北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

220件中41-60件目

  • 41. ``Secure VANET Applications with a refined Group Signature",Mohammad S. I. Mamun and Atsuko Miyaji,The 12th Annual International Conference on Privacy, Security and Trust(PST 2014), IEEE,to appear
  • 42. ``A multi-purpose Group Signature for Vehicular Network Security",Mohammad Saiful Islam Mamun and Atsuko Miyaji,17th International Conference on Network-Based Information Systems, NBiS 2013, IEEE,to appear
  • 43. ``POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme",Cheng-Qiang Huangy, Atsuko Miyajiy, Long-Hai Li, and Shang-Mei Xu,The 14th IEEE International Conference on Computer and Information Technology, IEEE CIT 2014,to appear
  • 44. ``情報セキュリティの標準化動向について −ISO/IECJTC1/SC27/WG2 2014年4月香港会議報告−",宮地 充子,近澤 武,竜田 敏男,大熊 建司,渡辺 創,松尾 真一郎,IEICE Japan Tech. Rep.,ISEC2014-27,171-179,2014/7
  • 45. ``Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security",Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote,Security and Communication Networks,online:DOI: 10.1002/sec
  • 46. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users,Keita Emura, Atsuko Miyaji and Kazumasa Omote,International Journal of Distributed Sensor Networks (IJDSN),2014,article ID: 586720,1-15,2014/06
  • 47. ``A Scalable and Secure RFID Ownership Transfer Protocol",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE,343-350
  • 48. ``A new (n,n) Blockcipher based Hash Function for Short Messages",Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada,9th Asia Joint Conference on Information Security (AsiaJCIS 2014), IEEE,to appear
  • 49. ``New Integrated Long-Term Glimpse of RC4",Ryoma Ito and Atsuko Miyaji,The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Springer-Verlag,to appear
  • 50. ``Self-healing Schemes Suitable for Various WSNs",Atsuko Miyaji and Kazumasa Omote,The 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag,8223,92-105
  • 51. ``A privacy-preserving efficient RFID authentication protocol from SLPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications, Inderscience Publishers
  • 52. ``A fully-secure RFID authentication protocol from exact LPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE,to appear,to appear,1-8
  • 53. Self-healing Schemes Suitable for Various WSNs,Atsuko Miyaji and Kazumasa Omote,IDCS 2013, Springer-Verlag,92-105,2013/10
  • 54. ``Private Multi-Party Set Intersection Protocol in Rational Model",Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), IEEE,to appear,to appear,1-8
  • 55. ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock",Jiageng Chen and Atsuko Miyaji,Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, Springer-Verlag,8128,1-15
  • 56. ``How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs",Atsuko Miyaji, Kazumasa Omote,The 27th International Conference on Advanced Information Networking and Applications (AINA 2013), IEEE,205-212,2013/03
  • 57. ``Novel Strategies for Searching RC4 Key Collisions",Atsuko Miyaji and Jiageng Chen,Computers & Mathematics with Applications, Elsevier,66,1,81-90,2013
  • 58. ``Dynamic Attribute-based Signcryption without Random Oracles",Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,International Journal of Applied Cryptography (IJACT),2,3,199-211,2012
  • 59. ``An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs",Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE,552-557
  • 60. ``Privacy-preserving Set Operations in the Presence of Rational Parties",Atsuko Miyaji and Mohammad Shahriar Rahman,The 5th International Symposium on Mining and Web (AINA 2012 Workshops), MAW 2012, IEEE,869-874

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]