情報セキュリティ学術研究マップ<ISAM>(α版)

Kyushu University所属の方の論文一覧

論文が46件見つかりました.

  1. An Authentication Protocol with Anonymity against Service Providers and the Central Manager, プライバシー保護, CSS 2010.
    ToruNakamuraKyushu University), ShunsukeInenagaKyushu University), KensukeBabaKyushu University), DaisukeIkedaKyushu University), HirotoYasuuraKyushu University
  2. Report on the First ACM Summer School on Information Security and Protection, 教育・法律, CSS 2010.
    JingyuHuaKyushu University), KouichiSakuraiKyushu University
  3. Evaluating SMS as a Medium for Botnet Command and Control, コンピュータウィルス, CSS 2010.
    JingyuHuaKyushu University), KouichiSakuraiKyushu University
  4. Report on the 7th Conference on Detection of Intrusions and Malware & Vulnerabilities Assessment (DIMVA 2010), コンピュータウィルス, CSS 2010.
    JingyuHuaKyushu University), KouichiSakuraiKyushu University
  5. Distributed Key Generation for Paillier Cryptosystem, 暗号プロトコル, SCIS 2010.
    TakashiNishideKyushu University), KouichiSakuraiKyushu University
  6. Efficient Adaptively Secure Oblivious Polynomial Evaluation with Universal Composability: If Homomorphic and Non-committing Encryption Exists, 暗号プロトコル, SCIS 2010.
    ChunhuaSuKyushu University), TadashiAraragiNTT Communication Science Laboratories), TakashiNishideKyushu University), KouichiSakuraiKyushu University
  7. A Theoretical Framework for Program-semantics-based Intrusion Detection by Abstract Interpretation, マルウェア対策, SCIS 2010.
    JingyuHuaKyushu University), TakashiNishideKyushu University), BimalRoyIndian Statistical Institute), MingchuLiDalian University of Technology), KouichiSakuraiKyushu University
  8. An Augmented Accountable Computing Framework for Transactional Databases, プライバシー保護, SCIS 2010.
    ChunhuaSuKyushu University), GuilingWangbirmingham university, UK), KouichiSakuraiKyushu University
  9. Image Encryption Design Based on Multi-dimensional Matrix Map and bS-D-wS Structure, コンテンツ保護, SCIS 2010.
    LiangZhaoKyushu University, Chongqing University), DiXiaoChongqing University), KouichiSakuraiKyushu University
  10. Effective Digital Image Scrambling Evaluation Based on Bit-plane Selection, コンテンツ保護, SCIS 2010.
    LiangZhaoKyushu University, Chongqing University), KouichiSakuraiKyushu University
  11. On the Use of SVG and Associated Web Technologies for Network Data Visualization, ネットワーク攻撃検知・対策, SCIS 2009.
    ErwanLeMalecotKyushu University
  12. Authorization Decision with Treatment of Policy Inconsistency based on First-Order Logic Approach, アクセス制御, CSS 2008.
    HongyanYaoDalian University of Technology), MingchuLiDalian University of Technology), YizhiRenDalian University of Technology), KouichiSakuraiKyushu University
  13. A Fine-grained Trust Model for P2P Networks, コンテンツ保護, CSS 2008.
    YizhiRenDalian University of Technology、 Kyushu University), MingchuLiDalian Universityof Technology), ChengGuoDalian Universityof Technology), YongruiCuiDalian Universityof Technology), KouichiSakuraiKyushu University
  14. Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide, セキュリティマネジメント, CSS 2008.
    AmrilSyalimKyushu University), YoshiakiHoriKyushu University), KouichiSakuraiKyushu University
  15. A Trust Data Storage Management System based on Verifiable Secret Sharing in P2P Networks, 秘密分散, CSS 2008.
    ChengGuoDalian University of Technology), MingchuLiDalian University of Technology), KouichiSakuraiKyushu University), YizhiRenDalian University of Technology、Kyushu University), YongruiCuiDalian University of Technology
  16. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems, セキュリティ全般, SCIS 2007.
    HyungChanKimGwangju Institute of Science and Technology), WookShinUniversity of Illinois at Urbana-Champaign), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  17. Privacy-preserving Text Mining in Distributed Environment, プライバシ保護, SCIS 2006.
    ChunhuaSuDepartment of Kyushu Univeristy), KouichiSakuraiKyushu University
  18. Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties, アクセス制御, SCIS 2006.
    AmrilSyalimKyushu University), ToshihiroTabataOkayama University), KouichiSakuraiKyushu University
  19. Trusted Database Interoperation Based on Collaborative Role-Based Access Control, アクセス制御, SCIS 2006.
    HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University), WookShinUniversity of Illinois at Urbana-Champaign
  20. A New Security Protocol Based on Elliptic Curve Cryptosystems for Wireless Sensor Networks, 無線ネットワークセキュリティ, SCIS 2006.
    SeogChungSeoGwangju Institute of Science and Technology), HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  21. A Level-based Hop-by-hop Authentication Framework for In-network Processing in Wireless Sensor Networks, 無線ネットワークセキュリティ, SCIS 2006.
    KyeongTaeKimGwangju Institute of Science and Technology), HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  22. Ciphertext-Auditable Public Key Encryption, 暗号理論, SCIS 2006.
    SatoshiHadaTokyo Research Laboratory, IBM Research), KouichiSakuraiKyushu University
  23. A Proactive Secret Sharing Scheme with User Controllability, 秘密分散, SCIS 2006.
    Jong-PhilYangKyushu University), KouichiSakuraiKyushu University), KyungHyuneRheePukyong National University
