Communication-Communication Systems(Date:2010/06/24)

Presentation
A note for secure information sharing systems

Gembu MOROHASHI,  Akira NAGAI,  

[Date]2010/6/24
[Paper #]ISEC2010-28,SITE2010-24,ICSS2010-34
On the Implementation of Public-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption

Akira NAGAI,  Reo YOSHIDA,  Gembu MOROHASHI,  

[Date]2010/6/24
[Paper #]ISEC2010-29,SITE2010-25,ICSS2010-35
Attribute-based encryption with arbitrary number of authorities

Go OHTAKE,  Hiroshi DOI,  

[Date]2010/6/24
[Paper #]ISEC2010-30,SITE2010-26,ICSS2010-36
An Efficient Broadcast Encryption with Personalized Messages

Go OHTAKE,  Goichiro HANAOKA,  Kazuto OGAWA,  

[Date]2010/6/24
[Paper #]ISEC2010-31,SITE2010-27,ICSS2010-37
Efficient Augmented PAK Protocols

SeongHan SHIN,  Kazukuni KOBARA,  Hideki IMAI,  

[Date]2010/6/24
[Paper #]ISEC2010-32,SITE2010-28,ICSS2010-38
On the examination on speeding Cheon's algorithm

Masaya YASUDA,  Tetsuya IZU,  Masahiko TAKENAKA,  

[Date]2010/6/24
[Paper #]ISEC2010-33,SITE2010-29,ICSS2010-39
On the proportion of the curves constructed by Brezing-Weng in the pairing-friendly curves

Takanori YASUDA,  Masaya YASUDA,  Takeshi SHIMOYAMA,  Jun KOGURE,  

[Date]2010/6/24
[Paper #]ISEC2010-34,SITE2010-30,ICSS2010-40
DLP with Auxiliary Input and the Security of Cryptographic Protocols

Tetsuya IZU,  Masahiko TAKENAKA,  Goichiro HANAOKA,  Masaya YASUDA,  

[Date]2010/6/24
[Paper #]ISEC2010-35,SITE2010-31,ICSS2010-41
Cost Estimates of CNTW Attack against EMV Signatures

Yumi SAKEMI,  Tetsuya IZU,  Masahiko TAKENAKA,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2010/6/24
[Paper #]ISEC2010-36,SITE2010-32,ICSS2010-42
On the Relationship between Recognizing Languages and Computing Functions

Shingo HASEGAWA,  Shuji ISOBE,  Hiroki SHIZUYA,  

[Date]2010/6/24
[Paper #]ISEC2010-37,SITE2010-33,ICSS2010-43
複写される方へ

,  

[Date]2010/6/24
[Paper #]
奥付

,  

[Date]2010/6/24
[Paper #]
裏表紙

,  

[Date]2010/6/24
[Paper #]
<<12 21-33hit(33hit)