Engineering Sciences/NOLTA-Information Security(Date:2004/07/13)

Presentation
Evaluations for Machine Learning Based IDS with Automatic Training Data Generatiin

Akira YAMADA,  Yutaka MIYAKE,  Keisuke TAKEMORI,  Toshiaki TANAKA,  

[Date]2004/7/13
[Paper #]ISEC2004-31
An Implementable Scheme of Quantum Bit String Commitment

Toyohiro TSURUMARU,  

[Date]2004/7/13
[Paper #]ISEC2004-32
Implementation and Evaluation of Illegal Copy Protection for Multicast Contents Delivery

Masaki INAMURA,  Toshiaki TANAKA,  

[Date]2004/7/13
[Paper #]ISEC2004-33
Reducing Frequency of Communication on the Consignment Delivering System Protecting Marketing Information

Akira FUJIWARA,  Shingo OKAMURA,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2004/7/13
[Paper #]ISEC2004-34
A Secure Traitor Tracing Scheme against Key Exposure

Kazuto OGAWA,  Arisa FUJII,  Go OHTAKE,  Goichiro HANAOKA,  Keigo MAJIMA,  Kimiyuki OYAMADA,  Hideki IMAI,  

[Date]2004/7/13
[Paper #]ISEC2004-35
A Report on the 3rd Annual PKI R&D Workshop

Satoshi KOGA,  Hiroaki KIKUCHI,  

[Date]2004/7/13
[Paper #]ISEC2004-36
Certification of Program Execution by Tamper Resistant CPU

Atsuya OKAZAKI,  Masaki NAKANISHI,  Shigeru YAMASHITA,  Katsumasa WATANABE,  

[Date]2004/7/13
[Paper #]ISEC2004-37
A proposal for protection of low-cost RFID tags using trusted devices

VERA Jose GUEVARA,  Hiroshi HONJ0,  

[Date]2004/7/13
[Paper #]ISEC2004-38
A challenge-response authentication with a password extracted from a fingerprint

Yoichi SHIBATA,  Itsukazu NAKAMURA,  Masahiro MIMURA,  Kenta TAKAHASHI,  Masakatsu NISHIGAKI,  

[Date]2004/7/13
[Paper #]ISEC2004-39
A consideration from the habit of a handwriting about the anonymity of a handwriting

Norihisa Segawa,  Yuko Murayama,  Masatoshi Miyazaki,  Yoshiaki Nemoto,  

[Date]2004/7/13
[Paper #]ISEC2004-40
複写される方へ

,  

[Date]2004/7/13
[Paper #]
奥付

,  

[Date]2004/7/13
[Paper #]
<<12 21-32hit(32hit)