  24. 3-dimensional i.i.d. Binary Random Vectors Generated by Jacobian Elliptic Rational Map , 数論応用, SCIS 2006.
    AsukaOnoKyushu University ), TohruKohdaKyushu University
  25. Design and Implementation of a Live-CA CD/DVD on an Open Source Environment, 暗号モジュール, SCIS 2006.
    PeiChiChengKaoshiung County Chu Woei Elementary School, Taiwan), ChungHuangYangNational Kaoshiung Normal University, Taiwan), KouichiSakuraiKyushu University
  26. Verifier-based password-authenticated key exchange in the three-party setting, 個人識別・認証, CSS 2005.
    JeongOkKwonCenter for Information Security Technologies), KouichiSakuraiKyushu University), DongHoonLeeCIST
  27. SeeCure: An Implmentation of Trusted Operating System on Linux Kernel, アクセス制御・セキュアOS, CSS 2005.
    HyungChanKimGwangju Institute of Science and Technology), WookShinUniversity of Illinois at Urbana-Champaign), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  28. Security protocols based on Elliptic Curve Cryptographic pairwise key set up for wireless sensor networks, 暗号理論, CSS 2005.
    SeogChungSeoGwangju Institute of Science and Technology), HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  29. Lightweight key management in wireless sensor network: An implementation of key established protocol, 暗号理論, CSS 2005.
    KyeongTaeKimGwangju Institute of Science and Technology), HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  30. Construction of RBAC-Enforceable Security Automata, セキュアOS, SCIS 2005.
    HyunChanKimGwangju Institute of Science and Technology), WookShinGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  31. DPA on Hybrid XTR Single Exponentiation, サイドチャネル攻撃, SCIS 2005.
    Dong-GukHanCenter for Information Security Technologies), DongjinYangCenter for Information Security Technologies), JonginLimCenter for Information Security Technologies), KouichiSakuraiKyushu University
  32. Proposal of Secure Routing Protocol for Distributed Sensor Networks, ネットワークセキュリティ, SCIS 2005.
    SoYoungParkGwangju Institute of Science and Technology), HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  33. Usage Control Model for Data Confidentiality Problem in Database Service Provider, データ保護 , SCIS 2005.
    AmrilSyalimKyushu University), ToshihiroTabataKyushu University), KouichiSakuraiKyushu University
  34. Real-Time Intrusion Detection Mechanism based on Anomaly Behavior Segments, エンドポイントセキュリティ, SCIS 2005.
    KiWoongKoSK Teletech), KyeongTaeKimGwangju Institute of Science and Technology), HyungChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  35. Receipt-free Sealed-bid Auction Based on Mix-net and Pseudo ID, 電子商取引, CSS 2004.
    Yong-SorkHerKyushu University), KenjiImamotoKyushu University), KouichiSakuraiKyushu University
  36. A Note on the Impossibility of Highly Efficient Blockcipher-Based Hash Functions, 暗号理論, CSS 2004.
    WonilLEEKyushu University), MridulNANDIIndian Statistical Institute), KouichiSakuraiKyushu University), SangjinLEECIST, Korea University
  37. The Design of Convenient File Protection based on EXT3 File System, セキュアOS, CSS 2004.
    Ji-HoChoGwangju Institute of Science and Technology), Dong-HoonYooGwangju Institute of Science and Technology), Hyung-ChanKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  38. Access Control Model for a Secure Enhanced Database Management System, アクセス制御, CSS 2004.
    AmrilSyalimKyushu University), ToshihiroTabataKyushu University), KouichiSakuraiKyushu University
  39. An Implementation of Extended-Role Based Access Control on an Embedded system, アクセス制御, CSS 2004.
    ShinWookGwangju Institute of Science and Techonology ), KimHongKookGwangju Institute of Science and Techonology ), SakuraiKouichiKyushu University
  40. Privacy Preserving Clustering using Joint Probability Density Functions, プライバシー保護, CSS 2004.
    HyunjinYooGwangju Institute of Science and Technology), MinhoKimGwangju Institute of Science and Technology), R.S.RamakrishnaGwangju Institute of Science and Technology), KouichiSakuraiKyushu University
  41. On Partial Analysis for Secure Cryptographic Protocols, 暗号プロトコル解析/鍵共有, SCIS 2004.
    MasaoMoriKyushu University
  42. Conflicts of Role Based Access Control in Multi-domain Security, プライバシー保護/認証システム, SCIS 2004.
    HyungChanKimK-JIST), WookShinK-JIST), R.S.RamakrishnaK-JIST), KouichiSakuraiKyushu University
  43. On insecurity of the side channel attack on XTR, サイドチャネル攻撃, SCIS 2004.
    DongGukHanKorea University), JonginLimKorea University), KouichiSakuraiKyushu University
  44. PGV Style Block-Cipher-Based UOWHF and Black-Box Analysis, ハッシュ関数/秘密鍵暗号, SCIS 2004.
    WonilLeeKorea University), MridulNandiISI), PalashSarkarISI), DonghoonChangKorea University), SangjinLeeKorea University), KouichiSakuraiKyushu University
  45. On the Evaluation of Performance of Digital Watermarking in the Frequency Domain, 電子透かし, SCIS 2001.
    MasatakaEjimaKyushu University), AkioMiyazakiKyushu University
  46. Analysis of Watermarking Systems in the Frequency Domain and its Application to Design of Robust Watermarking Systems, 電子透かし, SCIS 2001.
    AkioMiyazakiKyushu University), AkihiroOKAMOTOKyushu University