Information and Systems-Software Science(Date:2011/07/05)

Presentation
表紙

,  

[Date]2011/7/5
[Paper #]
目次

,  

[Date]2011/7/5
[Paper #]
Carrier Screen Images Decoding with an Ordinary Digital Camera

Rui SHOGENJI,  Junji OHTSUBO,  

[Date]2011/7/5
[Paper #]ISEC2011-9,SITE2011-6,ICSS2011-14,EMM2011-8
Recovery of Tampered Pixels for Statistical Fragile Watermarking

Maki YOSHIDA,  Kazuya OHKITA,  Toru FUJIWARA,  

[Date]2011/7/5
[Paper #]ISEC2011-10,SITE2011-7,ICSS2011-15,EMM2011-9
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

Minoru KURIBAYASHI,  

[Date]2011/7/5
[Paper #]ISEC2011-11,SITE2011-8,ICSS2011-16,EMM2011-10
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses

Shunichi MIZOGUCHI,  Hiroyuki INABA,  

[Date]2011/7/5
[Paper #]ISEC2011-12,SITE2011-9,ICSS2011-17,EMM2011-11
Study on person profile about coping behavior under virus infected situation

Hiroaki KANDA,  Noriaki YOSHIKAI,  Shun-ichi KURINO,  

[Date]2011/7/5
[Paper #]ISEC2011-13,SITE2011-10,ICSS2011-18,EMM2011-12
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors : from the perspective of networking incentive of actors

Ema TANAKA,  

[Date]2011/7/5
[Paper #]ISEC2011-14,SITE2011-11,ICSS2011-19,EMM2011-13
ITリスク学とトラスト(タイトルのみ)

,  

[Date]2011/7/5
[Paper #]
Groping for "Anshin" from studies on Internet anxieties

TARO YAMAMOTO,  NAOKO CHIBA,  HIROKI UEDA,  KATSUMI TAKAHASHI,  SHINICHI HIRATA,  MORIHIRO OGASAHARA,  NAOYA SEKIYA,  ISAO NAKAMURA,  YOSHIAKI HASHIMOTO,  

[Date]2011/7/5
[Paper #]
Viewing credibility of personal verification techniques

KOICHIRO UNO,  RYUHEI MASUNO,  

[Date]2011/7/5
[Paper #]
Cyber Platform for Disaster-Tolerant Identity Authentication

YOSHIHISA NAWATA,  HITOSHI KOKUMAI,  

[Date]2011/7/5
[Paper #]
Proposal of Encryption Level Classification method based on Randomness of Communication Data

TOMOHIRO SHIGEMOTO,  TETSURO KITO,  HIROFUMI NAKAKOJI,  SATOSHI KAI,  

[Date]2011/7/5
[Paper #]
Improving Efficiency of Secure Multi-Party Computation

RYO KATO,  NAOTO KIRIBUCHI,  YUTAKA NISIWAKI,  HIROSHI YOSHIURA,  

[Date]2011/7/5
[Paper #]
Matsumoto-Imai Signature by Dual Perturbation : Two new Modifiers

Masahito GOTAISHI,  Shigeo TSUJII,  

[Date]2011/7/5
[Paper #]ISEC2011-15,SITE2011-12,ICSS2011-20,EMM2011-14
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack

Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]2011/7/5
[Paper #]ISEC2011-16,SITE2011-13,ICSS2011-21,EMM2011-15
A Low Density Multiple Choice Knapsack Cryptosystem

Akira HAYASHI,  Toshihiro KOIKE,  

[Date]2011/7/5
[Paper #]ISEC2011-17,SITE2011-14,ICSS2011-22,EMM2011-16
The proposal of the evaluation for decryption failure about GGH series

Yosuke TODO,  Masakatu MORII,  

[Date]2011/7/5
[Paper #]ISEC2011-18,SITE2011-15,ICSS2011-23,EMM2011-17
Security Evaluation of HyRAL against Saturation Cryptanalysis(II)

Naoki SHIBAYAMA,  Yasutaka IGARASHI,  Toshinobu KANEKO,  Seiichiro HANGAI,  

[Date]2011/7/5
[Paper #]ISEC2011-19,SITE2011-16,ICSS2011-24,EMM2011-18
Strongly Asymmetric Public Key Agreement Algorithms

Luigi ACCARDI,  Satoshi IRIYAMA,  Massimo REGOLI,  Masanori OHYA,  

[Date]2011/7/5
[Paper #]ISEC2011-20,SITE2011-17,ICSS2011-25,EMM2011-19
123>> 1-20hit(42hit)