Engineering Sciences/NOLTA-Information Security(Date:2003/07/11)

Presentation
表紙

,  

[Date]2003/7/11
[Paper #]
目次

,  

[Date]2003/7/11
[Paper #]
A privacy-enhanced efficient group signature scheme

Kozue UMEDA,  Atsuko MIYAJI,  

[Date]2003/7/11
[Paper #]ISEC2003-30
A Digital Signature Scheme That Can Detect the Compromise of Signing Ability

Makiko UEYAMA,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/7/11
[Paper #]ISEC2003-31
Proposal of "just" k-out-of-n signatures

Takeshi OKAMOTO,  Eiji OKAMOTO,  

[Date]2003/7/11
[Paper #]ISEC2003-32
Provable security of RSA signature schemes with message-dependant exponents

Takahiro FURUE,  Takenobu SEITO,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/7/11
[Paper #]ISEC2003-33
On-Line Signature Verification Method Based on Discrete Wavelet Transform

Isao NAKANISHI,  Naoto NISHIGUCHI,  Yoshio ITOH,  Yutaka FUKUI,  

[Date]2003/7/11
[Paper #]ISEC2003-34
Volume of Communications Necessary for Certificate Revocation in PKI Estimated Based on Probability Theory

Naoki TANAKA,  Yoichiro IINO,  

[Date]2003/7/11
[Paper #]ISEC2003-35
A report on 2nd annual PKI research workshop

Satoshi KOGA,  Kouichi SAKURAI,  

[Date]2003/7/11
[Paper #]ISEC2003-36
A Proposal of providering model for network resources over the ubiquitous environment

Michiko IZUMI,  Naoto MORISHIMA,  Hideki SUNAHARA,  

[Date]2003/7/11
[Paper #]ISEC2003-37
Users Privacy in Ubiquitous Network : Anonymous Communication Technique for Ad Hoc Network

TAKUYA OTSUKA,  AKIRA ONOZAWA,  

[Date]2003/7/11
[Paper #]ISEC2003-38
Current Topics on PKI Technologies for Mobile Commerce : Activities on Authentication WG, MC Committee, mITF

Toshiaki TANAKA,  Kimihiko SEKINO,  Hitoshi KIKUCHI,  Katsuyuki UMEZAWA,  

[Date]2003/7/11
[Paper #]ISEC2003-39
Secure Anonymous Buyer-Seller Watermarking Protocol Against Conspiracy Attack

Jae-Gwi Choi,  Kouichi Sakurai,  Ji-Hwan Park,  

[Date]2003/7/11
[Paper #]ISEC2003-40
Implementation and Evaluation of Illegal Copy Protection for Digital Contents

Masaki INAMURA,  Toshiaki TANAKA,  

[Date]2003/7/11
[Paper #]ISEC2003-41
A Fragile Watermarking Method for MPEG Video

Ken-ichi NORIDOMI,  Hisashi INOUE,  Masataka EJIMA,  

[Date]2003/7/11
[Paper #]ISEC2003-42
Analysis of validity on Two Layer Digital Watermarking

Saneyuki ISHII,  Hiroshi KASHIMURA,  Ryoichi SASAKI,  Hiroshi YOSHIURA,  Isao ECHIZEN,  Shinji ITO,  

[Date]2003/7/11
[Paper #]ISEC2003-43
A Note on Collusion Security of Codes

Katsunari YOSHIOKA,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/7/11
[Paper #]ISEC2003-44
A Proposal of P2P Credential Framework

Nobutaka KAWAGUCHI,  Naohiro OBATA,  Reina MIYAJI,  Shintaro UEDA,  Hiroshi SHIGENO,  Kenichi OKADA,  

[Date]2003/7/11
[Paper #]ISEC2003-45
A modeling of security measure selection problem

Toshiyuki HYODO,  Itsukazu NAKAMURA,  Masakatsu NISHIGAKI,  Masakazu SOGA,  

[Date]2003/7/11
[Paper #]ISEC2003-46
Configuration Tool of File Access Control Policy for Client

Satoshi KAI,  Masato ARAI,  Yasuhiko NAGAI,  Satoru TOMIDA,  

[Date]2003/7/11
[Paper #]ISEC2003-47
12>> 1-20hit(24hit)