Engineering Sciences/NOLTA-Information Security(Date:2005/07/15)

Presentation
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results

Satoshi NAKAYAMA,  Maki YOSHIDA,  Shingo OKAMURA,  Akira FUJIWARA,  Toru FUJIWARA,  

[Date]2005/7/15
[Paper #]ISEC2005-61
A note on cryptographic schemes using collision-resistant functions based on factoring

Jumpei WADA,  Hajime KANZAKI,  Shoichi HIROSE,  Susumu YOSHIDA,  

[Date]2005/7/15
[Paper #]ISEC2005-62
Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment

Takeshi NASAKO,  Yasuyuki MURAKAMI,  

[Date]2005/7/15
[Paper #]ISEC2005-63
Improving the security of S-boxes in DES using Genetic Algorithm

Atsushi KOYAMA,  Yasuyuki MURAKAMI,  

[Date]2005/7/15
[Paper #]ISEC2005-64
Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability

Takaaki FUJITA,  Kunihiro OKAMOTO,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2005/7/15
[Paper #]ISEC2005-65
A Secure Reversible Watermark Using Predictive Coding

Minoru KURIBAYASHI,  Masakatu MORII,  Hatsukazu TANAKA,  

[Date]2005/7/15
[Paper #]ISEC2005-66
On Multiple-bit Embedding in Asymmetric Watermark

Mitsuo OKADA,  Hiroaki KIKUCHI,  

[Date]2005/7/15
[Paper #]ISEC2005-67
Robust watermarking scheme for copied, rotated and clipped documents

Kurato MAENO,  Masayuki SUTO,  

[Date]2005/7/15
[Paper #]ISEC2005-68
An Implementation of Partial Integrity Assurance Technology for Image Data

Masahiko TAKENAKA,  Takashi YOSHIOKA,  

[Date]2005/7/15
[Paper #]ISEC2005-69
Study on an Anti-Tracking RF-ID Tag System

Atsushi SAKAI,  Masahiko TAKENAKA,  

[Date]2005/7/15
[Paper #]ISEC2005-70
Proposal and evaluation of digital forensic logging system using USB Device

Yuki Ashino,  Hirohito Kokawa,  Tsukasa Sato,  Ryoichi Sasaki,  

[Date]2005/7/15
[Paper #]ISEC2005-71
A study of wireless location privacy protection considering communication quality

Hiroshi Yamane,  Leping Huang,  Kanta Matsuura,  Kaoru Sezaki,  

[Date]2005/7/15
[Paper #]ISEC2005-72
Personal Information Management System based on Linkability Control

Yoshinori SATO,  Akihiko KAWASAKI,  Toyohisa MORITA,  Takashi FUKUMOTO,  

[Date]2005/7/15
[Paper #]ISEC2005-73
Identity Control Method considering Privacy

Hajime MORITO,  Akihiko KAWASAKI,  Toyohisa MORITA,  Kazuo TAKARAGI,  

[Date]2005/7/15
[Paper #]ISEC2005-74
A Report on the 4th Annual PKI R&D Workshop

Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2005/7/15
[Paper #]ISEC2005-75
複写される方へ

,  

[Date]2005/7/15
[Paper #]
Notice about photocopying

,  

[Date]2005/7/15
[Paper #]
奥付

,  

[Date]2005/7/15
[Paper #]
<<12 21-38hit(38hit)