information Network
Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  
(Publicized: 2016/05/13)  Summary | Full Text:PDF (1.1MB) >>
Buy this Article

pp.2100-2108  PAPER-Information Network
Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority
Komang OKA SAPUTRA  Wei-Chung TENG  Takaaki NARA  
(Publicized: 2016/05/19)  Summary | Full Text:PDF (560.9KB) >>
Buy this Article

pp.2109-2120  PAPER-Information Network  Open Access Paper
Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation
(Publicized: 2016/05/16)  Summary | FreeFull Text:PDF(1MB)

pp.2121-2130  PAPER-Dependable Computing
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems
Hyeongboo BAEK  Jaewoo LEE  Yongjae LEE  Hyunsoo YOON  
(Publicized: 2016/04/22)  Summary | Full Text:PDF (799.9KB) >>
Buy this Article

pp.2131-2139  PAPER-Artificial Intelligence, Data Mining
The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning
(Publicized: 2016/05/17)  Summary | Full Text:PDF (882.6KB) >>
Buy this Article

pp.2140-2150  PAPER-Educational Technology
An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform
(Publicized: 2016/05/19)  Summary | Full Text:PDF (1.5MB) >>
Buy this Article

pp.2151-2160  PAPER-Rehabilitation Engineering and Assistive Technology
Development of Tactile Graph Generation Web Application Using R Statistics Software Environment
Tetsuya WATANABE  Kosuke ARAKI  Toshimitsu YAMAGUCHI  Kazunori MINATANI  
(Publicized: 2016/05/06)  Summary | Full Text:PDF (574.2KB) >>
Buy this Article

pp.2161-2171  PAPER-Pattern Recognition
Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection
Chien-Quang LE  Sang PHAN  Thanh Duc NGO  Duy-Dinh LE  Shin'ichi SATOH  Duc Anh DUONG  
(Publicized: 2016/04/25)  Summary | Full Text:PDF (9MB) >>
Buy this Article

pp.2172-2176  LETTER-Software System
Hierarchical System Schedulability Analysis Framework Using UPPAAL
So Jin AHN  Dae Yon HWANG  Miyoung KANG  Jin-Young CHOI  
(Publicized: 2016/05/06)  Summary | Full Text:PDF (455.9KB) >>
Buy this Article

pp.2177-2181  LETTER-Information Network
Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network
Duc Tiep VU  Kyungbaek KIM  
(Publicized: 2016/05/19)  Summary | Full Text:PDF (293.5KB) >>
Buy this Article

pp.2182-2185  LETTER-Dependable Computing
Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
(Publicized: 2016/05/16)  Summary | Full Text:PDF (399.6KB) >>
Buy this Article

pp.2186-2189  LETTER-Pattern Recognition
Spectral Features Based on Local Hu Moments of Gabor Spectrograms for Speech Emotion Recognition
Huawei TAO  Ruiyu LIANG  Cheng ZHA  Xinran ZHANG  Li ZHAO  
(Publicized: 2016/05/06)  Summary | Full Text:PDF (752.7KB) >>
Buy this Article

pp.2190-2193  LETTER-Image Processing and Video Processing
A Local Characteristic Image Restoration Based on Convolutional Neural Network
Guohao LYU  Hui YIN  Xinyan YU  Siwei LUO  
(Publicized: 2016/05/16)  Summary | Full Text:PDF (1.5MB) >>
Buy this Article

pp.2194-2198  LETTER-Image Processing and Video Processing
Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution
Jun-Sang YOO  Ji-Hoon CHOI  Kang-Sun CHOI  Dae-Yeol LEE  Hui-Yong KIM  Jong-Ok KIM  
(Publicized: 2016/05/16)  Summary | Full Text:PDF (994.6KB) >>
Buy this Article

Previous | 
go to Page Top