Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2007/07/12)

Presentation
表紙

,  

[Date]2007/7/12
[Paper #]
目次

,  

[Date]2007/7/12
[Paper #]
The Study for the Position Authentication and the Security of Location Information

Yukio Takahashi,  Shigeo Tsujii,  

[Date]2007/7/12
[Paper #]ISEC2007-16,SITE2007-10
A preference transmission method with information security database systems on the Internet

Yasuyoshi Okada,  Naoshi Sato,  

[Date]2007/7/12
[Paper #]ISEC2007-17,SITE2007-11
On Security and Complexity of Shared Attribute Certification Systems

Makiko UEYAMA,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2007/7/12
[Paper #]ISEC2007-18,SITE2007-12
User Authentication Method Based on Statistical Analysis of Keystrokes

Yoshihiro KATAOKA,  Takao MIYAMOTO,  Shigeki AOKI,  Masao IZUMI,  Kunio FUKUNAGA,  

[Date]2007/7/12
[Paper #]ISEC2007-19,SITE2007-13
A random number generation method with a variable degree of safety and its analysis

Yasuyuki TANAKA,  Harutaka ISHIZU,  Naohiko MORI,  

[Date]2007/7/12
[Paper #]ISEC2007-20,SITE2007-14
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes

Tsukasa ENDO,  Isao ECHIZEN,  Hiroshi YOSHIURA,  

[Date]2007/7/12
[Paper #]ISEC2007-21,SITE2007-15
Consideration on effectiveness of CC V3.1 Function Specific Assurance ST

Masue SHIBA,  Naokazu SASAKI,  Takahisa ISHIDA,  Hiroshi IGUCHI,  Tsuyoshi SHIMADA,  

[Date]2007/7/12
[Paper #]ISEC2007-22,SITE2007-16
Japan-U.S. comparisons of information security survey

Kentarou YAMAGUCHI,  Katsuya UCHIDA,  

[Date]2007/7/12
[Paper #]ISEC2007-23,SITE2007-17
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand

Seiichiro Yatake,  Katsuya Uchida,  

[Date]2007/7/12
[Paper #]ISEC2007-24,SITE2007-18
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information, "Covert Channels"

Tetsuya MORIZUMI,  Hirotsugu KINOSHITA,  Shigeo TSUJII,  

[Date]2007/7/12
[Paper #]ISEC2007-25,SITE2007-19
Technological and Social Study on Emergency Message Services

Shunichi YONEMURA,  Kazuo KAMATA,  Masakatu AOKI,  Akinori YONEKURA,  

[Date]2007/7/12
[Paper #]ISEC2007-26,SITE2007-20
Study on Information Transparency and Trust with the progress of Web Technology

Noriaki Yoshikai,  Toshio Yamagishi,  

[Date]2007/7/12
[Paper #]ISEC2007-27,SITE2007-21
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow

Ryota SATO,  Keiichi HIROTA,  Taro YAMAMOTO,  Shigeaki TANIMOTO,  Osamu SHIONOIRI,  Atsushi KANAI,  

[Date]2007/7/12
[Paper #]ISEC2007-28,SITE2007-22
Start of Internet Broadcast in Japan

Masataka OHTA,  

[Date]2007/7/12
[Paper #]ISEC2007-29,SITE2007-23
A Mutual Authentication System for Web Server Access by Using Cellar Phone

Yukiko SAWAYA,  AKira YAMADA,  Yutaka MIYAKE,  

[Date]2007/7/12
[Paper #]ISEC2007-30,SITE2007-24
A Method of Limit Appreciation of Content

Takehisa KATO,  

[Date]2007/7/12
[Paper #]ISEC2007-31,SITE2007-25
A Method of Excluding Disapproval Connection on Authentication Network

Takeshi MIYAKE,  Shunyo SUZUKI,  Fumiaki KITANO,  Akira IWATA,  

[Date]2007/7/12
[Paper #]ISEC2007-32,SITE2007-26
An authentication network system using virtual authenticator module

Shunyo SUZUKI,  Fumiaki KITANO,  Takeshi MIYAKE,  Akira IWATA,  

[Date]2007/7/12
[Paper #]ISEC2007-33,SITE2007-27
12>> 1-20hit(33hit)