IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2021-05-19
10:00
Online Online Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] ISEC2021-1
pp.1-8
IT 2018-12-18
15:50
Fukushima Spa Resort Hawaiians [Invited Talk] Secure Delegated Quantum Computation
Takeshi Koshiba (Waseda Univ.) IT2018-33
In this manuscript, we take secure delegated quantum computation (SDQC).
First, we explain the basics of measurement-ba... [more]
IT2018-33
pp.13-18
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] IT2017-124 ISEC2017-112 WBS2017-105
pp.121-128
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more]
IT2017-125 ISEC2017-113 WBS2017-106
pp.129-135
ISEC 2017-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] ISEC2017-42
pp.7-14
ICSS 2012-11-22
16:50
Hiroshima Miyajima Mori-no-Yado Are measures against SSL/TLS sites dependent on the category which that site belongs? -- obtained by crawling of renegotiation functions and RSA key lengths --
Yuji Suga (IIJ) ICSS2012-56
Are measures against SSL/TLS sites dependent on the category which that site belongs?

It has been recognized man-in-t... [more]
ICSS2012-56
p.67
ICSS 2011-03-25
11:35
Tokyo Suspended On Security Model of Cryptographic Protocols for Mobile Devices
Shin'ichiro Matsuo (NICT) ICSS2010-59
Recently, information devices, with lower computational power than general personal computers such as smartphone, are ge... [more] ICSS2010-59
pp.17-21
IA, SITE, IPSJ-IOT [detail] 2011-02-28
13:55
Kochi Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network
Hiroshi Yamaguchi, Kohtaro Tadaki, Shigeo Tsujii, Norihisa Doi (Chuo Univ.) SITE2010-52 IA2010-88
On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the tech... [more] SITE2010-52 IA2010-88
pp.33-38
ISEC, LOIS 2004-11-09
09:50
Osaka Osaka Univ. A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] ISEC2004-87 OIS2004-54
pp.15-22
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan