Engineering Sciences/NOLTA-Information Security(Date:2012/11/14)

Presentation
表紙

,  

[Date]2012/11/14
[Paper #]
目次

,  

[Date]2012/11/14
[Paper #]
How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromagnetic Irradiation

Yuu TSUCHIYA,  Takeshi KISHIKAWA,  Shohei SAITO,  Tsuyoshi TOYAMA,  Akihiko SASAKI,  Akashi SATOH,  Tsutomu MATSUMOTO,  

[Date]2012/11/14
[Paper #]ISEC2012-57,LOIS2012-32
Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension

Asraf Akhimullah,  Shoichi Hirose,  Emi Matsuyama,  

[Date]2012/11/14
[Paper #]ISEC2012-58,LOIS2012-33
Secure multiplication algorithm based on secret sharing

Ryota NAKADA,  Takayuki NAKACHI,  

[Date]2012/11/14
[Paper #]ISEC2012-59,LOIS2012-34
Implementation and Evaluation of MashMap Framework for Visualizing Location-based Lifelog

Kohei TAKAHASHI,  Shinsuke MATSUMOTO,  Masahide NAKAMURA,  

[Date]2012/11/14
[Paper #]ISEC2012-60,LOIS2012-35
Implementing API of Large-scale House Log Data Platform in Smart City

Shintaro YAMAMOTO,  Shinsuke MATSUMOTO,  Masahide NAKAMURA,  

[Date]2012/11/14
[Paper #]ISEC2012-61,LOIS2012-36
A study of the human resource allocation on the cooperation system of life support services

Mizue HAYASHI,  Yoshiyuki MIHARA,  Atsushi NAKADAIRA,  Manabu OKAMOTO,  Takefumi YAMAZAKI,  Atsushi SATO,  

[Date]2012/11/14
[Paper #]ISEC2012-62,LOIS2012-37
A Web Service Implementation of Anonymous Attribute Authentication System for CNF Formulas

Yuji HAMADA,  Toru NAKANISHI,  Kan WATANABE,  Nobuo FUNABIKI,  

[Date]2012/11/14
[Paper #]ISEC2012-63,LOIS2012-38
A Classification Method of Application Traffic in Encrypted Tunnel Using SVM

ThanhTuan NGUYEN,  Yasuhiro NAKAMURA,  

[Date]2012/11/14
[Paper #]ISEC2012-64,LOIS2012-39
Proposal on Concept of Encrypted State Processing at Semantic Layer based on Logic : Toward Realization of Confidentiality Preserving Retrieval and Creation of Answer by Natural Language

Shigeo TTSUJII,  Hiroshi YAMAGUCHI,  Tetsuya MORIZUMI,  

[Date]2012/11/14
[Paper #]ISEC2012-65,LOIS2012-40
Secret sharing using Chinese remainder theorem and its application

Toshio TSUJI,  Masao KASAHARA,  

[Date]2012/11/14
[Paper #]ISEC2012-66,LOIS2012-41
BPMNによる情報提供ネットワークシステムの可視化に関する研究(情報セキュリティ,ライフログ活用技術,ライフインテリジェンス,オフィス情報システム,一般)

,  

[Date]2012/11/14
[Paper #]ISEC2012-67,LOIS2012-42
Efficient elliptic curve exponentiation using an improved Greedy algorithm for DBNS

Yoshio KAWAMO,  Atsuko MIYAJI,  

[Date]2012/11/14
[Paper #]ISEC2012-68,LOIS2012-43
A New Explicit Relation between Trace, Definition Field, and Embedding Degree

ATSUKO MIYAJI,  XIAONAN SHI,  

[Date]2012/11/14
[Paper #]ISEC2012-69,LOIS2012-44
A note on subgroup decision problem and pairing inversion problem

Naoki KANAYAMA,  Shigenori UCHIYAMA,  Eiji OKAMOTO,  

[Date]2012/11/14
[Paper #]ISEC2012-70,LOIS2012-45
Parallelized GaussSieve Algorithm for Solving the Shortest Vector Problem in Lattices

Tsukasa ISHIGURO,  Shinsaku KIYOMOTO,  Yutaka MIYAKE,  Tsuyoshi TAKAGI,  

[Date]2012/11/14
[Paper #]ISEC2012-71,LOIS2012-46
複写される方へ

,  

[Date]2012/11/14
[Paper #]
Notice for Photocopying

,  

[Date]2012/11/14
[Paper #]
奥付

,  

[Date]2012/11/14
[Paper #]
12>> 1-20hit(21hit)