Engineering Sciences/NOLTA-Information Security(Date:2006/07/14)

Presentation
表紙

,  

[Date]2006/7/14
[Paper #]
目次

,  

[Date]2006/7/14
[Paper #]
A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function : A Proposal of Cascaded Ramp Scheme

Keiichi HIROTA,  Kazuo MOGI,  

[Date]2006/7/14
[Paper #]ISEC2006-40
Quantum Threshold Scheme Using Two States

Takeshi OKADA,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2006/7/14
[Paper #]ISEC2006-41
Traveling Salesman Problem and Tribonacci Sequence

Kunikatsu KOBAYASHI,  Seiichirou KOKUBUN,  

[Date]2006/7/14
[Paper #]ISEC2006-42
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols

Hirofumi MURATANI,  

[Date]2006/7/14
[Paper #]ISEC2006-43
Privacy-Preserving Scalar Product Comparison Protocol

Jun SAKUMA,  Shigenobu KOBAYASHI,  

[Date]2006/7/14
[Paper #]ISEC2006-44
Secure optimization of Traveling Salesman Problem using Scalar Product Comparison Protocol

Jun SAKUMA,  Shigenobu KOBAYASHI,  

[Date]2006/7/14
[Paper #]ISEC2006-45
On the Standardization of Information Security : Report on the Madrid Meeting in May, 2006

Atsuko MIYAJI,  Takeshi CHIKAZAWA,  Toshio TATSUTA,  Akira OTSUKA,  Kan YASUDA,  Kengo MORI,  Toshiaki SAISHO,  

[Date]2006/7/14
[Paper #]ISEC2006-46
Security Requirements for PIN Authentication in Financial Transactions

Yuko TAMURA,  Masashi UNE,  

[Date]2006/7/14
[Paper #]ISEC2006-47
Proposal and Evaluation on Epidemiological Approach against Computer Virus

Ryoichi Sasaki,  

[Date]2006/7/14
[Paper #]ISEC2006-48
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet

Naoya FUKUNO,  Tomohiro KOBORI,  Hiroaki KIKUCHI,  Masato TERADA,  Norihisa DOI,  

[Date]2006/7/14
[Paper #]ISEC2006-49
A Study on Security Technologies for Paper Documents

Ryu Ebisawa,  Yasuhiro Fujii,  Tezuka Satoru /,  

[Date]2006/7/14
[Paper #]ISEC2006-50
Visualization Technologies of nicter Incident Analysis System

Koji NAKAO,  Fumiko MATSUMOTO,  Daisuke INOUE,  Shunsuke BABA,  Kazuya SUZUKI,  Masashi ETO,  Katsunari YOSHIIOKA,  Kenji RIKITAKE,  Yoshiaki HORI,  

[Date]2006/7/14
[Paper #]ISEC2006-51
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates

Tatsuyuki MATSUSHITA,  Hideki IMAI,  

[Date]2006/7/14
[Paper #]ISEC2006-52
Fingerprinting Protocol Equipping Electronic Payment System

Shinya YAMANE,  Minoru KURIBAYASHI,  Masakatu MORII,  

[Date]2006/7/14
[Paper #]ISEC2006-53
An Efficient Anonymous Password-Authenticated Key Exchange Protocol

SeongHan SHIN,  Kazukuni KOBARA,  Hideki IMAI,  

[Date]2006/7/14
[Paper #]ISEC2006-54
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds

Jeong Ok KWON,  Kouichi SAKURAI,  Dong Hoon LEE,  

[Date]2006/7/14
[Paper #]ISEC2006-55
Distributed Privacy-preserving Document Clustering

Chunhua SU,  Jianying ZHOU,  Feng BAO,  Kouichi SAKURAI,  

[Date]2006/7/14
[Paper #]ISEC2006-56
Key-Management Scheme for Secure Multicast based on Network Topology

Kazuhide FUKUSHIMA,  Shinsaku KIYOMOTO,  Toshiaki TANAKA,  Kouichi SAKURAI,  

[Date]2006/7/14
[Paper #]ISEC2006-57
12>> 1-20hit(37hit)