Information and Systems-Life Intelligence and Office Information Systems(Date:2011/11/07)

Presentation
表紙

,  

[Date]2011/11/7
[Paper #]
目次

,  

[Date]2011/11/7
[Paper #]
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction

Yosuke TODO,  Masakatu MORII,  

[Date]2011/11/7
[Paper #]ISEC2011-34,LOIS2011-28
A Lattice Attack against (u|u+v)Σ PKC

Atsushi NAGAO,  Yosuke TODO,  Masakatu MORII,  

[Date]2011/11/7
[Paper #]ISEC2011-35,LOIS2011-29
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II)

Jun YAJIMA,  Masaya YASUDA,  Takeshi SHIMOYAMA,  Jun KOGURE,  

[Date]2011/11/7
[Paper #]ISEC2011-36,LOIS2011-30
An element-selective knapsack cryptosystem with encryption multipliers

Yuki OKADA,  Akira HAYASHI,  

[Date]2011/11/7
[Paper #]ISEC2011-37,LOIS2011-31
A study on necessary location information accuracy in lifelog

Hiromitsu UEDA,  Yukio Rikiso,  

[Date]2011/11/7
[Paper #]ISEC2011-38,LOIS2011-32
Evaluation method for telephone conversations retrieval using precision and recall

Hiroyuki Nishi,  Yuuki Yokobayashi,  Tran Li Haiyen,  Yoshimasa Kimura,  Toshio Kakinoki,  

[Date]2011/11/7
[Paper #]ISEC2011-39,LOIS2011-33
Proposal of "Knowledge Recommender" the Business-knowledge Sharing System and Rating Evaluation : Application for Building Energy Management Service

Minako TOBA,  

[Date]2011/11/7
[Paper #]ISEC2011-40,LOIS2011-34
Three dimensional Dyck Path Cipher

Jun HASHIMOTO,  Akira HAYASHI,  

[Date]2011/11/7
[Paper #]ISEC2011-41,LOIS2011-35
Hidden Pair of Bijection Signature system (2)

Masahito GOTAISHI,  Shigeo TSUJII,  

[Date]2011/11/7
[Paper #]ISEC2011-42,LOIS2011-36
Ramp secret sharing scheme based on MBR codes

Masazumi KURIHARA,  Hidenori KUWAKADO,  

[Date]2011/11/7
[Paper #]ISEC2011-43,LOIS2011-37
Formalization and Verification of Arithmetic Algorithms by Mizar

Yoshiki AOKI,  Hiroyuki OKAZAKI,  Yasunari SHIDAMA,  

[Date]2011/11/7
[Paper #]ISEC2011-44,LOIS2011-38
Designing a Filter for Internet Flow Control under Macro Dynamics : Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet

Jian-Qin LIU,  Wuyi YUE,  Hiroaki Umehara,  

[Date]2011/11/7
[Paper #]ISEC2011-45,LOIS2011-39
Efficient Decoding of QR Code using Error Correcting Capability : Decoding Method using Erasure Error Correction and the Ability

Keisuke SAITO,  Masakatu MORII,  

[Date]2011/11/7
[Paper #]ISEC2011-46,LOIS2011-40
A study of the machine learning corresponding to the change of a turn and the of the recognition object

Tatsumo HOJI,  Yuta YAMADA,  Akihiro SHIMIZU,  

[Date]2011/11/7
[Paper #]ISEC2011-47,LOIS2011-41
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks

Tsubasa TSUKAUNE,  Yosuke TODO,  Masakatu MORII,  

[Date]2011/11/7
[Paper #]ISEC2011-48,LOIS2011-42
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions

Hikaru SAKAMOTO,  Yang LI,  Kazuo OHTA,  Kazuo SAKIYAMA,  

[Date]2011/11/7
[Paper #]ISEC2011-49,LOIS2011-43
Optimized Right-to-Left Scalar Multiplication RIP Algorithms

Atsuko MIYAJI,  Yiren MO,  

[Date]2011/11/7
[Paper #]ISEC2011-50,LOIS2011-44
Efficient Privacy Preserving Set Operations

Atsuko MIYAJI,  Mohammad RAHMAN,  

[Date]2011/11/7
[Paper #]ISEC2011-51,LOIS2011-45
12>> 1-20hit(34hit)