北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

234件中41-60件目

  • 41. Improved Differential Characteristic SearchingMethods,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 42. New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA,Ryoma Ito and Atsuko Miyaji,The 22nd International Workshop on Fast Software Encryption, FSE2015, Lecture Notes in Computer Science, Springer-Verlag,9054,557-578
  • 43. How TKIP induces biases of internal states of generic RC4,Ryoma Ito and Atsuko Miyaji,20th Australasian Conference on Information Security and Privacy, ACISP2015, Lecture Notes in Computer Science, Springer-Verlag,9144,329-342
  • 44. Self-healing wireless sensor networks,Atsuko Miyaji and Kazumasa Omote,Concurrency and Computation: Practice and Experience,1-22,2015/04
  • 45. Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security,Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote,Security and Communication Networks,8,8,1547-1560,2015/05
  • 46. ``A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256",Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji,The 17th Annual International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, Springer-Verlag,8949,271-285,2015/03
  • 47. ``A new $(n, 2n)$ Double Block Length Hash Function based on Single Key Scheduling",Atsuko Miyaji and Mazumder Rashed,IEEE/The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015),564-570,2015
  • 48. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users,Keita Emura, Atsuko Miyaji and Kazumasa Omote,International Journal of Distributed Sensor Networks (IJDSN),2014,article ID: 586720,1-15,2014/06
  • 49. ``A Scalable and Secure RFID Ownership Transfer Protocol",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE,343-350
  • 50. ``A new (n,n) Blockcipher based Hash Function for Short Messages",Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada,9th Asia Joint Conference on Information Security (AsiaJCIS 2014), IEEE,to appear
  • 51. ``New Integrated Long-Term Glimpse of RC4",Ryoma Ito and Atsuko Miyaji,The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Springer-Verlag,to appear
  • 52. ``An Efficient Batch Verification System and Its Effect in a Real Time VANET Environment",Jiageng Chen, Mohammad S. I. Mamun, and Atsuko Miyaji,International Journal of Security and Communication Networks(SCN), Wiley Publication,online,March 2014,DOI: 10.1002/sec.980,2014
  • 53. ``RFID Path Authentication, Revisited",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), IEEE,245-252
  • 54. ``Distributed Pseudo-Random Number Generation and its application to Cloud Database",Jiageng Chen, Atsuko Miyaji, and Chunhua Su,10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Computer Science, Springer-Verlag,8434,373-387
  • 55. ``Improving impossible differential cryptanalysiswith concrete investigation of key schedulingalgorithm and its application to LBlock",Jiageng Chen, Yuichi Futa, Atsuko Miyaji, and Chunhua Su,The 8th International Conference on Network and System Security (NSS 2014), Lecture Notes in Computer Science, Springer-Verlag,184-197
  • 56. ``A Provable Secure Batch Authentication Schemefor EPCGen2 Tags",Jiageng Chen, Atsuko Miyaji, and Chunhua Su,The 8th International Conference on Provable Security (ProvSec 2014), Lecture Notes in Computer Science, Springer-Verlag,103-116
  • 57. ``ユビキタスネットワークにおけるセキュリティ技術−積極的利用を促すセキュリティ技術−",宮地 充子,「電気評論」夏季増刊号特集
  • 58. ``A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security",Atsuko Miyaji, Mazumder Rashed,International Conference on Computational Intelligence in Data Mining, ICCIDM-2014, Smart Innovation, Systems and Technologies, Springer-Verlag,33,519-528,2014/12
  • 59. ``Secure VANET Applications with a refined Group Signature",Mohammad S. I. Mamun and Atsuko Miyaji,The 12th Annual International Conference on Privacy, Security and Trust(PST 2014), IEEE,to appear
  • 60. ``A multi-purpose Group Signature for Vehicular Network Security",Mohammad Saiful Islam Mamun and Atsuko Miyaji,17th International Conference on Network-Based Information Systems, NBiS 2013, IEEE,to appear

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]