Engineering Sciences/NOLTA-Information Security(Date:2006/07/14)

Presentation
The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA

Yasutaka SHINZAKI,  Takeshi OGINO,  Shintaro UEDA,  Hiroshi SHIGENO,  

[Date]2006/7/14
[Paper #]ISEC2006-58
An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes

Koji TANIGAWA,  Toru NAKANISHI,  Nobuo FUNABHIKI,  

[Date]2006/7/14
[Paper #]ISEC2006-59
Proposal on Whistle-blower Protection Technology to Prevent the Exposure of Accuser from an Indictment Document

Masataka TADA,  Mitsuyuki TAKATSUKA,  Takanobu MASUBUCHI,  Ryoichi SASAKI,  

[Date]2006/7/14
[Paper #]ISEC2006-60
3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions

Naoki MIYAKE,  Yoshimichi ITO,  Noboru BABAGUCHI,  

[Date]2006/7/14
[Paper #]ISEC2006-61
Watermarking Method by Alternative Representation of Document Backgrounds

Takashi HASHIMOTO,  Kurato MAENO,  Hiroyuki HOTA,  

[Date]2006/7/14
[Paper #]ISEC2006-62
A User Authentication using Blind Spot and Papillary Light Reflex (part2)

Yuji OZAWA,  Daisuke ARAI,  Masakatsu NISHIGAKI,  

[Date]2006/7/14
[Paper #]ISEC2006-63
An Improvement of User Authentication Using Schema of Visual Memory : An extension of the system using hint

Takumi Yamamoto,  Atsushi Harada,  Takeo Isarida,  Masakatsu Nishigaki,  

[Date]2006/7/14
[Paper #]ISEC2006-64
Extracting Contexts From Keystroke Data

Munetoshi ISHIKAWA,  Mizuki OKA,  Kazuhiro KATO,  

[Date]2006/7/14
[Paper #]ISEC2006-65
Development of IH-ZIP : A Data Compression Tool for Information Hiding

Katsunari YOSHIOKA,  Kotaro SONODA,  Osamu TAKIZAWA,  Koji NAKAO,  Tsutomu MATSUMOTO,  

[Date]2006/7/14
[Paper #]ISEC2006-66
A Proposal of Cancelable Biometircs for Image Matchig based biometrics

Shinji HIRATA,  Kenta TAKAHASHI,  Masahiro MIMURA,  

[Date]2006/7/14
[Paper #]ISEC2006-67
IDベース暗号、バイオメトリック認証における失効問題についての比較

,  

[Date]2006/7/14
[Paper #]ISEC2006-68
A Design of DRM systems with hardware-based authentication

Hiromi Fukaya,  Kouichi Sakurai,  

[Date]2006/7/14
[Paper #]ISEC2006-69
A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant

Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2006/7/14
[Paper #]ISEC2006-70
Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security

Erwan LE MALECOT,  Masayoshi KOHARA,  Yoshiaki HORI,  Kouichi SAKURAI,  

[Date]2006/7/14
[Paper #]ISEC2006-71
複写される方へ

,  

[Date]2006/7/14
[Paper #]
Notice about photocopying

,  

[Date]2006/7/14
[Paper #]
奥付

,  

[Date]2006/7/14
[Paper #]
<<12 21-37hit(37hit)