|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2009-11-13 11:05 |
Miyazaki |
University of Miyazaki |
Similarity Scoring Method of Runtime Packed Malware and its Evaluation Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55 |
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] |
ICSS2009-55 pp.7-12 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 11:10 |
Hokkaido |
Future University-Hakodate |
On the Security and Complexity of Shared Attribute Certification Systems Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2007-18 SITE2007-12 |
[more] |
ISEC2007-18 SITE2007-12 pp.15-22 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:10 |
Iwate |
Iwate Prefectural University |
On Shared Attribute Certification Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.) |
[more] |
ISEC2005-53 pp.73-80 |
ISEC |
2005-05-18 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Construction methods of provably secure threshold cryptosystems in public key setting Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo,Inc.), Junji Shikata (Yokohama National Univ.) |
The threshold cryptosystem is a threshold distributed version of the
public key cryptosystem.
We propose generic const... [more] |
ISEC2005-1 pp.1-8 |
IT, WBS, ISEC |
2005-03-17 14:15 |
Kyoto |
Kyoto Univ. |
Key Revocation Schemes with Changeability of the Revocation Number Tomotaka Ikeda, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
IT2004-53 ISEC2004-109 WBS2004-168 pp.19-24 |
IT, WBS, ISEC |
2005-03-18 10:45 |
Kyoto |
Kyoto Univ. |
Unconditionally Secure Group Signature Schemes Takenobu Seito, Kazuyuki Kinose, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.) |
A group signature scheme introduced by Chaum and Van Heyst allow a group member to sign message anonymously on behalf of... [more] |
IT2004-72 ISEC2004-128 WBS2004-187 pp.13-18 |
ISEC, LOIS |
2004-11-08 15:55 |
Osaka |
Osaka Univ. |
A Threshold Cryptosystem Based on the Paillier's Encryption Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.) |
The threshold cryptosystem is a threshold distributed version of the
public key cryptosystem.
The threshold cryptosyst... [more] |
ISEC2004-83 OIS2004-50 pp.35-41 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|