IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 80 of 87 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
AI 2006-11-10
10:00
Kyoto   On securing open networks through trust and reputation - architecture, challenges and solutions
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
 [more] AI2006-12
pp.1-6
AI 2006-11-10
14:45
Kyoto   On the combination of functionalities for key exchange protocol
Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.)
 [more] AI2006-17
pp.29-33
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:15
Okayama Okayama Univ. Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more]
ISEC2006-55
pp.115-122
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:40
Okayama Okayama Univ. Distributed Privacy-preserving Document Clustering
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-56
pp.123-130
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:20
Okayama Okayama Univ. Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-57
pp.131-135
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:45
Okayama Okayama Univ. Comparison of revocation problem between ID based encryption and biometric authentication schemes
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ)
 [more] ISEC2006-68
pp.211-215
ISEC, SITE, IPSJ-CSEC 2006-07-21
16:10
Okayama Okayama Univ. A Design of DRM systems with hardware-based authentication
Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-69
pp.217-222
ISEC, SITE, IPSJ-CSEC 2006-07-21
16:35
Okayama Okayama Univ. A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-70
pp.223-228
ISEC, SITE, IPSJ-CSEC 2006-07-21
17:00
Okayama Okayama Univ. Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security
Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
We introduce an original visualization design based on an interactive 3D
representation of the traffic between selected... [more]
ISEC2006-71
pp.229-236
WBS, IT, ISEC 2006-03-17
15:50
Aichi Nagoya Univ. Design of a Stream Cipher using Efficient Clock Control
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.)
Various clock-controlled stream ciphers and attacks have been described in papers. However, few word-oriented algorithms... [more] IT2005-109 ISEC2005-166 WBS2005-123
pp.85-90
WBS, IT, ISEC 2006-03-17
10:20
Aichi Nagoya Univ. Realization of the ID-based encryption scheme based on symmetric-key technique with Device characteristic value
Hiromi Fukaya (Pastel), Kouichi Sakurai (CSCE)
 [more] IT2005-111 ISEC2005-168 WBS2005-125
pp.97-102
ISEC 2005-12-16
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. On Effectiveness of Clock Control in a Clock-Controlled Stream Cipher
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs), Kouichi Sakurai (Kyushu Univ.)
In this paper, we examine effectiveness for clock control in stream ciphers with the aim of protecting against distingui... [more] ISEC2005-112
pp.11-16
ISEC 2005-12-16
16:05
Tokyo Kikai-Shinko-Kaikan Bldg. Report on the 4th International Workshop on Digital Watermarking (IWDW 2005)
Tatsuya Toyofuku, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-120
pp.61-68
AI 2005-10-21
14:10
Kyoto   Design and Security Verification of One-time ID Key-Exchange Protocol by Modal Logic
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
In order to conceal user's identity from eavesdroppers and construct a system
with high scalability, we propose a thre... [more]
AI2005-18
pp.19-24
ISEC 2005-09-16
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Interactive Protocol for Privacy-preserving K-mean Clustering
Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with gre... [more] ISEC2005-83
pp.53-60
ISEC 2005-09-16
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005)
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-88
pp.87-92
ISEC, IPSJ-CSEC, SITE 2005-07-21
11:35
Iwate Iwate Prefectural University A Note of Intrusion Detection using Alteration of Data
Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.)
These days, Attacks which alter data in memory illegally are one of the most serious security threats.Although a lot of ... [more] ISEC2005-14 SITE2005-12
pp.37-44
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:10
Iwate Iwate Prefectural University A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow
Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-38 SITE2005-36
pp.213-220
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository
Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT)
 [more] ISEC2005-52
pp.67-72
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:20
Iwate Iwate Prefectural University 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-59
pp.117-122
 Results 61 - 80 of 87 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan