IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2019-03-07
15:55
Tokyo University of Electro-Communications Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.) IT2018-87 ISEC2018-93 WBS2018-88
(To be available after the conference date) [more] IT2018-87 ISEC2018-93 WBS2018-88
pp.77-82
IN, NWS
(Joint)
2014-01-24
10:45
Aichi Nagoya International Center Design of ID-agreement and Mutual Authentication Protocol on Named Data Networking using ID-based Encryption
Takeo Ogawara, Shiori Shinoda, Yoshihiro Kawahara, Tohru Asami (Univ. of Tokyo) IN2013-131
On the assumption that Named Data Networking is used with ID-based Encryption (IBE), this paper proposes a mutual authen... [more] IN2013-131
pp.81-86
IA, ICSS 2013-06-20
14:35
Niigata Ao-re Nagaoka Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems
Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) IA2013-3 ICSS2013-3
In late years, with the spread of RFID, the lightweight certification protocol between RFID tag and readers attracts att... [more] IA2013-3 ICSS2013-3
pp.13-18
IN, NS
(Joint)
2006-03-03
12:50
Okinawa Rizzan Sea-Park Hotel Tancha-Bay (Okinawa) Proposal of Extended Kerberos Protocol for Secure Biometrics Authentication
Takahiro Yamazaki, Takahisa Mitsuyama, Jun Kubota, Hisayoshi Kunimune, Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.)
In this work we propose a new protocol for Single-Sign On network systems using biometrics authentication. The proposed ... [more] IN2005-233
pp.453-458
IT, WBS, ISEC 2005-03-18
15:55
Kyoto Kyoto Univ. Implementation of a Security Protocol Analyzer based on Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] IT2004-54 ISEC2004-110 WBS2004-169
pp.25-30
ISEC 2004-09-17
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Study of Security Protocol Analyzer Considering Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more]
ISEC2004-67
pp.1-8
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan