|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2018-03-02 10:00 |
Okinawa |
|
The Game Contents of Information Security Education Tsukasa Hirose, Takako Nakatani (The Open Univ) KBSE2017-54 |
In this study, we studied information security education by gathering information security events familiar to learners b... [more] |
KBSE2017-54 pp.91-95 |
ISEC |
2017-09-04 12:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-43 |
(To be available after the conference date) [more] |
ISEC2017-43 pp.15-22 |
ISEC |
2017-05-12 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on the Numbers of Cards Required to Make Copied Commitments Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3 |
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] |
ISEC2017-3 pp.15-22 |
ISEC |
2016-09-02 09:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on Secure Execution of Random Bisection Cut Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2016-38 |
Using a deck of cards, we can realize a secure computation. Especially, since a random bisection cut was devised in 2009... [more] |
ISEC2016-38 pp.1-7 |
ISEC, IT, WBS |
2015-03-03 10:30 |
Fukuoka |
The University of Kitakyushu |
A Note on Secure Computations with Commercially Available Playing Cards Takaaki Mizuki (Tohoku Univ.) IT2014-90 ISEC2014-103 WBS2014-82 |
It is known that Secure Multi-Party Computations can be conducted using a number of physical cards with identical backs,... [more] |
IT2014-90 ISEC2014-103 WBS2014-82 pp.179-186 |
ISEC, LOIS, SITE |
2014-11-21 14:15 |
Hyogo |
|
Card-based Generation of Random Permutations without Fixed Points Rie Ishikawa, Eikoh Chida (NIT, Ichinoseki Colleage), Takaaki Mizuki (Tohoku Univ.) ISEC2014-58 SITE2014-49 LOIS2014-28 |
Consider a scenario where there are $n$ players who want to exchange gifts.
That is, we want to generate a random permu... [more] |
ISEC2014-58 SITE2014-49 LOIS2014-28 pp.13-18 |
ISEC, LOIS |
2013-11-28 15:00 |
Miyagi |
Tohoku Univ. |
A Note on Attacks against Card-Based Cryptographic Protocols Takaaki Mizuki, Hiroki Shizuya (Tohoku Univ.) ISEC2013-62 LOIS2013-28 |
It has been known that Secure Multi-Party Computations can be conducted using a number of black and red physical cards (... [more] |
ISEC2013-62 LOIS2013-28 pp.21-28 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Visual Card Games for Boys and Girls Miyuki Uno, Mikio Kano (Ibaraki Univ.) IT2010-103 ISEC2010-107 WBS2010-82 |
We propose a new visual card game for two parties
$\mathcal{X}$ and $\mathcal{Y}$ of boys and girls, respectively.
In ... [more] |
IT2010-103 ISEC2010-107 WBS2010-82 pp.227-234 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|