Engineering Sciences/NOLTA-Wideband System(Date:2009/03/02)

Presentation
表紙

,  

[Date]2009/3/2
[Paper #]
目次

,  

[Date]2009/3/2
[Paper #]
Proposal of Piece Falsification Detection Method on JetJigsaw

Tatsuyuki MATSUSHITA,  Kentaro UMESAWA,  Shinji YAMANAKA,  

[Date]2009/3/2
[Paper #]IT2008-43,ISEC2008-101,WBS2008-56
Access control model for distributed systems and its application for service proxies

Yoshiharu ASAKURA,  Atsushi HONDA,  Naoshi HIGUCHI,  Yoshinori SAIDA,  

[Date]2009/3/2
[Paper #]IT2008-44,ISEC2008-102,WBS2008-57
Network Usage Control Based on Evaluation of User Security

Takuma HORI,  Yasuyoshi OKADA,  Naoshi SATO,  

[Date]2009/3/2
[Paper #]IT2008-45,ISEC2008-103,WBS2008-58
Anomaly detection based on the machine learning of the human action on home networks

Yuji SHINTANI,  Yasuyoshi OKADA,  Naoshi SATO,  

[Date]2009/3/2
[Paper #]IT2008-46,ISEC2008-104,WBS2008-59
On the Possibility of Taking off Prime Number Generation in RSA-based Access Control

Jin TAMURA,  

[Date]2009/3/2
[Paper #]IT2008-47,ISEC2008-105,WBS2008-60
A Note on Security of Knapsack Type PKC with Random Sequence

Yasuyuki MURAKAMI,  

[Date]2009/3/2
[Paper #]IT2008-48,ISEC2008-106,WBS2008-61
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack

Takeshi NASAKO,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]2009/3/2
[Paper #]IT2008-49,ISEC2008-107,WBS2008-62
Advances in Public-Key Cryptography (RSA, ECC, IBE)

Tsuyoshi TAKAGI,  

[Date]2009/3/2
[Paper #]IT2008-50,ISEC2008-108,WBS2008-63
Performance Evaluation of Error Correcting Codes

Toru FUJIWARA,  

[Date]2009/3/2
[Paper #]IT2008-51,ISEC2008-109,WBS2008-64
Algebraic topology and sensor networks

Yasuaki HIRAOKA,  Zin ARAI,  Kazunori HAYASHI,  

[Date]2009/3/2
[Paper #]IT2008-52,ISEC2008-110,WBS2008-65
Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks

Youji FUKUTA,  Yoshiaki SHIRAISHI,  Masami MOHRI,  Masakatu MORII,  

[Date]2009/3/2
[Paper #]IT2008-53,ISEC2008-111,WBS2008-66
Sharing Multilevel Secrets among Groups Using Concatenation of Reed-Solomon Codes

Hachiro FUJITA,  Chigusa KAWASHIMA,  Tomoko K. MATSUSHIMA,  

[Date]2009/3/2
[Paper #]IT2008-54,ISEC2008-112,WBS2008-67
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System

Mariko UCHIDA,  Youji FUKUTA,  Masami MOHRI,  Yoshiaki SHIRAISHI,  

[Date]2009/3/2
[Paper #]IT2008-55,ISEC2008-113,WBS2008-68
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna

Takayuki UMABA,  Masahiko MAEDA,  Yosuke HARADA,  Masazumi UEBA,  Satoru AIKAWA,  Hisato IWAI,  Hideichi SASAOKA,  

[Date]2009/3/2
[Paper #]IT2008-56,ISEC2008-114,WBS2008-69
Spectrum spreading sequences generated by chaotic dynamics and its correlational properties

Tohru KOHDA,  Takao UNE,  Yuichiro KOURA,  

[Date]2009/3/2
[Paper #]IT2008-57,ISEC2008-115,WBS2008-70
Markovian Coded Gaussian Filter with its application to Filterbanks

Tohru KOHDA,  Yutaka JITSUMATSU,  Tatsuma KUWAZAKI,  Kenjiro FUJINO,  

[Date]2009/3/2
[Paper #]IT2008-58,ISEC2008-116,WBS2008-71
Data Dissemination in Mobile Environment Using Collaborative Approach

Mohd RASHID,  Atsushi KINJO,  Tomokazu NAGATA,  Shiro TAMAKI,  

[Date]2009/3/2
[Paper #]IT2008-59,ISEC2008-117,WBS2008-72
Modulation Classification Based on Amplitude and Cosine moments

Shinji OHARA,  Masato KITA,  Ikuo OKA,  Shingo ATA,  

[Date]2009/3/2
[Paper #]IT2008-60,ISEC2008-118,WBS2008-73
12345>> 1-20hit(93hit)