Engineering Sciences/NOLTA-Information Security(Date:2008/12/10)

Presentation
表紙

,  

[Date]2008/12/10
[Paper #]
目次

,  

[Date]2008/12/10
[Paper #]
Measure of failure for the company infrastructure

Koichiro OZASA,  Satoshi ONO,  

[Date]2008/12/10
[Paper #]ISEC2008-89
Web Server Software Structure for Scalability

Haruki Mori,  Satoshi Ono,  

[Date]2008/12/10
[Paper #]ISEC2008-90
Access management method for Least Privilege implementation By the identity federation cross-organizations

Takahito Motojima,  Satoshi Ono,  

[Date]2008/12/10
[Paper #]ISEC2008-91
Negotiate the Trust built in The Internet

Takashi Hosokawa,  Satoshi Ono,  

[Date]2008/12/10
[Paper #]ISEC2008-92
Self-construction of Home Domain by Using Entry Device List

Sho IKEYAMA,  Yoshihiro HORI,  Yoshiaki SIRAISHI,  Akira IWATA,  

[Date]2008/12/10
[Paper #]ISEC2008-93
A Masquerade Detecting Method Based On the TF-IDF Model

Geng Dai,  Zhou Jian,  Haruhiko Shirai,  Jousuke Kuroiwa,  Tomohire Odaka,  Hisakazu Ogura,  

[Date]2008/12/10
[Paper #]ISEC2008-94
On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography

Mitsuru Hamada,  

[Date]2008/12/10
[Paper #]ISEC2008-95
A Knapsack Cryptosystem Resisting Well-known Attacks

Kunikatsu KOBAYASHI,  

[Date]2008/12/10
[Paper #]ISEC2008-96
Cryptosystems on Algebraic Tori : Some Efficient Algorithms for Squaring

Tomoko YONEMURA,  Kenichiro FURUTA,  Yoshikazu HANATANI,  Taichi ISOGAI,  Yuichi KOMANO,  Hirofumi MURATANI,  Hanae NOZAKI,  Kenji OHKUMA,  Atsushi SHIMBO,  

[Date]2008/12/10
[Paper #]ISEC2008-97
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori

Taichi ISOGAI,  Kenji OHKUMA,  Yuuichi KOMANO,  Atsushi SHIMBO,  Hanae NOZAKI,  Yoshikazu HANATANI,  Kenichiro FURUTA,  Hirofumi MURATANI,  Tomoko YONEMURA,  

[Date]2008/12/10
[Paper #]ISEC2008-98
Construction of the experiment environment for the CPA attack

Daisaku MINAMIZAKI,  Keisuke IWAI,  Takakazu KUROKAWA,  

[Date]2008/12/10
[Paper #]ISEC2008-99
Power Analysis against an FPGA Implementation of the AES with SubBytes in a memory table

Hiroyuki KAWAKITA,  Yusei NISHIMOTO,  Kiyohiko ISHIKAWA,  Hiroyuki IMAIZUMI,  

[Date]2008/12/10
[Paper #]ISEC2008-100
複写される方へ

,  

[Date]2008/12/10
[Paper #]
Notice for Photocopying

,  

[Date]2008/12/10
[Paper #]
奥付

,  

[Date]2008/12/10
[Paper #]