[1] Tadao KASAMI, Toru FUJIWARA, Toyoo TAKATA and Shu LIN: ``A Cascaded Coding Scheme for Error Control'', 1986 IEEE International Symposium on Information Theory (Abstracts of Papers), p.~138 (October 1986). [2] Shu LIN, Tadao KASAMI, Toyoo TAKATA and Toru FUJIWARA: ``An Interleaved Error Control Coding Scheme for Satellite and Space Communications'', IEEE/IEICE Global Telecommunications Conference 1987 Conference Record, Vol.~1, pp.~292--296 (November 1987). [3] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``Cascaded Error Control Systems with Block Coded M-ary PSK Inner Codes'', 1888 IEEE International Symposium on Information Theory (Abstracts of Papers), pp.~166--167 (June 1988). [4] Toyoo TAKATA, Toru FIJIWARA, Tadao KASAMI and Shu LIN: ``An Error Control Coding Scheme with Cascaded FEC Supported by Parity Retransmissions'', 1988 IEEE International Symposium on Information Theory (Abstracts of Papers), pp.~212--213 (June 1988). [5] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA, Shu LIN and Daniel J. Costtelo, Jr.: ``Cascaded Coding for Error Control'', Proceedings of 1988 Beijing International Workshop on Information Theory, pp.~E-1.1--E-1.4 (July 1988). [6] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``A Concatenated Coded Modulation Scheme for Error Control'', IEEE Global Telecommunications Conference 1988 Conference Record, Vol.~2, pp.~27.2.1--27.2.5 (November 1988). [7] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Multi-Level Block Modulation Codes'', 1990 IEEE International Symposium on Information Theory (Abstract of Papers), p.~125 (January 1990). [8] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Linear Structure and Phase Rotation Invariant Properties of Block $2^{\ell}$-ary Modulation Codes'', 1990 IEEE International Symposium on Information Theory (Abstract of Papers), p.~125 (January 1990). [9] Toyoo TAKATA, Satoshi UJITA, Tadao KASAMI and Shu LIN: ``A Multi-Stage Decoding for Multi-Level Block Modulation Codes and Its Error Probability Analysis'', Proceedings of 1990 International Symposium on Information Theory and Its Applications, Vol.~1, pp.~123--126 (November 1990). [10] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``Trellis Diagram Construction for Some BCH Codes'', Proceedings of 1990 International Symposium on Information Theory and Its Applications, Vol.~1, pp.~139--142 (November 1990). [11] Toyoo TAKATA, Satoshi UJITA, Yuji YAMASHITA, Tadao KASAMI and Shu LIN: ``Multi-Stage Decoding for Multi-Level Block Modulation Codes and Its Performance Analysis'', Proceedings of the 1991 IEEE International Symposium on Information Theory, p.~1 (June 1991). [12] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Complexity of Trellis Structure of Linear Block Codes'', Proceedings of the 1991 IEEE International Symposium on Information Theory, p.~6, (June 1991). [13] Toyoo TAKATA, Yuji YAMASHITA, Toru FUJIWARA and Tadao KASAMI: ``Multi-stage Decoding of Decomposable Block Modulation Code'', Proceedings of the Abstracts of 1992 IEEE Information Theory Workshop, pp.~33--34 (June 1992). [14] Tadao KASAMI, Toru FUJIWARA, Toyoo TAKATA and Shu LIN: ``Evaluation of the Block Error Probability of Block Modulation Codes by the Maximum-likelihood Decoding for an AWGN Channel,'' Proceedings of 1993 IEEE International Symposium on Information Theory, p.~68 (January 1993). [15] Toyoo TAKATA, Tadao KASAMI, Toru FUJIWARA, Kenichi TOMITA and Shu LIN: ``On Error Performance Analysis of Closest Coset Decoding,'' Proceedings of 1993 IEEE Information Theory Workshop, pp.~5--6 (June 1993). [16] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Structural Complexity of the $L$-section Minimal Trellis Diagrams for Binary Linear Block Codes,'' Proceedings of 1993 IEEE Information Theory Workshop, pp.~51--52 (June 1993). [17] Toyoo TAKATA, Kenichi TOMITA, Tadao KASAMI and Shu LIN: ``On Error Performance Analysis of Closest Coset Decoding,'' Proceedings of 1994 IEEE International Symposium on Information Theory, p.~474 (June 1994). [18] Tadao KASAMI, Toyoo TAKATA, Kouichi YAMASHITA, Toru FUJIWARA and Shu LIN: ``On Bit Error Probability of a Concatenated Coding Scheme,'' Proceedings of International Symposium on Information Theory and Its Applications 1994, Vol.~1, pp.~1--6 (November 1994). [19] Tadao KASAMI, Takuya KOUMOTO, Toyoo TAKATA, and Shu LIN: ``The Least Stringent Sufficient Condition on the Optimality of Suboptimally Decoded Codewords,'' Proceedings of the 1995 IEEE International Symposium on Information Theory, p.