Engineering Sciences/NOLTA-Information Security(Date:2008/11/06)

Presentation
表紙

,  

[Date]2008/11/6
[Paper #]
目次

,  

[Date]2008/11/6
[Paper #]
On Host-based Packet Capturing Mechanism for Network Forensics

Shunsuke INAI,  Youji FUKUTA,  Shoji MIZOBUCHI,  Masami MOHRI,  Yoshiaki SHIRAISHI,  Ryoji NOGUCHI,  

[Date]2008/11/6
[Paper #]ISEC2008-73,OIS2008-49
A RIA Groupware System using Google Gdata Protocol : A Schedule Information Sharing System

Rui ZHUANG,  Yukio RIKISO,  

[Date]2008/11/6
[Paper #]ISEC2008-74,OIS2008-50
Study of e-P.O.Box Basic System for The Social Security Service

Takashi OBI,  Yasuyoshi YACHIDA,  Joong Sun LEE,  Yuji HOMMA,  Nagaaki OHYAMA,  Takumi KASHIWAGI,  Hiromasa KAWAMURA,  Eikazu NIWANO,  

[Date]2008/11/6
[Paper #]ISEC2008-75,OIS2008-51
A suggestion of the offer and management system of the individual prescription and medication history

Aya MATSUDAIRA,  Hiroyuki SUZUKI,  Takashi OBI,  Kouichi KITA,  Masahiro YAMAGUCHI,  Jhong LEE,  Masuyoshi YACHIDA,  Nagaaki OHYAMA,  

[Date]2008/11/6
[Paper #]ISEC2008-76,OIS2008-52
An Experiment with DPA and DEMA on FPGA Equipped on SASEBO

Takahiko SYOUJI,  Akira NOZAWA,  Takayuki KIMURA,  Tomoyasu SUZAKI,  Noritaka YAMASHITA,  Yukiyasu TSUNOO,  

[Date]2008/11/6
[Paper #]ISEC2008-77,OIS2008-53
On the Hardness of Discrete Logarithm Problem in Algebraic Tori

Hirofumi MURATANI,  Tomoko YONEMURA,  Taichi ISOGAI,  Kenji OHKUMA,  Yoshikazu HANATANI,  Kenichiro FURUTA,  Yuichi KOMANO,  Hanae NOZAKI,  Atsushi SHIMBO,  

[Date]2008/11/6
[Paper #]ISEC2008-78,OIS2008-54
Multivariate Public-Key Cryptosystems Constructed Based on K(I)・SE(1) Scheme and Applications of MPKC on Common Key Cryptosystem

Masao KASAHARA,  

[Date]2008/11/6
[Paper #]ISEC2008-79,OIS2008-55
A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing

Yuta HIRA,  Toru NAKANISHI,  Nobuo FUNABIKI,  

[Date]2008/11/6
[Paper #]ISEC2008-80,OIS2008-56
A Secure and Accessible Knowledge Management System for Home-Based Care Services for the Elderly : An Area Portal for Tacit Knowledge Sharing and Collaboration in Home-Based Care Services

Akira IWATA,  

[Date]2008/11/6
[Paper #]ISEC2008-81,OIS2008-57
Elliptic curves with a pre-determined embedding degree

Shoujirou HIRASAWA,  Atsuko MIYAJI,  

[Date]2008/11/6
[Paper #]ISEC2008-82,OIS2008-58
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences

Masahiro SUKEGAWA,  Atsuko MIYAJI,  

[Date]2008/11/6
[Paper #]ISEC2008-83,OIS2008-59
Uniquely decipherable Rabin cryptosystem with modulus p^kq

Kensuke TAKAMURA,  Akira HAYASHI,  

[Date]2008/11/6
[Paper #]ISEC2008-84,OIS2008-60
On lattice bases for the Lagarias-Odlyzko attack against TSP cryptosystems

Takeshi TANIGUCHI,  Akira HAYASHI,  

[Date]2008/11/6
[Paper #]ISEC2008-85,OIS2008-61
Dynamic Node Relocation Algorithm for Improvement Communication Quality in Multi-hop Wireless Network

Yoko FURUZUMI,  Yukikazu NAKAMOTO,  

[Date]2008/11/6
[Paper #]ISEC2008-86,OIS2008-62
Overseas Trends on and a Consideration about Privacy Protection and Utilization Technologies

Takashi HATASHIMA,  Shigeaki TANIMONO,  Katsumi TAKAHASHI,  

[Date]2008/11/6
[Paper #]ISEC2008-87,OIS2008-63
A Study on Visualization of Personal Life Log Considering Disclosure Control

Shin-ichiro EITOKU,  Narimune MATSUMURA,  Tomohiro YAMADA,  Shin-yo MUTO,  Masanobu ABE,  

[Date]2008/11/6
[Paper #]ISEC2008-88,OIS2008-64
複写される方へ

,  

[Date]2008/11/6
[Paper #]
Notice for Photocopying

,  

[Date]2008/11/6
[Paper #]
12>> 1-20hit(21hit)