北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学研究科(情報科学専攻・理論情報科学領域)

219件中41-60件目

  • 41. ``A Provable Secure Batch Authentication Schemefor EPCGen2 Tags",Jiageng Chen, Atsuko Miyaji, and Chunhua Su,The 8th International Conference on Provable Security (ProvSec 2014), Lecture Notes in Computer Science, Springer-Verlag,103-116
  • 42. ``ユビキタスネットワークにおけるセキュリティ技術−積極的利用を促すセキュリティ技術−",宮地 充子,「電気評論」夏季増刊号特集
  • 43. ``A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security",Atsuko Miyaji, Mazumder Rashed,International Conference on Computational Intelligence in Data Mining, ICCIDM-2014, Smart Innovation, Systems and Technologies, Springer-Verlag,33,519-528,2014/12
  • 44. ``Secure VANET Applications with a refined Group Signature",Mohammad S. I. Mamun and Atsuko Miyaji,The 12th Annual International Conference on Privacy, Security and Trust(PST 2014), IEEE,to appear
  • 45. ``A multi-purpose Group Signature for Vehicular Network Security",Mohammad Saiful Islam Mamun and Atsuko Miyaji,17th International Conference on Network-Based Information Systems, NBiS 2013, IEEE,to appear
  • 46. ``POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme",Cheng-Qiang Huangy, Atsuko Miyajiy, Long-Hai Li, and Shang-Mei Xu,The 14th IEEE International Conference on Computer and Information Technology, IEEE CIT 2014,to appear
  • 47. ``情報セキュリティの標準化動向について −ISO/IECJTC1/SC27/WG2 2014年4月香港会議報告−",宮地 充子,近澤 武,竜田 敏男,大熊 建司,渡辺 創,松尾 真一郎,IEICE Japan Tech. Rep.,ISEC2014-27,171-179,2014/7
  • 48. ``Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security",Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote,Security and Communication Networks,online:DOI: 10.1002/sec
  • 49. ``A privacy-preserving efficient RFID authentication protocol from SLPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications, Inderscience Publishers
  • 50. ``A fully-secure RFID authentication protocol from exact LPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE,to appear,to appear,1-8
  • 51. Self-healing Schemes Suitable for Various WSNs,Atsuko Miyaji and Kazumasa Omote,IDCS 2013, Springer-Verlag,92-105,2013/10
  • 52. ``Private Multi-Party Set Intersection Protocol in Rational Model",Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), IEEE,to appear,to appear,1-8
  • 53. ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock",Jiageng Chen and Atsuko Miyaji,Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, Springer-Verlag,8128,1-15
  • 54. ``How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs",Atsuko Miyaji, Kazumasa Omote,The 27th International Conference on Advanced Information Networking and Applications (AINA 2013), IEEE,205-212,2013/03
  • 55. ``Novel Strategies for Searching RC4 Key Collisions",Atsuko Miyaji and Jiageng Chen,Computers & Mathematics with Applications, Elsevier,66,1,81-90,2013
  • 56. ``Self-healing Schemes Suitable for Various WSNs",Atsuko Miyaji and Kazumasa Omote,The 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag,8223,92-105
  • 57. ``Dynamic Attribute-based Signcryption without Random Oracles",Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,International Journal of Applied Cryptography (IJACT),2,3,199-211,2012
  • 58. ``An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs",Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE,552-557
  • 59. ``Privacy-preserving Set Operations in the Presence of Rational Parties",Atsuko Miyaji and Mohammad Shahriar Rahman,The 5th International Symposium on Mining and Web (AINA 2012 Workshops), MAW 2012, IEEE,869-874
  • 60. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th International Conference on Information Security and Cryptology (ICISC 2011), Lecture Notes in Computer Science, Springer-Verlag,7259,186-203

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]