~470 (September 1995). [20] Takuya KOUMOTO, Toyoo TAKATA, Tadao KASAMI and Shu LIN: ``An Iterative Soft-Decision Decoding Algorithm,'' Proceedings of the 1996 International Symposium on Information Theory and its Applications, pp.~806--810 (September 1996). [21] Kenichi TOMITA, Toyoo TAKATA and Tadao KASAMI: ``A New Evaluation Method of a Block Error Probability of a Block Code over an AWGN Channel,'' Proceedings of the 1997 IEEE International Symposium on Information Theory, p.~305 (June 1997). [22] Marc P.C. FOSSORIER, Takuya KOUMOTO, Toyoo TAKATA, Tadao KASAMI and Shu LIN: ``The Least Stringent Sufficient Condition on the Optimality of a Suboptimally Decoded Codeword Using the Most Reliable Basis,'' Proceedings of the 1997 IEEE International Symposium on Information Theory, p.~430 (June 1997). [23] Jun ASATANI, Toyoo TAKATA and Tadao KASAMI: ``Suboptimum Soft-Input/Soft-Output Decoding of Decomposable Codes,'' Proceedings of the 1998 International Symposium on Information Theory and its Applications, Vol.~1, pp.~98--101 (October 1998). [24] Kenitchi TOMITA, Toyoo TAKATA, Masaaki MORI and Tadao KASAMI: ``An Efficient Evaluation Method of the Block Error Probability by Using an Importance Sampling Technique,'' Proceedings of the 2000 International Symposium on Information Theory and its Applications, Vol.~1, pp.~172--175 (November 2000). [25] Jun ASATANI, Kenitchi TOMITA, Toyoo TAKATA and Tadao KASAMI: ``An Evaluation Method of Error Performance of Reed-Muller Codes by Using a Minumum Distance Search,'' Proceedings of the 2002 International Symposium on Information Theory and its Applications, Vol.~1, pp.~419--422 (October 2002). [26] Bhed Bahadur BISTA, Goutam CHAKRABORTY and Toyoo TAKATA: ``An Efficient RP(Rendezvous Point) Replacement Mechanism for Rendezvous-based Multicast Routing,'' Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems Workshops, pp.~514--518 (May 2003). [27] Toyoo TAKATA, Bhed B. BISTA and Tomikazu SATO: ``Personal Identification Schemes by Using a Mobile Phone,'' Proceedings of the 6th International Symposium on Wireless Personal Multimedia Communications, pp.~V3-510--V3-515, (October 2003). [28] Michitaka YOSHIMOTO, Bhed Bahadur BISTA and Toyoo TAKATA: ``Development of Security Scanner with High Usability,'' Proceedings of the 18th International Conference on Advanced Information Networking and Applications, pp.~139--144, (March 2004). %% FIT, Fukuoka, Japan, March 29--31, 2004. [29] Takuya FUKASAWA, Jiahong WANG, Toyoo TAKATA and Masatoshi MIYAZAKI: ``An Effective Distributed Privacy-Preserving Data Mining Algorithm,'' Proceedings of the Fifth International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2004), Lecture Notes in Computer Science, Vol.~3177, Springer-Verlag, pp.320--325, (August 2004). [30] Toyoo TAKATA, Hiroyuki ITOH, Bhed Bahadur BISTA and Tomikazu SATO: ``Security and Usability of Personal Identification Schemes by Using a Mobile Phone,'' Proceedings of the 7th International Symposium on Wireless Personal Multimedia Communications, pp.~V3-177--V3-181, (September 2004). [31] Shintaro URABE, Jiahong WANG and Toyoo TAKATA: ``A Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining,'' Proceedings of the 16th IASTED International Conference on Parallel Distributed Computing and Systems (PDCS 2004), ACTA Press, pp.~626--631, (November 2004). [32] Michitaka YOSHIMOTO, Bhed Bahadur BISTA and Toyoo TAKATA: ``Development of Security Scanner with High Portability and Usability,'' Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA2005), Vol.~2, pp.~407--410, (March 2005). [33] Jiahong WANG, Yoshiaki ASANUMA, Eiichiro KODAMA and Toyoo TAKATA: ``A Scalable Sequential Pattern Mining Algorithm,'' Proceedings on the 4th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-06), pp.~437--444 (March 2006). [34] Tsuyoshi CHIBA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``DoS Packet Filter Using DNS Information,'' Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vol.~1, pp.~126--131, (April 2006). [35] Atsumu WATANABE, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``On a Watermarking Scheme for MusicXML,'' Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vol.~2, pp.~894--898, (April 2006). [36] Takashi HAMMA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks,'' Proceedings of the 17th International Conference on Database and Expert Systems Applications (DEXA2006), Vol.~?, pp.~66--70, (September 2006). [37] Yuusuke KIMURA, Atsumu WATANABE, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``Referrer Spam Blocking Scheme,'' Proceedings of the First International Workshop on Security (IWSEC2006) --Short Papers--, pp.