Engineering Sciences/NOLTA-Information Security(Date:2005/11/08)

Presentation
表紙

,  

[Date]2005/11/8
[Paper #]
目次

,  

[Date]2005/11/8
[Paper #]
正誤表

,  

[Date]2005/11/8
[Paper #]
A Study on Wartermark for Texture Images on 3D Virtual Space

Shunsuke ARAKI,  

[Date]2005/11/8
[Paper #]ISEC2005-98,OIS2005-61
Dynamic Access Control Method for Ad-hoc Information Sharing

Yoichiro MORITA,  Masayuki NAKAE,  Ryuichi OGAWA,  

[Date]2005/11/8
[Paper #]ISEC2005-99,OIS2005-62
An Information Leakage Risk Evaluation Method Based on Security Configuration Validation

Hiroshi SAKAKI,  Kazuo YANOO,  Ryuichi OGAWA,  Itaru HOSOMI,  

[Date]2005/11/8
[Paper #]ISEC2005-100,OIS2005-63
Examination and implementation of network security against distributed denial of service attacks : Design and introduction of DTI hub

Kentarou NAGAYAMA,  Naohiko SHIRAI,  Isamu TAKAHASHI,  Jyousuke KUROIWA,  Tomohiro ODAKA,  Hisakazu OGURA,  

[Date]2005/11/8
[Paper #]ISEC2005-101,OIS2005-64
On Construction of Periodic Sequence on Algebraic Curve over Finite Field

Takayasu KAIDA,  

[Date]2005/11/8
[Paper #]ISEC2005-102,OIS2005-65
A Note of a Brute Force Attack to Specify Random Seeds of Pseudo Random Number Generators using Logistic-Mapping

Takeru MIYAZAKI,  Shunsuke ARAKI,  Satoshi UEHARA,  Kyoki IMAMURA,  

[Date]2005/11/8
[Paper #]ISEC2005-103,OIS2005-66
Improved Collision Attack on MD5

Yu SASAKI,  Yusuke NAITO,  Noboru KUNIHIRO,  Kazuo OHTA,  

[Date]2005/11/8
[Paper #]ISEC2005-104,OIS2005-67
Efficient Algorithm for Computing Linear Probability of constant addition II

Kazunori SUMIKAWA,  Hirotaka ITTOGI,  Toshinobu KANEKO,  

[Date]2005/11/8
[Paper #]ISEC2005-105,OIS2005-68
On Reference Positions and Bits in Differential Power Analysis Attack

Yousuke KAKUISHI,  Akihiko SASAKI,  Koki ABE,  

[Date]2005/11/8
[Paper #]ISEC2005-106,OIS2005-69
A Universally Composable Commitment Protocol based on KEA1 and Revocable DDH Assumptions

Yosuke IWASAKI,  Seigo ARITA,  

[Date]2005/11/8
[Paper #]ISEC2005-107,OIS2005-70
Asymmetric 3-Party Password-based Authenticated Key Exchange

Toru IINO,  Shinichiro MATSUO,  Hiroto MATSUOKA,  Wakaha OGATA,  

[Date]2005/11/8
[Paper #]ISEC2005-108,OIS2005-71
A Encryption Scheme with Recording Decryption Evidence

Yasumasa HIRAI,  Shinichiro MATSUO,  

[Date]2005/11/8
[Paper #]ISEC2005-109,OIS2005-72
複写される方へ

,  

[Date]2005/11/8
[Paper #]
Notice about photocopying

,  

[Date]2005/11/8
[Paper #]
奥付

,  

[Date]2005/11/8
[Paper #]