Engineering Sciences/NOLTA-Information Security(Date:2007/11/14)

Presentation
表紙

,  

[Date]2007/11/14
[Paper #]
目次

,  

[Date]2007/11/14
[Paper #]
A New Construction of Knapsack Crpytosystem

Masao KASAHARA,  Yasuyuki MURAKAMI,  Takeshi NASAKO,  

[Date]2007/11/14
[Paper #]ISEC2007-89,OIS2007-61
Small Secret Key Attack on Takagi's Variant of RSA (Part1)

Noboru KUNIHIRO,  Koichi ITOH,  Kaoru KUROSAWA,  

[Date]2007/11/14
[Paper #]ISEC2007-90,OIS2007-62
Clone Resistance in Artifact-metric Systems : How to Evaluate the Clone Resistance

Yuko TAMURA,  Masashi UNE,  

[Date]2007/11/14
[Paper #]ISEC2007-91,OIS2007-63
Anonymous Fingerprinting for Predelivery of Contents

Kazuhiro HARAMURA,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2007/11/14
[Paper #]ISEC2007-92,OIS2007-64
Function Estimation of Malware Code by Measuring Similarity

Kouki YASUMOTO,  Masakatu MORII,  Koji NAKAO,  

[Date]2007/11/14
[Paper #]ISEC2007-93,OIS2007-65
Extract Network Access Information from BOT Code Using Static Analysis

Hayato OKADA,  Masakatu MORII,  Koji NAKAO,  

[Date]2007/11/14
[Paper #]ISEC2007-94,OIS2007-66
Business Process based Access Control Method for Java EE Environment

Tomoya OKAUE,  Satoshi ONO,  

[Date]2007/11/14
[Paper #]ISEC2007-95,OIS2007-67
A study on implementation of mobile-phone with speaker verification

Yutaka HAMANO,  Masatsugu ICHINO,  Yasushi YAMAZAKI,  Kazuhiro TSURUMARU,  Naohisa KOMATSU,  

[Date]2007/11/14
[Paper #]ISEC2007-96,OIS2007-68
Template Protection using Biometric Encryption for CELP Speaker Verification

Shinya TAKAYAMA,  Tetsushi OKI,  Yasushi YAMAZAKI,  Naohisa KOMATSU,  Masao KASAHARA,  

[Date]2007/11/14
[Paper #]ISEC2007-97,OIS2007-69
複写される方へ

,  

[Date]2007/11/14
[Paper #]
Notice for Photocopying

,  

[Date]2007/11/14
[Paper #]
奥付

,  

[Date]2007/11/14
[Paper #]