Information and Systems-Software Science(Date:2003/03/19)

Presentation
表紙

,  

[Date]2003/3/19
[Paper #]
目次

,  

[Date]2003/3/19
[Paper #]
Efficient Multiparty Computation Using the Ramp Scheme

Yasuko MATSUMURA,  Kohei ENDO,  Satoshi NAKAGAWA,  

[Date]2003/3/19
[Paper #]SST2002-153
A consideration to tie PKCs to Acs at using Acs

Naohiko IMAEDA,  Hideyuki ODAHARA,  Hiroshi MASAMOTO,  

[Date]2003/3/19
[Paper #]SST2002-154
Program Obfuscation by Coding Data and Its Operation

Hirotsugu SATO,  Akito MONDEN,  Ken-ichi MATSUMOTO,  

[Date]2003/3/19
[Paper #]SST2002-155
A Method of Displaying Secret Information Only to the Designated User

Yukinori YAMADA,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/3/19
[Paper #]SST2002-156
Application of Associative Memory Model for a Secret Sharing Scheme

Kouji YASUNAGA,  Masaki KAWAMURA,  

[Date]2003/3/19
[Paper #]SST2002-157
Threshold-Verifiable Secret Sharing Scheme

Raylin TSO,  

[Date]2003/3/19
[Paper #]SST2002-158
Combinatorial Characterizations of Threshold Schemes

Ying MIAO,  

[Date]2003/3/19
[Paper #]SST2002-159
Information Security over Mobile Telecommunications

Makoto Tatebayashi,  Takehiko Kato,  

[Date]2003/3/19
[Paper #]SST2002-160
Increasing of Wireless Frequency Usage Efficiency by an Information Transmission Method Using Kronecker Product

Naoki SUEHIRO,  Chenggao HAN,  Toshiaki IMOTO,  

[Date]2003/3/19
[Paper #]SST2002-161
Multilayered Digital Watermarking System Based on Guided Scrambling

Akiomi KUNISA,  

[Date]2003/3/19
[Paper #]SST2002-162
A Random Number Generation Useful for Cryptosystems

Kyoki IMAMURA,  

[Date]2003/3/19
[Paper #]SST2002-163
A Construction of Short Public-Key Cryptosystem over Extension Field

Masao KASAHARA,  Ryuichi SAKAI,  

[Date]2003/3/19
[Paper #]SST2002-164
Traveling Salesman Cryptosystem using Gaussian Integer

Teruyuki SUZUKI,  Kunikatsu KOBAYASHI,  

[Date]2003/3/19
[Paper #]SST2002-165
Coarse Grain Parallel Processing of Block Lanczos Method

Taira SUGAWARA,  Masanobu KOIKE,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/3/19
[Paper #]SST2002-166
Performance analysis for tree-based group key management schemes

Hideyuki SAKAI,  Hirosuke YAMAMOTO,  

[Date]2003/3/19
[Paper #]SST2002-167
Comparison of Performance on Subset-Cover Revocation Schemes

Seiji OKUAKI,  Santoso BAGUS,  Kazuo OHTA,  

[Date]2003/3/19
[Paper #]SST2002-168
Notes on Dynamic Information Management for Authenticated Key Exchange

Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2003/3/19
[Paper #]SST2002-169
Micropayment Scheme using Hash Chain Collision

Satoshi AOKI,  Yuichi KOMANO,  Nozomi MIYANAGA,  Yusuke HOMMA,  Hikaru MORITA,  Kazuo OHTA,  

[Date]2003/3/19
[Paper #]SST2002-170
12>> 1-20hit(35hit)