|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2018-05-16 15:15 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Consideration of Dynamic Operation in Secure Cloud Storage based on Network Coding Shun Watanabe (Univ. of Tsukuba), Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) ISEC2018-9 |
In ISEC(July, 2017), we presented a method of lightweight data auditing and data repairing based POR(Proof of Retrievabi... [more] |
ISEC2018-9 pp.51-57 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 14:40 |
Tokyo |
|
Proof Of Retrievability for Lightweight Secure Cloud Storage Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 |
Cloud storage has been gaining in popularity as an on-line service for archiving or backup. However, due to the data out... [more] |
ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 pp.281-288 |
ICSS |
2010-11-05 13:00 |
Hiroshima |
Hiroshima City University |
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-47 |
There are many cryptographic schemes with anonymity, such as group signatures.
As one important property, anonymous us... [more] |
ICSS2010-47 pp.17-22 |
ICSS |
2010-11-05 13:25 |
Hiroshima |
Hiroshima City University |
A Timed-Release Proxy Re-Encryption Scheme and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48 |
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] |
ICSS2010-48 pp.23-28 |
IT, ISEC, WBS |
2010-03-05 13:25 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2) Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST) IT2009-109 ISEC2009-117 WBS2009-88 |
A secure multi-phase WSN has a feature that a network automatically self-heals against the node-cap-
ture attack. This ... [more] |
IT2009-109 ISEC2009-117 WBS2009-88 pp.247-254 |
ISEC, LOIS |
2009-11-13 13:25 |
Gifu |
Gifu Univ. |
Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST) ISEC2009-66 LOIS2009-55 |
Wireless sensor network (WSN) is a network composed of a lot of
wireless sensors with a little calculation resource. Th... [more] |
ISEC2009-66 LOIS2009-55 pp.101-106 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|