Engineering Sciences/NOLTA-Information Security(Date:1999/05/20)

Presentation
表紙

,  

[Date]1999/5/20
[Paper #]
目次

,  

[Date]1999/5/20
[Paper #]
[CATALOG]

,  

[Date]1999/5/20
[Paper #]
Generalized ID-NIKS - The Fourth Method -

Shigeo TSUJII,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1999/5/20
[Paper #]ISEC99-1
Common-key Sharing Scheme Based on Double Exponential Function

Masao KASAHARA,  Yasuyuki MURAKAMI,  Shigeo TSUJII,  

[Date]1999/5/20
[Paper #]ISEC99-2
Attack for ID-NIKS Using A New One-Way Hash Function

Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1999/5/20
[Paper #]ISEC99-3
Notes on Security of ProbabilistiC IDNIKS

Ryuuichi SAKAI,  Yasuyuki Murakami,  Masao KASAHARA,  

[Date]1999/5/20
[Paper #]ISEC99-4
Subliminal Channels Embedded In Key Distribution Systems

Hidenori Kuwakado,  Hatsukazu Tanaka,  

[Date]1999/5/20
[Paper #]ISEC99-5
A New Copyright Protection Scheme of Image Using ID-based Signature

Minoru Kuribayashi,  Hatsukazu Tanaka,  

[Date]1999/5/20
[Paper #]ISEC99-6
A Robust Watermarking Scheme for Digital Still Images Based on Discrete Fourier Transform

Takaya Kasai,  Hiroki Koga,  Hirosuke Yamamoto,  

[Date]1999/5/20
[Paper #]ISEC99-7
Information Hiding into Encrypted Data Blocks

Takashi Mano,  

[Date]1999/5/20
[Paper #]ISEC99-8
A Construction of Secret Sharing System with Classified Membership

Takashi Katagiri,  Hatsukazu Tanaka,  

[Date]1999/5/20
[Paper #]ISEC99-9
A Mix-network on Permutation Networks

Masayuki ABE,  

[Date]1999/5/20
[Paper #]ISEC99-10
[OTHERS]

,  

[Date]1999/5/20
[Paper #]