|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2011-11-15 10:55 |
Osaka |
Osaka Electro-Communication University |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46 |
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] |
ISEC2011-52 LOIS2011-46 pp.123-128 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
ISEC, LOIS |
2010-11-18 09:00 |
Ibaraki |
Tsukuba Univ. |
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38 |
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] |
ISEC2010-59 LOIS2010-38 pp.65-72 |
ISEC, LOIS |
2010-11-18 09:30 |
Ibaraki |
Tsukuba Univ. |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] |
ISEC2010-60 LOIS2010-39 pp.73-80 |
LOIS |
2008-03-07 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg.(pending) |
On the Security of Publicly Verifiable Electronic Voting Masahiro Mambo, Eiji Okamoto (Univ. Tsukuba) OIS2007-97 |
So far, publicly verifiable voting schemes have been proposed where voters can verify
the correctness of tallying of al... [more] |
OIS2007-97 pp.1-4 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|