Engineering Sciences/NOLTA-Information Security(Date:2012/07/12)

Presentation
Research on the skill and human-resources development of the information security staff

KYOKO HANADA,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.39,Vo1.2012-SPT-4 No.39
Efficient Conversions from Computational SSS And Ramp SSS to Multi-Party Computation

KOJI CHIDA,  DAI IKARASHI,  RYO KIKUCHI,  KOKI HAMADA,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.40,Vol.2012-SPT-4 No.40
Security Analysis of Pattern Authentication on Smartphone

TSUKASA ISHIGURO,  KAZUHIDE FUKUSHIMA,  SHINSAKU KIYOMOTO,  YUTAKA MIYAKE,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.41,Vol.2012-SPT-4 No.41
Locality-Sensitive Hashing With Margin Based Feature Selection For Biometric Data Authentication

Makiko Konoshima,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.42,Vol.2012-SPT-4 No.42
Lazy Signature : A non-registered Digital Signature Using Biometrics

YUTA YONEYAMA,  KENTA TAKAHASHI,  EISEI HONBU,  MASAKATSU NISHIGAKI,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.43,Vol.2012-SPT-4 No.43
Disaster Communications as a new application of trust

YUKO MURAYAMA,  YOSHIA SAITO,  DAI NISHIOKA,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.44,Vol.2012-SPT-4 No.44
Report on IFIP TM 2012

HIROAKI KIKUCHI,  Anirban Basu,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.45,Vol.2012-SPT-4 No.45
A Study on Image Pair Selection for Graphical Password Using Hybrid Images

KEITA TAKAHASHI,  MADOKA HASEGAWA,  SHIGEO KATO,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.46,Vol.2012-SPT-4 No.46
An Entropy-Enhanced Password Authentication that uses Brute Force Attack

TAKUYA KANEKO,  EISEI HONBU,  MASAKATSU NISHIGAKI,  

[Date]2012/7/12
[Paper #]Vol.2012-CSEC-58 No.47,Vol.2012-SPT-4 No.47
複写される方へ

,  

[Date]2012/7/12
[Paper #]
Notice for Photocopying

,  

[Date]2012/7/12
[Paper #]
奥付

,  

[Date]2012/7/12
[Paper #]
裏表紙

,  

[Date]2012/7/12
[Paper #]
<<123 41-53hit(53hit)