情報セキュリティ学術研究マップ<ISAM>(α版)

the University of Tokyo所属の方の論文一覧

論文が34件見つかりました.

  1. A Strategy for Improving Bounds for Generalized Small Inverse Problems, 数論応用, SCIS 2010.
    NoboruKunihirothe University of Tokyo
  2. Fast Scalar-Point Multiplication Using Enlarged Digit Set on Integer Pairs, 楕円曲線暗号, SCIS 2009.
    VorapongSuppakitpaisarnthe University of Tokyo
  3. On Identity-based Proxy Signatures and Hierarchical Signature Aggregation, 署名, SCIS 2009.
    JacobSchuldtthe University of Tokyo
  4. Improvement of a Lattice Based Cryptosystem Using Polynomial Ring, 格子, SCIS 2009.
    TomotakaHanawaThe University of Electro-Communications), NoboruKunihirothe University of Tokyo
  5. Social Network Analysis Spam Filtering using Time Categorization, Webセキュリティ/スパムフィルタ, SCIS 2008.
    VadimJefteZendejasSamanothe University of Tokyo
  6. Broadcast Encryption Over Multiple Hierarchal Service Sets, 無線/放送型暗号, SCIS 2008.
    ElliotT.Taniguchithe University of Tokyo
  7. Directed Acyclic Graph Encryption, 暗号理論, SCIS 2006.
    NuttapongAttrapadungthe University of Tokyo), GoichiroHANAOKAAIST), HidekiImaithe University of Tokyo
  8. Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations, 暗号理論, SCIS 2006.
    HidekiImaithe University of Tokyo), AndersonNascimentoUniversity of Brasilia), KirillMorozovthe University of Tokyo
  9. An Efficient Compiler fromΣ-Protocol to 2-move Deniable Zero-Knowledge, 暗号理論, SCIS 2006.
    JunFurukawaNEC Corporation), KaoruKurosawaIbaraki University), HidekiImaithe University of Tokyo
  10. An Efficient Aggregate Shuffle Argument Scheme, 暗号理論, SCIS 2006.
    JunFurukawaNEC Corporation), HidekiImaithe University of Tokyo
  11. Parallel Key-Insulated Public Key Encryption, 公開鍵暗号, SCIS 2006.
    GoichiroHANAOKAAIST), YumikoHanaokaNTT DoCoMo, Inc.), HidekiImaithe University of Tokyo
  12. Digital Signature Scheme by Biometric Keys and Liveness Detection, バイオメトリクス, SCIS 2006.
    Hsing-HuaHuangthe University of Tokyo
  13. Information Security Incidents and Countermeasures: An Empirical Analysis Based on an Enterprise Survey in Japan, リスク管理, SCIS 2006.
    WeiLiuthe University of Tokyo), HideyukiTanakathe University of Tokyo), KantaMatsuurathe University of Tokyo
  14. University-Industry Collaboration in SCIS Compared to the IEEE Symposium on Security and Privacy, セキュリティと社会, SCIS 2006.
    KantaMatsuurathe University of Tokyo
  15. Applying FO-PKC99 and REACT to ID-Based encryption , IDベース暗号, SCIS 2006.
    TakashiKitagawaAIST), PengYangthe University of Tokyo), GoichiroHANAOKAAIST), RuiZhangthe University of Tokyo), KantaMatsuurathe University of Tokyo), HidekiImaithe University of Tokyo
  16. On the Relationship between Identity-Based Encryption and Digital Signature, IDベース暗号, SCIS 2006.
    YangCuithe University of Tokyo), GoichiroHANAOKAAIST), EiichiroFujisakiNTT Laboratories), RuiZhangthe University of Tokyo), HidekiImaiThe University of Tokyo/ RCIS, AIST
  17. Security Protocols Protection Based on Anomaly Behaviour of Selected Features, ネットワークセキュリティ, SCIS 2006.
    AbdulrahmanAlharbythe University of Tokyo), HidekiImaithe University of Tokyo
  18. A Provably Secure Refreshable Partially Anonymous Token and its Applications, プライバシ保護, SCIS 2006.
    RieShigetomithe University of Tokyo), AkiraOtsukaAIST), JunFurukawaNEC), KeithMartinRoyal Holloway, University of London), HidekiImaithe University of Tokyo
  19. Universal Designated Verifier Signature without Random Oracles, 電子署名, SCIS 2006.
    RuiZhangthe University of Tokyo), JunFurukawaNEC Corporation), HidekiImaithe University of Tokyo
  20. STEGANOGRAPHY WITH HASHING, 電子透かし, SCIS 2006.
    XiaoyiYuthe University of Tokyo), KantaMatsuurathe University of Tokyo
  21. How to Find Wang's Differential Pattern for Cryptanalysis of SHA-1?, ハッシュ関数, SCIS 2006.
    MakotoSugitaIPA), HidekiImaithe University of Tokyo
  22. Advanced Message Modification Technique of SHA-1, ハッシュ関数, SCIS 2006.
    MakotoSugitaIPA), HidekiImaithe University of Tokyo
  23. Formalization of Possible e-residue Attacks in Password-based Authentication Protocols, 安全性評価, SCIS 2006.
    AbdelilahTabetthe University of Tokyo), SEONGHANSHINthe University of Tokyo), KAZUKUNIKOBARAthe University of Tokyo), HidekiImaithe University of Tokyo
  24. Impact of security on latency in WLAN 802.11, 無線ネットワークセキュリティ, SCIS 2005.
    HananeFathiAalborg University), KAZUKUNIKOBARAthe University of Tokyo), ShyamChakrabortyHelsinki University), RamjeePrasadAalborg University), HidekiImaithe University of Tokyo
  25. Efficient RSA-based Authenticated Key Exchange with Leakage-Resilience and Perfect Forward Secrecy, 鍵共有, SCIS 2005.
    SeonhanSHINthe University of Tokyo), KAZUKUNIKOBARAthe University of Tokyo), HidekiImaithe University of Tokyo
  26. Security Protocols Attacks Detection Based on Bayesian Network, 暗号プロトコル, SCIS 2005.
    ALHARBYAbdulrahmanthe University of Tokyo), HidekiImaithe University of Tokyo
  27. Non-malleable Bit Commitment from an Erasure Channel, 暗号基礎理論, SCIS 2004.
    MisaNakanethe University of Tokyo), AndersonNascimentothe University of Tokyo), HidekiImaithe University of Tokyo
  28. Sequential Patterns Based Intrusion Detection Model, 不正検出/回避, SCIS 2004.
    ALHARBYAbdulrahmanthe University of Tokyo), HidekiImaithe University of Tokyo
  29. Differing-Inputs Software Watermarking Scheme, ソフトウェア電子透かし, SCIS 2004.
    MiraKimInformation-technology Promotion Agency), AkiraOtsukaInformation-technology Promotion Agency), HidekiImaithe University of Tokyo
  30. Valkyrie: An Anonymous Communication Infrastructure for Unstable Network, 匿名通信技術, SCIS 2004.
    ShinjiYamanakaTokyo Denki University), KazukuniKobaraTokyo Denki University), RyoichiSasakiTokyo Denki University), HidekiImaithe University of Tokyo
  31. Generic Public Key Conversions in Anonymous Communication against An Active Adversary, 匿名通信技術, SCIS 2004.
    YangCuithe University of Tokyo), ShinjiYamanakathe University of Tokyo), KAZUKUNIKOBARAthe University of Tokyo), HidekiImaithe University of Tokyo
  32. A Simplified Protocol and Its Extensions for Leakage-Resilient Authenticated Key Establishment, 暗号プロトコル解析/鍵共有, SCIS 2004.
    SeongHanShinPukyong National University), KazukuniKobaraPukyong National University), JiHwanParkPukyong National University), HidekiImaithe University of Tokyo
  33. A Simple Construction of Biometric-Based Key Generation Schemes, バイオメトリクスセキュリティ, SCIS 2004.
    MasatoAkaothe University of Tokyo), ShinjiYamanakathe University of Tokyo), GoichiroHanaokathe University of Tokyo), HidekiImaithe University of Tokyo
  34. Incorporating Digital Rights Management in Mobile Communications, モバイルセキュリティ, SCIS 2004.
    MohammadGhulamRahmanthe University of Tokyo), HidekiImaithe University of Tokyo