~15--24 (October 2006). [38] Hiroyuki TANAKA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``Reliability Improved Port Knocking Scheme,'' Proceedings of the 2006 International Symposium on Information Theory and Its Applications (ISITA2006), pp.~275--279 (October 2006). [39] Takashi KATOH, Hiroki KUZUNO, Takuya KAWAHARA, Atsumu WATANABE, Yushi NAKAI, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Wide Area Log Analyzing System Based on Mobile Agents,'' Proceedings of International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC2006), 7 pages (November 2006). [40] Shintarou URABE, Jiahong WANG, Eiichiro KODAMA and Toyoo TAKATA: ``A High Collusion-Resistant Approach to Distributed Privacy-Preserving Data Mining,'' Proceedings of the IASTED International Conference on Parallel Distributed Computing and Networks (PDCS 2007), ACTA Press, pp.~326--331, (February 2007). [41] Yuuki YAMADA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``A New Approach to Early Detection of an Unknown Worm,'' Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia (AINA2007), pp.~194--198, (May 2007). [42] Michitaka YOSHIMOTO, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study,'' Proceedings of the 1st International Conference on Network-Based Information Systems (NBiS2007), pp.~127--136, (September 2007). [43] Satoshi KAMIDATE, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``Fault-tolerant ZHLS Routing Protocol for Wireless Mobile Ad Hoc Network,'' Proceedings of the 7th WSEAS International Conference on Multimedia, Internet \& Video Technologies, pp.~247--252, (September 2007). [44] Hiroyuki TANAKA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Port Knocking Scheme for Mobile Computing,'' Proceedings of the 10th International Symposium on Wireless Personal Multimedia Communications (WPMC2007), pp.~1024--1027 (December 2007). [45] Bhed Bahadur BISTA, Satoshi KAMIDATE, Takashi KATOH and Toyoo TAKATA: ``Improving the Fault Resilience of Routing Protocol for Wireless Mobile Ad Hoc Network'', Proceedings of the 2nd International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2008), pp.~74--79 (March 2008). [46] Yuusuke KIMURA, Atsumu WATANABE, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``Improvement of Referrer Spam Blocking System,'' Proceedings of the 2008 International Symposium on Information Theory and Its Applications (ISITA2008), pp.~1037--1041 (December 2008). [47] Ryo HATAKEYAMA, Jiahong WANG, Eiichiro KODAMA and Toyoo TAKATA: ``Collaboratively Mining Maximal Frequent Pattern Relations without Disclosing Private Data,'' Proceedings of the IASTED International Conference on Parallel and Distributed Computing Networks (PDCN2009), pp.175--180 (February 2009). [48] Masaki NARITA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents,'' Proceedings of the 7th German Conference on Multiagent System Technologies (MATES09), LNAI 5774, pp.~91--102, (September 2009). [49] Jiahong WANG, Eiichiro KODAMA, Toyoo TAKATA and Jie LI: ``Mining Context-Related Sequential Patterns for Recommendation Systems,'' Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP'10), pp.269--274 (March 2010). [50] Masayuki FUKUMITSU, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System,'' Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA2010), pp.~438--445, (April 2010). [51] Hirotaka TAZAWA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``A User Authenticaion Scheme Using Multiple Passphrases and Its Arrangement,'' Proceedings of the 2010 International Symposium on Information Theory and Its Applications (ISITA2010), pp.~554--559, (October 2010). [52] Jiahong WANG, Takaaki MIKAMI, Kazuki KANAMORI, Eiichiro KODAMA and Toyoo TAKATA: ``An Effective Approach to Improving Packet Delivery Fraction of Ad Hoc Network,'' Systems,'' Proceedings of the International MultiConference of Engineers and Computer Scientists 2011, (IMECS 2011), pp.681--686 (March 2011). [53] Masaki NARITA, Takashi KATOH, Bhed Bahadur BISTA and Toyoo TAKATA: ``Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace,'' Proceedings of the 25th International Conference on Advanced Information Networking and Applications, Workshops (AINA2011), pp.~341--348, (March 2011). [54] Nan MENG, Eiichiro KODAMA, Jiahong WANG and Toyoo TAKATA: ``Enhancing Sensor Network Security by Reducing Radio-Wave Leakage,'' Proceedings of 6th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA2011), pp.~339--344, (October 2011). [55] Jiahong WANG, Yuhiro YONAMINE, Takashi IOKAWA, Eiichiro KODAMA and Toyoo TAKATA: ``An Approach to Creating and Maintaining House-Watching Network in MANET,'' Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, (IMECS 2012), pp.434--439 (March 2012). [56] Takayuki MATSUDO, Eiichiro KODAMA, Jiahong WANG and Toyoo TAKATA: ``A Proposal of Security Advisory System at the Time of the Installation of Application on Android OS,'' Proceedings of the 15th International Conference on Network-Based Information Systems (NBiS2012), pp.