北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

220件中61-80件目

  • 61. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th International Conference on Information Security and Cryptology (ICISC 2011), Lecture Notes in Computer Science, Springer-Verlag,7259,186-203
  • 62. ``Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks",Kazuya Izawa, Atsuko Miyaji and Kazumasa Omote,The 8th Information Security Practice and Experience Conference (ISPEC 2012), Lecture Notes in Computer Science, Springer-Verlag,7232,245-248
  • 63. ``Secure and private RFID authentication protocol under SLPN problem",Mohammad S. I. Mamun, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 6th International Conference on Network and System Security (NSS 2012), Lecture Notes in Computer Science, Springer-Verlag,7645,476-489
  • 64. ``Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack",Jiageng Chen and Atsuko Miyaji,IEICE Trans., Fundamentals,E95-A,12,2148-2159,2012/12/01
  • 65. An Optimized Signature Verification System for Vehicle Ad hoc NETwork,Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2012),1-8
  • 66. Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks,Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote,ISPEC 2012, Springer-Verlag,Vol. 7232 of LNCS
  • 67. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs,Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote,AINA Workshops 2012, IEEE
  • 68. How to Enhance the Security on the Least Significant Bit,Atsuko Miyaji and Yiren Mo,The 11th International Conference on Cryptology and Network Security(CANS 2012),7712,263-279,2012
  • 69. Constant-Ciphertext-Size Dual Policy Attribute Based Encryption,Atsuko Miyaji and Phuong V.X. TRAN,The 4th International Symposium on Cyberspace Safety and Security(CSS 2012),7672,400-413,2012
  • 70. A Novel Hybrid IP Traceback Scheme with Packet Counters,Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji,The 5th International Conference on Internet and Dsitributed Computing Systems (IDCS 2012), Lecture Notes in Computer Science, 7646, Springer-Verlag,7646,71-84,2012
  • 71. ``Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments",Yvo Desmedt and Atsuko Miyaji,The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, Springer-Verlag,6584,236-254,2011
  • 72. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th International Conference on Information and Security Cryptology, ICISC 2011, Lecture Notes in Computer Science, Springer-Verlag,To appear
  • 73. ``An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science, Springer-Verlag,6711,77-92
  • 74. Privacy-Preserving Data Mining: A Game-theoretic Approach,Atsuko Miyaji and Mohammad Shahriar Rahman,The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag
  • 75. Toward Dynamic Attribute-Based Signcryption (Poster),Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science,Springer-Verlag
  • 76. T-Robust Group Key Exchange Protocol with O(log n) complexity,Tetsuya Hatano, Atsuko Miyaji, and Takashi Sato,The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science,Springer-Verlag
  • 77. ``Efficient and Low-Cost RFID Authentication Schemes",Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi,Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),2,3,4-25,2011
  • 78. ``Generalized Analysis on Key Collisions of Stream Cipher RC4",Jiageng Chen and Atsuko Miyaji,IEICE Trans., Fundamentals.,E94-A,11,2194-2206,2011/11
  • 79. An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System,Keita Emura, Atsuko Miyaji, and Kazumasa Omote,EuroPKI 2010, Springer-Verlag,77-92
  • 80. A Timed-Release Proxy Re-Encryption Scheme,Keita Emura, Atsuko Miyaji, and Kazumasa Omote,IEICE Transactions on Fundamentals,E94-A,8,1682-1695,2011/08/01

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]