Engineering Sciences/NOLTA-Information Security(Date:2012/07/12)

Presentation
Keystroke Authentication Using the Technique of Quality engineering

Hitoshi OSAKA,  Koya YANO,  

[Date]2012/7/12
[Paper #]ISEC2012-27,SITE2012-23,ICSS2012-29,EMM2012-19
Spoofing detection in biometric authentication system

Tomoaki Matsunami,  Ken Kamakura,  

[Date]2012/7/12
[Paper #]ISEC2012-28,SITE2012-24,ICSS2012-30,EMM2012-20
Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing

KAZUMASA OMOTE,  THAO PHUONG TRAN,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.21,Vol.2012-SPT-4 No.21
An efficient variant of Rainbow without triangular matrix representation

Takanori YASUDA,  Tsuyoshi TAKAGI,  Kouichi SAKURAI,  

[Date]2012/7/12
[Paper #]ISEC2012-29,SITE2012-25,ICSS2012-31,EMM2012-21
A New Higher Order Differential Property of Hierocrypt

Tetsuhiro TAKAHASHI,  Toshinobu KANEKO,  

[Date]2012/7/12
[Paper #]ISEC2012-30,SITE2012-26,ICSS2012-32,EMM2012-22
A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II)

Yusuke INOUE,  Akinobu KITAGAWA,  Toshinobu KANEKO,  

[Date]2012/7/12
[Paper #]ISEC2012-31,SITE2012-27,ICSS2012-33,EMM2012-23
How to purge imaginary path in truncate analysis

Toshinobu KANEKO,  

[Date]2012/7/12
[Paper #]ISEC2012-32,SITE2012-28,ICSS2012-34,EMM2012-24
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems For Overcoming Contradiction of Protection and Utilization of Personal Data

Shigeo TSUJII,  Hiroshi YAMAGUCHI,  Hiroshi DOI,  Yukiyasu TSUNOO,  Ryo FUJITA,  Takahiko SYOUJI,  

[Date]2012/7/12
[Paper #]ISEC2012-33,SITE2012-29,ICSS2012-35,EMM2012-25
Rationality and Security in Oblivious Transfer

Haruna HIGO,  Akihiro YAMADA,  Keisuke TANAKA,  Kenji YASUNAGA,  

[Date]2012/7/12
[Paper #]ISEC2012-34,SITE2012-30,ICSS2012-36,EMM2012-26
An Improved Algorithm for Approximate GCD Problems

Atsushi TAKAYASU,  Noboru KUNIHIRO,  

[Date]2012/7/12
[Paper #]ISEC2012-35,SITE2012-31,ICSS2012-37,EMM2012-27
A Batch Mapping Algorithm for Secure Function Evaluation

Koki HAMADA,  Dai IKARASHI,  Koji CHIDA,  

[Date]2012/7/12
[Paper #]ISEC2012-36,SITE2012-32,ICSS2012-38,EMM2012-28
Efficient elliptic curve scalar multiplication using an elliptic net algorithm

Naoki KANAYAMA,  Yang LIU,  Eiji OKAMOTO,  Kazutaka SAITO,  Tadanori TERUYA,  Shigenori UCHIYAMA,  

[Date]2012/7/12
[Paper #]ISEC2012-37,SITE2012-33,ICSS2012-39,EMM2012-29
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System

Nasima BEGUM,  Toru NAKANISHI,  Nobuo FUNABIKI,  

[Date]2012/7/12
[Paper #]ISEC2012-38,SITE2012-34,ICSS2012-40,EMM2012-30
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization

Shigeo TSUJII,  Masahito GOTAISHI,  

[Date]2012/7/12
[Paper #]ISEC2012-39,SITE2012-35,ICSS2012-41,EMM2012-31
A Proposal of Personal Authentication System using Cocktail Party Effect

Kosei TAKETA,  Hiroyuki INABA,  

[Date]2012/7/12
[Paper #]ISEC2012-40,SITE2012-36,ICSS2012-42,EMM2012-32
A recent trend in ethical and legal studies on privacy

Takushi OTANI,  

[Date]2012/7/12
[Paper #]ISEC2012-41,SITE2012-37,ICSS2012-43,EMM2012-33
Proposal of Virtual Experimental System for Computer Virus Infection Situation

Shun-ichi KURINO,  Noriaki / YOSHIKAI,  

[Date]2012/7/12
[Paper #]ISEC2012-42,SITE2012-38,ICSS2012-44,EMM2012-34
Application of Calculating Similarity Between Texts of a Security Evaluation Platform Based on International Standards

YUJI TAKAHASHI,  SHINICHI IKEDA,  YOSHIMI TESHIGAWARA,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.36,Vol.2012-SPT-4 No.36
A Client-side Solution for Protection Against Targeted Email Attacks Using Email Feature Information

TAKASHI YOSHIOKA,  YOSHINORI KATAYAMA,  HIROSHI TSUDA,  MASANOBU MORINAGA,  RYOTA FUKASAWA,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.37,Vol.2012-SPT-4 No.37
Traffic Visualization and User Interface for Supporting Long-term Malware Sandbox Analysis

HIROSHI MORI,  KATSUNARI YOSHIOKA,  TSUTOMU MATSUMOTO,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.38,Vol.2012-SPT-4 No.38
<<123>> 21-40hit(53hit)