|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-07 15:55 |
Tokyo |
University of Electro-Communications |
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.) IT2018-87 ISEC2018-93 WBS2018-88 |
(To be available after the conference date) [more] |
IT2018-87 ISEC2018-93 WBS2018-88 pp.77-82 |
IN, NWS (Joint) |
2014-01-24 10:45 |
Aichi |
Nagoya International Center |
Design of ID-agreement and Mutual Authentication Protocol on Named Data Networking using ID-based Encryption Takeo Ogawara, Shiori Shinoda, Yoshihiro Kawahara, Tohru Asami (Univ. of Tokyo) IN2013-131 |
On the assumption that Named Data Networking is used with ID-based Encryption (IBE), this paper proposes a mutual authen... [more] |
IN2013-131 pp.81-86 |
IA, ICSS |
2013-06-20 14:35 |
Niigata |
Ao-re Nagaoka |
Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) IA2013-3 ICSS2013-3 |
In late years, with the spread of RFID, the lightweight certification protocol between RFID tag and readers attracts att... [more] |
IA2013-3 ICSS2013-3 pp.13-18 |
IN, NS (Joint) |
2006-03-03 12:50 |
Okinawa |
Rizzan Sea-Park Hotel Tancha-Bay (Okinawa) |
Proposal of Extended Kerberos Protocol for Secure Biometrics Authentication Takahiro Yamazaki, Takahisa Mitsuyama, Jun Kubota, Hisayoshi Kunimune, Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) |
In this work we propose a new protocol for Single-Sign On network systems using biometrics authentication. The proposed ... [more] |
IN2005-233 pp.453-458 |
IT, WBS, ISEC |
2005-03-18 15:55 |
Kyoto |
Kyoto Univ. |
Implementation of a Security Protocol Analyzer based on Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] |
IT2004-54 ISEC2004-110 WBS2004-169 pp.25-30 |
ISEC |
2004-09-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Security Protocol Analyzer Considering Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more] |
ISEC2004-67 pp.1-8 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|