Information and Systems-Life Intelligence and Office Information Systems(Date:2009/11/05)

Presentation
表紙

,  

[Date]2009/11/5
[Paper #]
目次

,  

[Date]2009/11/5
[Paper #]
Constructing New Differential Paths and Algebraic Cryptanalysis for Full-SHA-1

Makoto SUGITA,  Mitsuru KAWAZOE,  Hideki IMAI,  

[Date]2009/11/5
[Paper #]ISEC2009-51,LOIS2009-40
A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme

Masaki INAMURA,  Ryu WATANABE,  Toshiaki TANAKA,  

[Date]2009/11/5
[Paper #]ISEC2009-52,LOIS2009-41
A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings

Hiroki FUJII,  Toru NAKANISHI,  Nobuo FUNABIKI,  

[Date]2009/11/5
[Paper #]ISEC2009-53,LOIS2009-42
A Construction of A New Class of Non-Linear Product-Sum-Type Public-Key Cryptosystem

Masao KASAHARA,  

[Date]2009/11/5
[Paper #]ISEC2009-54,LOIS2009-43
A Looking Back Service for Power Consumption Logs in Home Network System

Masayuki FUKUDA,  Hideharu SETO,  Hiroyuki SAKAMOTO,  Hiroshi IGAKI,  Masahide NAKAMURA,  

[Date]2009/11/5
[Paper #]ISEC2009-55,LOIS2009-44
Considering Common Data Model to Mash-up Life Logs

Masahide NAKAMURA,  Akira SHIMOJO,  Hiroshi IGAKI,  

[Date]2009/11/5
[Paper #]ISEC2009-56,LOIS2009-45
Possibility of the Life Log Service in the House

Kazuko Katase,  

[Date]2009/11/5
[Paper #]ISEC2009-57,LOIS2009-46
Consciousness Survey of Personal Health Information Management based on e-P.O.Box

Naoko Taira,  Joong-Sun Lee,  Hiroyuki Suzuki,  Kouichi Kita,  Takashi Obi,  Masuyoshi Yachida,  Yuuji Hommma,  Hiroshige Yamamoto,  Kazuhisa Uryuu,  Masahiro Yamaguchi,  Nagaaki Ohyama,  

[Date]2009/11/5
[Paper #]ISEC2009-58,LOIS2009-47
Proposal of Multivariate Public Key Signature Scheme Applying the STS cryptosystem : Complementary STS Signature

Shigeo TSUJII,  Masahito GOTAISHI,  Kohtaro TADAKI,  

[Date]2009/11/5
[Paper #]ISEC2009-59,LOIS2009-48
Matsumoto-Imai Signature by Dual Perturbation : Two new Modifiers

Masahito GOTAISHI,  Kohtaro TADAKI,  Ryo FUJITA,  Shigeo TSUJII,  

[Date]2009/11/5
[Paper #]ISEC2009-60,LOIS2009-49
Anonymous Query Language Retrieval

Hiroshi YAMAGUCHI,  Shigeo TSUJII,  

[Date]2009/11/5
[Paper #]ISEC2009-61,LOIS2009-50
JavasCrypto

Satoshi ODA,  Gembu MOROHASHI,  

[Date]2009/11/5
[Paper #]ISEC2009-62,LOIS2009-51
Modeling and Verification of Serendipitous Recommender System

Takayuki AKIYAMA,  Kiyohiro OBARA,  Masaaki TANIZAKI,  

[Date]2009/11/5
[Paper #]ISEC2009-63,LOIS2009-52
Identifying Purchase Behavior on Web Access Log

Hisaharu ISHII,  Yusuke ICHIKAWA,  Hiroyuki SATO,  Toru KOBAYASHI,  

[Date]2009/11/5
[Paper #]ISEC2009-64,LOIS2009-53
State Recovery of RC4 PRGA by Using Nonzero Bit Differences

Mitsuki AJIRO,  Atsuko MIYAJI,  

[Date]2009/11/5
[Paper #]ISEC2009-65,LOIS2009-54
Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks

Hisashige ITO,  Atsuko MIYAJI,  Kazumasa OMOTE,  

[Date]2009/11/5
[Paper #]ISEC2009-66,LOIS2009-55
Speeding Up of a Message Falsification Attack on WPA-TKIP

Toshihiro OHIGASHI,  Yuki OZAWA,  Masakatu MORII,  

[Date]2009/11/5
[Paper #]ISEC2009-67,LOIS2009-56
Secure Biometric Authentication Using 2-DNF Homomorphic Encryption

Mitsuhiro HATTORI,  Yoichi SHIBATA,  Takashi ITO,  Nori MATSUDA,  Katsuyuki TAKASHIMA,  Takeshi YONEDA,  

[Date]2009/11/5
[Paper #]ISEC2009-68,LOIS2009-57
12>> 1-20hit(25hit)