Engineering Sciences/NOLTA-Information Security(Date:2005/07/14)

Presentation
Systematizing of Information Forensics

Kouichi MUKOUYAMA,  Katsuya UCHIDA,  

[Date]2005/7/14
[Paper #]ISEC2005-27,SITE2005-25
Consideration about intellectual property rights in university graduation thesis and production created by students : Case Study in Faculty of Software Engineering, Iwate Prefectual University

Ryoju Hamada,  Norihisa Segawa,  Yuko Murayama,  

[Date]2005/7/14
[Paper #]ISEC2005-28,SITE2005-26
The Direction of Japan's CMVP II

Yuichi Hagiwara,  Travis Spann,  Tatsuaki Takebe,  

[Date]2005/7/14
[Paper #]ISEC2005-29,SITE2005-27
On the Standardization of Information Security : Report on the Vienna Meeting in April, 2005

Atsuko MIYAJI,  Takeshi CHIKAZAWA,  Toshio TATSUTA,  Akira OTSUKA,  Kan YASUDA,  

[Date]2005/7/14
[Paper #]ISEC2005-30,SITE2005-28
Oblivious Signature, Revised

Nobuyuki SHIINA,  Takeshi OKAMOTO,  Eiji OKAMOTO,  

[Date]2005/7/14
[Paper #]ISEC2005-31,SITE2005-29
Partially Blind Signatures with Traceability

Koji CHIDA,  Miyako OHKUBO,  Osamu SHIONOIRI,  Ichizo NAKAMURA,  Atsushi KANAI,  

[Date]2005/7/14
[Paper #]ISEC2005-32,SITE2005-30
Proposal on SUMI coating method which can change the coating parts to protect against insider attacks

Takanobu MASUBUCHI,  Hajime NAKAMURA,  Saneyuki ISHII,  Noriko OGAWA,  Hiroshi KASHIMURA,  Ryouichi SASAKI,  

[Date]2005/7/14
[Paper #]ISEC2005-33,SITE2005-31
Exact t-out-of-n Signer-Ambiguous Signature

Eiichiro FUJISAKI,  Koutarou SUZUKI,  

[Date]2005/7/14
[Paper #]ISEC2005-34,SITE2005-32
An (N, K) Threshold Signature Scheme with Public Keys of Small Size

Masao KASAHARA,  Ryuichi SAKAI,  

[Date]2005/7/14
[Paper #]ISEC2005-35,SITE2005-33
Meta Ring Signature

Hiroyuki OKAZAKI,  Ryuich SAKAI,  Masao KASAHARA,  

[Date]2005/7/14
[Paper #]ISEC2005-36,SITE2005-34
An Information Hiding System for Word 2003 XML Documents

Muneyuki KITANO,  Hidetaka MASUDA,  Hiroshi NAKAGAWA,  

[Date]2005/7/14
[Paper #]ISEC2005-37,SITE2005-35
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow

Tatsuya TOYOFUKU,  Toshihiro TABATA,  Kouichi SAKURAI,  

[Date]2005/7/14
[Paper #]ISEC2005-38,SITE2005-36
A Text hiding by Visual Secret Sharing with Natural Images

Takashi Miyaki,  Kazuya Shioda,  Hideki Yoshida,  Masaharu Ozawa,  Masakatsu Nishigaki,  

[Date]2005/7/14
[Paper #]ISEC2005-39,SITE2005-37
Evaluation of Memory Protecting Scheme in Multitask OSes : A Cryptographic Memory System for Resource-poor Platforms & Tampering Detection

YU INAMURA,  TORU EGASHIRA,  ATSUSHI TAKESHITA,  

[Date]2005/7/14
[Paper #]ISEC2005-40,SITE2005-38
A description model for data access control in Salvia operating system

Yoshimi ICHIYANAGI,  Kazuhisa SUZUKI,  Koichi MOURI,  Eiji OKUBO,  

[Date]2005/7/14
[Paper #]ISEC2005-41,SITE2005-39
A Case Study of Gordon-Loeb Model on Optimal Security Investments

Kimio KURAMITSU,  

[Date]2005/7/14
[Paper #]ISEC2005-42,SITE2005-40
複写される方へ

,  

[Date]2005/7/14
[Paper #]
Notice about photocopying

,  

[Date]2005/7/14
[Paper #]
奥付

,  

[Date]2005/7/14
[Paper #]
<<12 21-39hit(39hit)