Engineering Sciences/NOLTA-Information Security(Date:1998/12/10)

Presentation
表紙

,  

[Date]1998/12/10
[Paper #]
CONTENTS

,  

[Date]1998/12/10
[Paper #]
Revocable and Renewable ID-based Key Distribution System for User's Secret Information

Takeshi OKAMOTO,  Eiji OKAMOTO,  Mitsuru TADA,  Ken'ichiro KAMACHI,  

[Date]1998/12/10
[Paper #]ISEC98-48
A Watermarking System with Two Servers which can Detect Server's Corruption

Hajime Watanabe,  Tadao Kasami,  

[Date]1998/12/10
[Paper #]ISEC98-49
Extended Encryption Model with Delayed Dynamics

Toru Ohira,  

[Date]1998/12/10
[Paper #]ISEC98-50
A Light Weight Non-Repudiation Protocol

C.H. You,  K.Y. Lam,  

[Date]1998/12/10
[Paper #]ISEC98-51
Secure Group Key Distribution Schemes with Terminal Revocation

Natsume Matsuzaki,  Jun Anzai,  

[Date]1998/12/10
[Paper #]ISEC98-52
Multisignature Schemes Using Structured Group ID

Hiroshi Doi,  Eiji Okamoto,  Masahiro Mambo,  

[Date]1998/12/10
[Paper #]ISEC98-53
A Practical Multisignature Scheme

Chunru Zhang,  Kwok-Yan Lam,  

[Date]1998/12/10
[Paper #]ISEC98-54
Vulnerability of Anonymous E-cash Systems to Insider-Attacks from Untrusted Authorities

Shingo MIYAZAKI,  Kouichi SAKURAI,  

[Date]1998/12/10
[Paper #]ISEC98-55
[OTHERS]

,  

[Date]1998/12/10
[Paper #]