Engineering Sciences/NOLTA-Information Security(Date:2013/12/04)

Presentation
表紙

,  

[Date]2013/12/4
[Paper #]
目次

,  

[Date]2013/12/4
[Paper #]
Presentations of a general augmentation scheme, K(V)Scheme, for strengthening several classes of PKC and a new class of system oriented PKC, K(I)SOPKC

Masao KASAHARA,  

[Date]2013/12/4
[Paper #]ISEC2013-73
A novel proposal of q-SVD domain for blind watermarking

Minh Thanh Ta,  Minh Tam Ta,  

[Date]2013/12/4
[Paper #]ISEC2013-74
Possibility of the Address Overlap Dos Attack in Live Migration

Kensuke KASAHARA,  Satoshi ONO,  

[Date]2013/12/4
[Paper #]ISEC2013-75
Difference of the detection rate of the template in the modified non-overlapping template matching test

Yuichi TAKEDA,  Mituaki HUZII,  Toshinari KAMAKURA,  Norio WATANABE,  

[Date]2013/12/4
[Paper #]ISEC2013-76
The Process by which Faults are Injected on Smart Cards Attacked by an Electromagnetic Irradiation Experiment

Yuu TSUCHIYA,  Hitoshi ONO,  Tsutomu MATSUMOTO,  

[Date]2013/12/4
[Paper #]ISEC2013-77
Education for Practical Hardware Security Based on Information Security Education Program

Yu-ichi HAYASHI,  Naofumi HOMMA,  Toshihiro KATASHITA,  Hideaki SONE,  

[Date]2013/12/4
[Paper #]ISEC2013-78
Another Vulnerability in a Cancelable Biometrics Authentication Scheme

Tetsuya IZU,  Yumi SAKEMI,  Masahiko TAKENAKA,  Naoya TORII,  

[Date]2013/12/4
[Paper #]ISEC2013-79
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2)

Kazuomi OISHI,  

[Date]2013/12/4
[Paper #]ISEC2013-80
A Study on An Analysis Prevention Scheme for Embedded System Firmware

Kazuomi OISHI,  

[Date]2013/12/4
[Paper #]ISEC2013-81
Report on PQCRYPTO2012

Takanori YASUDA,  

[Date]2013/12/4
[Paper #]ISEC2013-82
複写される方へ

,  

[Date]2013/12/4
[Paper #]
Notice for Photocopying

,  

[Date]2013/12/4
[Paper #]
奥付

,  

[Date]2013/12/4
[Paper #]
裏表紙

,  

[Date]2013/12/4
[Paper #]