Engineering Sciences/NOLTA-Information Security(Date:2011/11/07)

Presentation
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol

Satoshi HARA,  Kenichiro MUTO,  Sakae CHIKARA,  Yoshiaki SEKI,  

[Date]2011/11/7
[Paper #]ISEC2011-52,LOIS2011-46
Secure and Effective Password Management System

Ryo HIRANO,  Masakatu MORII,  

[Date]2011/11/7
[Paper #]ISEC2011-53,LOIS2011-47
Secure VoIP System for Mobile Phone

Takeaki KOUCHI,  Tomoki NAKANO,  Yutaka ONO,  Akihiro SHIMIZU,  

[Date]2011/11/7
[Paper #]ISEC2011-54,LOIS2011-48
SLP Separates the Strong RSA Assumption from the DDH Assumption

Masayuki FUKUMITSU,  Shingo HASEGAWA,  Shuji ISOBE,  Eisuke KOIZUMI,  Hiroki SHIZUYA,  

[Date]2011/11/7
[Paper #]ISEC2011-55,LOIS2011-49
On the Little Knowledge Interactive Proof

Jun-ya IWAZAKI,  Shingo HASEGAWA,  Shuji ISOBE,  Eisuke KOIZUMI,  Hiroki SHIZUYA,  

[Date]2011/11/7
[Paper #]ISEC2011-56,LOIS2011-50
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols

Itsuki SUZUKI,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2011/11/7
[Paper #]ISEC2011-57,LOIS2011-51
On Definition Fields of Pairing-Friendly Curves With Embedding Degree 4, 6, 8

Masaaki SHIRASE,  

[Date]2011/11/7
[Paper #]ISEC2011-58,LOIS2011-52
A proposal of Privacy Impact Assessment framework in Japan

Shigeru ISHIDA,  Sadamu TAKASAKA,  Mamoru YOKOYAMA,  Yoichi SETO,  

[Date]2011/11/7
[Paper #]ISEC2011-59,LOIS2011-53
Content Authentication for Range Queries in Peer-to-Peer Networks

Shoichi Hirose,  

[Date]2011/11/7
[Paper #]ISEC2011-60,LOIS2011-54
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model

Liang ZHAO,  Takashi NISHIDE,  Avishek ADHIKARI,  Kyung-Hyune RHEE,  Kouichi SAKURAI,  

[Date]2011/11/7
[Paper #]ISEC2011-61,LOIS2011-55
複写される方へ

,  

[Date]2011/11/7
[Paper #]
Notice for Photocopying

,  

[Date]2011/11/7
[Paper #]
奥付

,  

[Date]2011/11/7
[Paper #]
裏表紙

,  

[Date]2011/11/7
[Paper #]
<<12 21-34hit(34hit)