IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2007-03-16
11:10
Gunma Gunma Univ. (Kiryu Campus) Design and Analysis of 3way Authentication Based on Trusted Device
Hiromi Fukaya (Pastel), Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] IT2006-99 ISEC2006-154 WBS2006-96
pp.81-86
AI 2006-11-10
13:20
Kyoto   [Tutorial Invited Lecture] Verification Methods for Security Protocols (1) -- Typical Errors in Security Proofs for Key Exchange Protocols --
Kenji Imamoto (Kyushu Univ.)
 [more] AI2006-16
pp.25-28
AI 2006-11-10
14:45
Kyoto   On the combination of functionalities for key exchange protocol
Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.)
 [more] AI2006-17
pp.29-33
ISEC, SITE, IPSJ-CSEC 2006-07-21
16:35
Okayama Okayama Univ. A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-70
pp.223-228
AI 2005-10-21
14:10
Kyoto   Design and Security Verification of One-time ID Key-Exchange Protocol by Modal Logic
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
In order to conceal user's identity from eavesdroppers and construct a system
with high scalability, we propose a thre... [more]
AI2005-18
pp.19-24
ISEC 2005-09-16
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005)
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-88
pp.87-92
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:20
Iwate Iwate Prefectural University 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-59
pp.117-122
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:25
Iwate Iwate Prefectural University A Report on the 4th Annual PKI R&D Workshop
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-75
pp.225-230
IT, WBS, ISEC 2005-03-17
14:40
Kyoto Kyoto Univ. A Note on the Definition of Secrecy of Identity
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] IT2004-83 ISEC2004-139 WBS2004-198
pp.69-74
ISEC, IPSJ-CSEC 2004-07-21
14:05
Tokushima Tokushima Univ. An improved attack on a receipt-free and universally verifiable mix-type voting scheme
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2004-62
pp.149-156
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan