Engineering Sciences/NOLTA-Information Security(Date:1995/09/20)

Presentation
表紙

,  

[Date]1995/9/20
[Paper #]
目次

,  

[Date]1995/9/20
[Paper #]
[CATALOG]

,  

[Date]1995/9/20
[Paper #]
Simulating Self-Reproduction Mechanisms of the Network Worm

Fumihiko Sano,  Kouichi Sakurai,  

[Date]1995/9/20
[Paper #]
An Examination of Usability of Interactive Human Identification Schemes

Tsutomu Matsumoto,  Ryo Mizutani,  

[Date]1995/9/20
[Paper #]
Theoretical Estimation for The Security of Challenge-Response Type Human Identification Using Uniform Mapping against Observing Attack

Kazukuni Kobara,  Hideki Imai,  

[Date]1995/9/20
[Paper #]
Proxy Cryptosystems

Masahiro Mambo,  Eiji Okamoto,  

[Date]1995/9/20
[Paper #]
On Extension and Applications of Visual Secret Sharing

Taku Katoh,  Hideki Imai,  

[Date]1995/9/20
[Paper #]
Algorithm for Concurrent Use of Plural Key Sharing Systems

Tsutomu Matsumoto,  

[Date]1995/9/20
[Paper #]
A Factoring Algorithm Using Multiple Parabolas

Kunikatsu Kobayashi,  Shinichi Homma,  

[Date]1995/9/20
[Paper #]
Multi-Cryptographic Structure and Algorithm using Orthogonal Array

Kenichi Kamijo,  

[Date]1995/9/20
[Paper #]
On the Power of Self-Testers and Self-Correctors

Hiroyoshi Mori,  Toshiya Itoh,  

[Date]1995/9/20
[Paper #]
自己検査器及び自己修正器の関係について

,  

[Date]1995/9/20
[Paper #]
[OTHERS]

,  

[Date]1995/9/20
[Paper #]