Engineering Sciences/NOLTA-Information Security(Date:2003/07/10)

Presentation
表紙

,  

[Date]2003/7/10
[Paper #]
目次

,  

[Date]2003/7/10
[Paper #]
A New Two Pass Diffie-Hellman Protocol with Key Confirmation

Alireza NEMANEYPOUR,  Hajime ISHIHARA,  Toshihiko KATO,  Shuichi ITOH,  

[Date]2003/7/10
[Paper #]ISEC2003-12
Rabin Tree and its Application to Broadcast Encryption

Hiroaki KIKUCHI,  

[Date]2003/7/10
[Paper #]ISEC2003-13
Analysis of Double Block Length Hash Functions

Mitsuhiro HATTORI,  Shoichi HIROSE,  Susumu YOSHIDA,  

[Date]2003/7/10
[Paper #]ISEC2003-14
Method of the generating pseudorandom numbers composed of one-way functionality of A non-linear mapping in the limit precision

Eiji Watanabe,  

[Date]2003/7/10
[Paper #]ISEC2003-15
A new deduction system for cryptographic primitives and their security properties

Ashraf Moustafa BHERY,  Shigeki HAGIHARA,  Naoki YONEZAKI,  

[Date]2003/7/10
[Paper #]ISEC2003-16
Research on the applications of Register Blocking Technique and Carry Save Technique to Ohta Method

Chuyur ZHENG,  Masataka OHTA,  Kiyomichi ARAKI,  

[Date]2003/7/10
[Paper #]ISEC2003-17
EUROCRYPT 2003 Report

Shiho MORIAI,  Akira OTSUKA,  Hideki IMAI,  

[Date]2003/7/10
[Paper #]ISEC2003-18
Enhancement of the DNA Ink Reliability, Confidentiality and Integrity

Yukio ITAKURA,  Masaki HASHIYADA,  Toshio NAGASHIMA,  Hisao ITO,  Shigeo TSUJII,  

[Date]2003/7/10
[Paper #]ISEC2003-19
Digital Document Sanitizing Problem

Kunihiko MIYAZAKI,  Seiichi SUSAKI,  Mitsuru IWAMURA,  Tsutomu Matsumoto,  Ryoichi SASAKI,  Hiroshi YOSHIURA,  

[Date]2003/7/10
[Paper #]ISEC2003-20
Consideration of a digital document protection scheme to specify the malicious entity between the two

Haruki OTA,  Yasuyuki WATANABE,  Koji NAKAO,  

[Date]2003/7/10
[Paper #]ISEC2003-21
Proposal and evaluation of hysteresis signature system with paper document

Mitsuaki Shinoda,  Yusuke Ueda,  Ryoichi Sasak,  

[Date]2003/7/10
[Paper #]ISEC2003-22
XML Access Control Using Static Analysis

Makoto MURATA,  Akihiko TOZAWA,  Michiharu KUDO,  Satoshi HADA,  

[Date]2003/7/10
[Paper #]ISEC2003-23
Anomaly-based intrusion detection and prevention by semantic evaluation of HTTP requests

Toru KONNO,  Masamichi TATEOKA,  

[Date]2003/7/10
[Paper #]ISEC2003-24
The Secure SHell's Vulnerability against Rollback Attacks

Toshiyuki KITO,  Takamichi SAITO,  

[Date]2003/7/10
[Paper #]ISEC2003-25
The Numerical Analysis of the Effect of Distributed Active Firewall against SQL Slammer Worm Virus

Makoto SUGITA,  Masaru KATAYAMA,  Kohei SHIOMOTO,  Naoaki YAMANAKA,  

[Date]2003/7/10
[Paper #]ISEC2003-26
Unknown Virus Detection System using Virtual Network

Masaki KAMIZONO,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2003/7/10
[Paper #]ISEC2003-27
Cryptographic Memory System : Get high with a little help from my kernel

YU INAMURA,  

[Date]2003/7/10
[Paper #]ISEC2003-28
A method for extracting program fingerprints from Java class files

Haruaki TAMADA,  Yuichiro KANZAKI,  Masahide NAKAMURA,  Akito MONDEN,  Ken-ichi MATSUMOTO,  

[Date]2003/7/10
[Paper #]ISEC2003-29
12>> 1-20hit(22hit)