|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2007-03-16 11:10 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Design and Analysis of 3way Authentication Based on Trusted Device Hiromi Fukaya (Pastel), Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
IT2006-99 ISEC2006-154 WBS2006-96 pp.81-86 |
AI |
2006-11-10 13:20 |
Kyoto |
|
[Tutorial Invited Lecture]
Verification Methods for Security Protocols (1)
-- Typical Errors in Security Proofs for Key Exchange Protocols -- Kenji Imamoto (Kyushu Univ.) |
[more] |
AI2006-16 pp.25-28 |
AI |
2006-11-10 14:45 |
Kyoto |
|
On the combination of functionalities for key exchange protocol Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.) |
[more] |
AI2006-17 pp.29-33 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 16:35 |
Okayama |
Okayama Univ. |
A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-70 pp.223-228 |
AI |
2005-10-21 14:10 |
Kyoto |
|
Design and Security Verification of One-time ID Key-Exchange Protocol by Modal Logic Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
In order to conceal user's identity from eavesdroppers and construct a system
with high scalability, we propose a thre... [more] |
AI2005-18 pp.19-24 |
ISEC |
2005-09-16 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005) Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-88 pp.87-92 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:20 |
Iwate |
Iwate Prefectural University |
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-59 pp.117-122 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:25 |
Iwate |
Iwate Prefectural University |
A Report on the 4th Annual PKI R&D Workshop Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-75 pp.225-230 |
IT, WBS, ISEC |
2005-03-17 14:40 |
Kyoto |
Kyoto Univ. |
A Note on the Definition of Secrecy of Identity Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
IT2004-83 ISEC2004-139 WBS2004-198 pp.69-74 |
ISEC, IPSJ-CSEC |
2004-07-21 14:05 |
Tokushima |
Tokushima Univ. |
An improved attack on a receipt-free and universally verifiable mix-type voting scheme Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2004-62 pp.149-156 |
|
|
|
[Return to Top Page]
[Return to IEICE Web Page]
|