Engineering Sciences/NOLTA-Information Security(Date:2003/03/19)

Presentation
表紙

,  

[Date]2003/3/19
[Paper #]
目次

,  

[Date]2003/3/19
[Paper #]
Efficient Multiparty Computation Using the Ramp Scheme

Yasuko MATSUMURA,  Kohei ENDO,  Satoshi NAKAGAWA,  

[Date]2003/3/19
[Paper #]IT2002-47,ISEC2002-105,SST2002-153,ITS2002-130
A consideration to tie PKCs to ACs at using ACs

Naohiko IMAEDA,  Hideyuki ODAHARA,  Hiroshi MASAMOTO,  

[Date]2003/3/19
[Paper #]IT2002-48,ISEC2002-106,SST2002-154,ITS2002-131
Program Obfuscation by Coding Data and Its Operation

Hirotsugu SATO,  Akito MONDEN,  Ken-ichi MATSUMOTO,  

[Date]2003/3/19
[Paper #]IT2002-49,ISEC2002-107,SST2002-155,ITS2002-132
A Method of Displaying Secret Information Only to the Designated User

Yukinori YAMADA,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/3/19
[Paper #]IT2002-50,ISEC2002-108,SST2002-156,ITS2002-133
Application of Associative Memory Model for a Scret Sharing Scheme

Kouji YASUNAGA,  Masaki KAWAMURA,  

[Date]2003/3/19
[Paper #]IT2002-51,ISEC2002-109,SST2002-157,ITS2002-134
Threshold-Verifiable Secret Sharing Scheme

Raylin TSO,  

[Date]2003/3/19
[Paper #]IT2002-52,ISEC2002-110,SST2002-158,ITS2002-135
Combinatorial Characterizations of Threshold Schemes

Ying MIAO,  

[Date]2003/3/19
[Paper #]IT2002-53,ISEC2002-111,SST2002-159,ITS2002-136
Information Security over Mobile Telecommunications

Makoto Tatebayashi,  Takehiko Kato,  

[Date]2003/3/19
[Paper #]IT2002-54,ISEC2002-112,SST2002-160,ITS2002-137
Increasing of Wireless Frequency Usage Efficiency by an Information Transmission Method Using Kronecker Product

Naoki SUEHIRO,  Chenggao HAN,  Toshiaki IMOTO,  

[Date]2003/3/19
[Paper #]IT2002-55,ISEC2002-113,SST2002-161,ITS2002-138
Multilayered Digital Watermarking System Based on Guided Scrambling

Akiomi KUNISA,  

[Date]2003/3/19
[Paper #]IT2002-56,ISEC2002-114,SST2002-162,ITS2002-139
A Random Number Generation Useful for Cryptosystems

Kyoki IMAMURA,  

[Date]2003/3/19
[Paper #]IT2002-57,ISEC2002-115,SST2002-163,ITS2002-140
A Construction of Short Public-Key Cryptosystem over Extensiion Field

Masaho KASAHARA,  Ryuichi SAKAI,  

[Date]2003/3/19
[Paper #]IT2002-58,OSEC2002-116,SST2002-164,ITS2002-141
Traveling salesman Cryptosystem using Gaussian Integer

Teruyuki SUZUKI,  Kunikatsu KOBAYASHI,  

[Date]2003/3/19
[Paper #]IT2002-59,ISEC2002-117,SST2002-165,ITS2002-142
Coarse Grain Parallel Processing of Block Lanczos Method

Taira SUGAWARA,  Masanobu KOIKE,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/3/19
[Paper #]IT2002-60,ISEC2002-118,SST2002-166,ITS2002-143
Performance analysis for tree-based group key management schemes

Hideyuki SAKAI,  Hirosuke YAMAMOTO,  

[Date]2003/3/19
[Paper #]IT2002-61,ISEC2002-119,SST2002-167,ITS2002-144
Comparison of Performance on Subset-Cover Revocation Schemes

Seiji OKUAKI,  Santoso BAGUS,  Kazuo OHTA,  

[Date]2003/3/19
[Paper #]IT2002-62,ISEC2002-120,SST2002-168,ITS2002-145
Notes on Dynamic Information Management for Authenticated Key Exchange

Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2003/3/19
[Paper #]IT2002-63,ISEC2002-121,SST2002-169,ITS2002-146
Micropayment Scheme using Hash Chain Collision

Satoshi AOKI,  Yuichi KOMANO,  Nozomi MIYANAGA,  Yusuke HONMA,  Hikaru MORITA,  Kazuo OHTA,  

[Date]2003/3/19
[Paper #]IT2002-64,ISEC2002-122,SST2002-170,ITS2002-147
12>> 1-20hit(35hit)