Engineering Sciences/NOLTA-Information Security(Date:2005/05/11)

Presentation
表紙

,  

[Date]2005/5/11
[Paper #]
目次

,  

[Date]2005/5/11
[Paper #]
正誤表

,  

[Date]2005/5/11
[Paper #]
Construction methods of provably secure threshold cryptosystems in public key setting

Takeru ISHIHARA,  Hiroshi AONO,  Sadayuki HONGO,  Junji SHIKATA,  

[Date]2005/5/11
[Paper #]ISEC2005-1
Ring Signature Schemes with Innocence Assertion Revisited (Part 2) : Group Signatures Strengthening the Signers' Privacy

Yuichi KOMANO,  Kazuo OHTA,  Atsushi SHIMBO,  Shinichi KAWAMURA,  

[Date]2005/5/11
[Paper #]ISEC2005-2
XTR over Characteristic 3

Masaaki SHIRASE,  Yasushi HIBINO,  

[Date]2005/5/11
[Paper #]ISEC2005-3
PKC2005 Report

Akira OTSUKA,  Makoto SUGITA,  

[Date]2005/5/11
[Paper #]ISEC2005-4
Liveness Detection and Failure to Enroll in Biometrics (2) : A Research on Vein Pattern Based Authentication, Part 1

Tsutomu MATSUMOTO,  Takuji HACHIRO,  Takehiro TANABE,  Tomoki MORISHITA,  Kenji SATO,  

[Date]2005/5/11
[Paper #]ISEC2005-5
Password authentication with tablet device

Ryuichi SAKAI,  Takenao KUKITA,  

[Date]2005/5/11
[Paper #]ISEC2005-6
A Construction of Public-Key Cryptosystem based on Singular Simultaneous Equations and Its Variants

Masao KASAHARA,  Ryuichi SAKAI,  

[Date]2005/5/11
[Paper #]ISEC2005-7
Efficient Algorithm for Computing Linear Probability of constant addition

Hirotaka ITTOGI,  Toshinobu KANEKO,  

[Date]2005/5/11
[Paper #]ISEC2005-8
複写される方へ

,  

[Date]2005/5/11
[Paper #]
Notice about Photocopying

,  

[Date]2005/5/11
[Paper #]
奥付

,  

[Date]2005/5/11
[Paper #]