Engineering Sciences/NOLTA-Information Security(Date:1993/10/26)

Presentation
表紙

,  

[Date]1993/10/26
[Paper #]
目次

,  

[Date]1993/10/26
[Paper #]
A Method of Dynamic Discretionary Access Control

Kang Hyung-suck,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/10/26
[Paper #]ISEC93-55
A Study on the Development of Real-time Intrusion Detection Expert System(IDES)

Dong-Hyoun Song,  Young-Jun Ko,  Jong-Tae Shin,  

[Date]1993/10/26
[Paper #]ISEC93-56
Security Planing in Data Processing System

Hiroshi Nagase,  Hideki Shina,  Gutierrez Edmundo,  

[Date]1993/10/26
[Paper #]ISEC93-57
Security Constraints on Inheritance Hierarchy in Object-oriented Data Model

Youngkyun Kim,  Bongnam Noh,  

[Date]1993/10/26
[Paper #]ISEC93-58
On the Security Model Based on Lattice-Ordered Groups

Tetsuya Morizumi,  Shigeo Tsujii,  

[Date]1993/10/26
[Paper #]ISEC93-59
Analytical Known Plain-Text Attack for FEAL-6 Based on Bit-by-Bit Comparison

Yukiyasu Tsunoo,  Eiji Okamoto,  Tomohiko Uematsu,  Masahiro Manbo,  

[Date]1993/10/26
[Paper #]ISEC93-60
An Attack on an ID-Based Key Sharing System

Victor Luchangco,  Kenji Koyama,  

[Date]1993/10/26
[Paper #]ISEC93-61
On The Distance Properties of The S-Box Internal Mapping

Habong Chung,  

[Date]1993/10/26
[Paper #]ISEC93-62
Reconstruction of s^2DES S-boxes and their Immunity to Differential Cryptanalysis

Kwangjo Kim,  Sangjun Park,  Sangjin Lee,  

[Date]1993/10/26
[Paper #]ISEC93-63
Dynamic Swapping Schemes and Differential Cryptanalysis

Toshinobu Kaneko,  Kenji Koyama,  Routo Terada,  

[Date]1993/10/26
[Paper #]ISEC93-64
[OTHERS]

,  

[Date]1993/10/26
[Paper #]