IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 77件中 41~60件目 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2008-07-25
Fukuoka Fukuoka Institute of System LSI Design Industry A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] ISEC2008-54
ISEC, SITE, IPSJ-CSEC 2008-07-25
Fukuoka Fukuoka Institute of System LSI Design Industry A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) ISEC2008-57
 [more] ISEC2008-57
ISEC, SITE, IPSJ-CSEC 2008-07-25
Fukuoka Fukuoka Institute of System LSI Design Industry Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58
 [more] ISEC2008-58
ISEC, SITE, IPSJ-CSEC 2008-07-25
Fukuoka Fukuoka Institute of System LSI Design Industry A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree
Chunhua Su, Kouichi Sakurai (Kyushu Univ.) ISEC2008-59
 [more] ISEC2008-59
ISEC 2008-05-16
Tokyo Kikai-Shinko-Kaikan Bldg. Coalition Resistant Ternary Subset Difference Method
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5
 [more] ISEC2008-5
ISEC 2007-12-19
Tokyo Kikai-Shinko-Kaikan Bldg. Efficiency Analysis of Multi-Scalar Multiplications using Direct Computation Methods
Hisashi Yamada, Tsuyoshi Takagi (FUN), Kouichi Sakurai (Kyushu Univ.) ISEC2007-121
The most time consuming operation to verify a signature
with the elliptic curve digital signature algorithm (ECDSA)
i... [more]
ISEC, SITE, IPSJ-CSEC 2007-07-19
Hokkaido Future University-Hakodate Privacy-Preserving Assocaition Rules Mining Scheme Revisited
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.) ISEC2007-35 SITE2007-29
Assocaition Rules Mining is a frequently used technique which finds interesting associations and correlation relationshi... [more] ISEC2007-35 SITE2007-29
ISEC, SITE, IPSJ-CSEC 2007-07-19
Hokkaido Future University-Hakodate A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ) ISEC2007-38 SITE2007-32
We propose the scheme that
stores protected secret key which is made by combination of biometrics and secret key in the... [more]
ISEC2007-38 SITE2007-32
IT, ISEC, WBS 2007-03-16
Gunma Gunma Univ. (Kiryu Campus) Design and Analysis of 3way Authentication Based on Trusted Device
Hiromi Fukaya (Pastel), Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] IT2006-99 ISEC2006-154 WBS2006-96
COMP 2006-12-04
Aichi Nagoya University Economic-inspired truthful reputation feedback mechanism in P2P networks
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
 [more] COMP2006-42
AI 2006-11-10
Kyoto   On securing open networks through trust and reputation - architecture, challenges and solutions
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
 [more] AI2006-12
AI 2006-11-10
Kyoto   On the combination of functionalities for key exchange protocol
Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.)
 [more] AI2006-17
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more]
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. Distributed Privacy-preserving Document Clustering
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-56
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-57
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. Comparison of revocation problem between ID based encryption and biometric authentication schemes
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ)
 [more] ISEC2006-68
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. A Design of DRM systems with hardware-based authentication
Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-69
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-70
ISEC, SITE, IPSJ-CSEC 2006-07-21
Okayama Okayama Univ. Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security
Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
We introduce an original visualization design based on an interactive 3D
representation of the traffic between selected... [more]
WBS, IT, ISEC 2006-03-17
Aichi Nagoya Univ. Design of a Stream Cipher using Efficient Clock Control
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.)
Various clock-controlled stream ciphers and attacks have been described in papers. However, few word-oriented algorithms... [more] IT2005-109 ISEC2005-166 WBS2005-123
 77件中 41~60件目 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan