北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

220件中21-40件目

  • 21. Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags,Jiageng Chen, Atsuko Miyajiy, Hiroyuki Satoz and Chunhua Su,The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Lecture Notes in Computer Science (IEEE TrustCom 2015),1,17-24,2015
  • 22. A New Statistical Approach for Integral Attack,Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao,The 9th International Conference on Network and System Security, NSS2015, Lecture Notes in Computer Science, Springer-Verlag,9408,345-356,2015/11
  • 23. A Scalable and Efficient Multiparty Private Set Intersection,Atsuko Miyaji and Syouhei Nishida,The 9th International Conference on Network and System Security, NSS2015, Lecture Notes in Computer Science, Springer-Verlag,9408,376-385,2015/11
  • 24. Accurate Estimation of the Full Differential Distribution for General Feistel Structures,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 25. M-ORAM: A Matrix ORAM with logN bandwidth cost,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin,The 16th International Workshop on Information Security Applications, WISA 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 26. A New Scheme of $(n,n)$ Blockcipher based Cryptographic Hash: Single Key Scheduling,Jiageng Chen, Rashed Mazumder, and Atsuko Miyaji,10th International Conference on Risks and Security of Internet and Systems, CRiSIS 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 27. Analysis of Path ORAM toward Practical Utilization,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin,18th International Conference on Network-Based Information Systems, NBiS, IEEE
  • 28. Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree,Atsuko Miyaji, Xiaonan Shi and Satoru Tanaka,6th International Conference on Algebraic Informatics, CAI2015, Lecture Notes in Computer Science, Springer-Verlag,9270,165-175,2015/09
  • 29. Improved Differential Characteristic SearchingMethods,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 30. New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA,Ryoma Ito and Atsuko Miyaji,The 22nd International Workshop on Fast Software Encryption, FSE2015, Lecture Notes in Computer Science, Springer-Verlag,9054,557-578
  • 31. How TKIP induces biases of internal states of generic RC4,Ryoma Ito and Atsuko Miyaji,20th Australasian Conference on Information Security and Privacy, ACISP2015, Lecture Notes in Computer Science, Springer-Verlag,9144,329-342
  • 32. Self-healing wireless sensor networks,Atsuko Miyaji and Kazumasa Omote,Concurrency and Computation: Practice and Experience,1-22,2015/04
  • 33. Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security,Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote,Security and Communication Networks,8,8,1547-1560,2015/05
  • 34. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users,Keita Emura, Atsuko Miyaji and Kazumasa Omote,International Journal of Distributed Sensor Networks (IJDSN),2014,article ID: 586720,1-15,2014/06
  • 35. ``A Scalable and Secure RFID Ownership Transfer Protocol",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE,343-350
  • 36. ``A new (n,n) Blockcipher based Hash Function for Short Messages",Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada,9th Asia Joint Conference on Information Security (AsiaJCIS 2014), IEEE,to appear
  • 37. ``New Integrated Long-Term Glimpse of RC4",Ryoma Ito and Atsuko Miyaji,The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Springer-Verlag,to appear
  • 38. ``An Efficient Batch Verification System and Its Effect in a Real Time VANET Environment",Jiageng Chen, Mohammad S. I. Mamun, and Atsuko Miyaji,International Journal of Security and Communication Networks(SCN), Wiley Publication,online,March 2014,DOI: 10.1002/sec.980,2014
  • 39. ``RFID Path Authentication, Revisited",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), IEEE,245-252
  • 40. ``Distributed Pseudo-Random Number Generation and its application to Cloud Database",Jiageng Chen, Atsuko Miyaji, and Chunhua Su,10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Computer Science, Springer-Verlag,8434,373-387

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]