Engineering Sciences/NOLTA-Information Security(Date:2000/03/16)

Presentation
Brute-Force Evaluation of Techniques for Tamper Resistant Software

Kenichiro AKAI,  Tsutomu MATSUMOTO,  

[Date]2000/3/16
[Paper #]IT99-81,ISEC99-120,SST99-129
A Security Evaluation of a Clone Preventive Technique Using Physical Randomness and Cryptography

Hiroyuki MATSUMOTO,  Tsutomu MATSUMOTO,  

[Date]2000/3/16
[Paper #]IT99-82,ISEC99-121,SST99-130
A Trading System for Digital Contents with Magic Ink Signature

Yuumi MURAKAMI,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2000/3/16
[Paper #]IT99-83,ISEC99-122,SST99-131
Incremental Checking of the Security against Inference Attacks on Object-Oriented Databases

Kengo MORI,  Yasunori ISHIHARA,  Toru FUJIWARA,  

[Date]2000/3/16
[Paper #]IT99-84,ISEC99-123,SST99-132
A Scheme for Secret Communication Using Internet Control Message Protocol

Masataka SUZUKI,  Tsutomu MATSUMOTO,  

[Date]2000/3/16
[Paper #]IT99-85,ISEC99-124,SST99-133
[OTHERS]

,  

[Date]2000/3/16
[Paper #]
<<12 21-26hit(26hit)