Engineering Sciences/NOLTA-Information Security(Date:2004/12/10)

Presentation
表紙

,  

[Date]2004/12/10
[Paper #]
目次

,  

[Date]2004/12/10
[Paper #]
Time-Capsule Encryption

Maki YOSHIDA,  Shigeo MITSUNARI,  Toru FUJIWARA,  

[Date]2004/12/10
[Paper #]ISEC2004-98
Experiments on the modulo p+1 and p+2 method for fast modular multiplication

Hidetaka KOJIMA,  Akira HAYASHI,  

[Date]2004/12/10
[Paper #]ISEC2004-99
Informational concealment using digital watermarking

Liu Heng,  Motoi Fujimura,  Masao Fujimura,  Tosirou Kutsuwa,  

[Date]2004/12/10
[Paper #]ISEC2004-100
A Tamper Detection Method for Active Data on the Internet

Kouichi TAKAYASHIKI,  Toshimitsu INOMATA,  Masakazu SOGA,  

[Date]2004/12/10
[Paper #]ISEC2004-101
A Tamper-Detection System for Web Pages Using a Proof-Data from Client

Fumihiro Kumagai,  Toshimitsu Inomata,  Masakazu Soga,  

[Date]2004/12/10
[Paper #]ISEC2004-102
Implementation mechanisms of Event-Ordering System

Hidetaka Ishimoto,  Satoshi Ono,  Eiichi Horita,  

[Date]2004/12/10
[Paper #]ISEC2004-103
Threat analysis of Event-Ordering Systems

Shingo ORIHARA,  Satoshi ONO,  Eiichi HORITA,  Hidetaka ISHIMOTO,  

[Date]2004/12/10
[Paper #]ISEC2004-104
Formal proof of correctness of scalable event-ordering system

Mizuhito OGAWA,  Eiichi HORITA,  Satoshi ONO,  

[Date]2004/12/10
[Paper #]ISEC2004-105
複写される方へ

,  

[Date]2004/12/10
[Paper #]
奥付

,  

[Date]2004/12/10
[Paper #]