北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中61-80件目

  • 61. ``情報セキュリティの標準化動向について −ISO/IECJTC1/SC27/WG2 2014年4月香港会議報告−",宮地 充子,近澤 武,竜田 敏男,大熊 建司,渡辺 創,松尾 真一郎,IEICE Japan Tech. Rep.,ISEC2014-27,171-179,2014/7
  • 62. ``Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security",Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote,Security and Communication Networks,online:DOI: 10.1002/sec
  • 63. ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock",Jiageng Chen and Atsuko Miyaji,Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, Springer-Verlag,8128,1-15
  • 64. ``How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs",Atsuko Miyaji, Kazumasa Omote,The 27th International Conference on Advanced Information Networking and Applications (AINA 2013), IEEE,205-212,2013/03
  • 65. ``Novel Strategies for Searching RC4 Key Collisions",Atsuko Miyaji and Jiageng Chen,Computers & Mathematics with Applications, Elsevier,66,1,81-90,2013
  • 66. ``Self-healing Schemes Suitable for Various WSNs",Atsuko Miyaji and Kazumasa Omote,The 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag,8223,92-105
  • 67. ``A privacy-preserving efficient RFID authentication protocol from SLPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications, Inderscience Publishers
  • 68. ``A fully-secure RFID authentication protocol from exact LPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE,to appear,to appear,1-8
  • 69. Self-healing Schemes Suitable for Various WSNs,Atsuko Miyaji and Kazumasa Omote,IDCS 2013, Springer-Verlag,92-105,2013/10
  • 70. ``Private Multi-Party Set Intersection Protocol in Rational Model",Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), IEEE,to appear,to appear,1-8
  • 71. ``Secure and private RFID authentication protocol under SLPN problem",Mohammad S. I. Mamun, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 6th International Conference on Network and System Security (NSS 2012), Lecture Notes in Computer Science, Springer-Verlag,7645,476-489
  • 72. ``Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack",Jiageng Chen and Atsuko Miyaji,IEICE Trans., Fundamentals,E95-A,12,2148-2159,2012/12/01
  • 73. An Optimized Signature Verification System for Vehicle Ad hoc NETwork,Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2012),1-8
  • 74. Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks,Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote,ISPEC 2012, Springer-Verlag,Vol. 7232 of LNCS
  • 75. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs,Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote,AINA Workshops 2012, IEEE
  • 76. How to Enhance the Security on the Least Significant Bit,Atsuko Miyaji and Yiren Mo,The 11th International Conference on Cryptology and Network Security(CANS 2012),7712,263-279,2012
  • 77. Constant-Ciphertext-Size Dual Policy Attribute Based Encryption,Atsuko Miyaji and Phuong V.X. TRAN,The 4th International Symposium on Cyberspace Safety and Security(CSS 2012),7672,400-413,2012
  • 78. A Novel Hybrid IP Traceback Scheme with Packet Counters,Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji,The 5th International Conference on Internet and Dsitributed Computing Systems (IDCS 2012), Lecture Notes in Computer Science, 7646, Springer-Verlag,7646,71-84,2012
  • 79. ``Dynamic Attribute-based Signcryption without Random Oracles",Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,International Journal of Applied Cryptography (IJACT),2,3,199-211,2012
  • 80. ``An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs",Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE,552-557

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]