~261--267, (September 2012). [57] Takashi IOKAWA, Yuhiro YONAMINE, Jiahong WANG, Eiichiro KODAMA and Toyoo TAKATA: ``Supporting Communication in Time of Disaster,'' Proceedings of 7th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA2012), pp.~379--384, (November 2012). [58] Masaki NARITA, Bhed Bahadur BISTA and Toyoo TAKATA: ``Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports,'' Proceedings of the 27th International Conference on Advanced Information Networking and Applications (AINA2013), pp.~98--105, (March 2013). [59] Jiahong WANG, Yuhiro YONAMINE, Eiichiro KODAMA and Toyoo TAKATA: ``Sleep Thrashing and Its Prevention in Ad Hoc Networks,'' Proceedings of the 2013 I IEEE International Conference of IEEE Region 10 (TENCON 2013), pp.~1--4, (October 2013). [60] Jiahong WANG, Yuhiro YONAMINE, Eiichiro KODAMA and Toyoo TAKATA: ``A Distributed Approach to Constructing k-Hop Connected Dominating Set in Ad Hoc Networks,'' Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2013), pp.~357--364, (December 2013). [61] Bhed Bahadur BISTA, Arata FUKUSHI, Toyoo TAKATA and Danda B. RAWAT: ``Link Based Energy Saving Method for OpenFlow Based Networks,'' Proceedings of the 2014 International Conference on Green and Human Information Technology, (February 2014). [62] Shizuka SATO, Eiichiro KODAMA, JiaHong WANG, Toyoo TAKATA: ``An Onomatopoeia-based Web Music Video Searching System and its Performance Evaluation,'' Proceedings of the 16th International Conference on Human-Computer Interaction (HCI International 2014), 6 pages (June 2014). [63] Masaki NARITA, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Location Attack,'' Proceedings of the 17th International Conference on Network-Based Information Systems (NBiS 2014), pp.~271--278 (September 2014). [64] Tomoaki TSUCHIKAWA, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Proposal of Distributed Management Scheme of Content Key Information for Pure P2P Networks,'' Proceedings of the 2014 International Symposium on Information Theory and Its Applications (ISITA2014), M-3-E.5, 5 pages (October 2014). [65] Shingo SASAKI, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Proposal of QoS-Aware Power Saving Scheme for SDN-based Networks,'' Proceedings of the 18th International Conference on Network-Based Information Systems (NBiS 2015), pp.~71--77 (September 2015). [66] Yasushi HOSOKAWA, Shoi HIGASHIYAMA, Akio DOI, Toyoo TAKATA: ``A Study on Virtual Avatar Diving Motion for Standing Type Female Diver Virtual Experience System,'' Proceeding of the 21st International Symposium on Artificial Life and Robotics 2016 (AROB 21st 2016), pp.~483--486 (January 2016). [67] Masaki NARITA, Keisuke KAMADA, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet,'' Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS 2016), pp.~76--83 (September 2016). [68] Tetsuya HIRAKAWA, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Defense Method against Distributed Slow HTTP DoS Attack,'' Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS 2016), pp.~152--158 (September 2016). [69] Hiroya TAKAHASHI, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``A User Authentication Scheme Using Keystrokes for Smartphones while Moving,'' Proceedings of the 2016 International Symposium on Information Theory and Its Applications (ISITA2016), pp.~315--319 (November 2016). [70] Bhed Bahadur BISTA, Jiahong WANG and Toyoo TAKATA: ``Mechanism for Adopting Device-to-Device Communication in Cellular Networks,'' Proceedings of the 20th International Conference on Network-Based Information Systems (NBiS 2017), pp.~306--316 (August 2017). [71] Bhed Bahadur BISTA, Shingo SASAKI, Kanayo OGURA and Toyoo TAKATA: ``Reducing Congestion in Two-tier Cellular Network Using Multi-Relay D2D Communications,'' Proceedings of the International MultiConference on Engineering and Computer Scientists (IMECS2018), pp.~78--83 (March 2018). [72] Tetsuya HIRAKAWA, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``An Analysis of a Defence Method against Slow HTTP DoS Attack,'' Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA2018), pp.~316--320 (October 2018). [73] Tetsuya HIRAKAWA and Toyoo TAKATA: ``The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS,'' Advances in Networked-Based Information Systems, Proceedings of the 23rd International Conference on Network-Based Information Systems (NBiS 2020), pp.~225--237 (August 2020).