北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

220件中81-100件目

  • 81. Towards Restricting Plaintext Space in Public Key Encryption,Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote,IWSEC 2011, Springer-Verlag,193-209
  • 82. POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks,Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote,SSS 2011, Springer-Verlag
  • 83. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption,Keita Emura, Atsuko Miyaji, and Kazumasa Omote,ISC 2011, Springer-Verlag,Vol. 7001 of LNCS
  • 84. ``How to Find Short RC4 Colliding Key Pairs",Jiageng Chen and Atsuko Miyaji,The 14th Information Security Conference (ISC 2011),Lecture Notes in Computer Science, Springer-Verlag,7001,32-46,2011
  • 85. ``POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks",Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote,The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Lecture Notes in Computer Science, Springer-Verlag,6976,253-267,2011
  • 86. ``Non-interactive Opening for Ciphertexts Encrypted by Shared Keys",Jiageng Chen, Keita Emura, and Atsuko Miyaji,The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science, Springer-Verlag,7043,57-68,2011
  • 87. ``Unconditionally Secure Oblivious Transfer Based on Channel Delays",Kai-Yuen Cheong and Atsuko Miyaji,The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science, Springer-Verlag,7043,112-120,2011
  • 88. KIMAP: Key-InsulatedMutual Authentication Protocol for RFID,Atsuko Miyaji and Mohammad Shahriar Rahman,International Journal ofAutomated Identification Technology (IJAIT),3,2,61-74,2011/12
  • 89. ``Ideal Secret Sharing Schemes with Share Selectability",Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi,The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science, Springer-Verlag,7043,143-157,2011
  • 90. ``Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th Information Security Conference (ISC 2011),Lecture Notes in Computer Science,Springer-Verlag,7001,102-118,2011
  • 91. Unconditionally Secure Oblivious Transfer Based on Channel Delays,Kai-Yuen Cheong, Atsuko Miyaji,13th International Conference on Information and Communication Security,LNCS 7043,112-120
  • 92. ``New Concrete Relation between Trace, Definition Field, and Embedding Degree",Shoujirou Hirasawa and Atsuko Miyaji,IEICE Trans., Fundamentals.,E94-A,6,1368-1374,2011
  • 93. Scalar multiplication on Weierstrass elliptic curves from Co-Z arithmetic,Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli,Journal of Cryptographic Engineering,springer,1,2,161-176,2011/08
  • 94. ``A Timed-Release Proxy Re-Encryption Scheme",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,IEICE Trans., Fundamentals.,E94-A,8,1682-1695,2011/08
  • 95. ``A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model",Jiageng Chen and Atsuko Miyaji,The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, Springer-Verlag,6584,62-76,2011
  • 96. A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ICISC 2011, Springer-Verlag,Vol. 7259 of LNCS,186-203
  • 97. Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes,Atsuko Miyaji, Kazumasa Omote,IEICE Transactions on Information and Systems,94-D,10,1955-1965,2011/10/01
  • 98. ``An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation",Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag,6402,184-198,2010
  • 99. Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks,Atsuko Miyaji, Kazumasa Omote,The 11th International Workshop on Information SecurityApplications (WISA 2010), Lecture Notes in Computer Science, 6513 , Springer-Verlag,6513,135-149,2010
  • 100. ``Generalized RC4 Key Collisions and Hash Collisions",Jiageng Chen and Atsuko Miyaji,The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, Springer-Verlag,6280,73-87,2010

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]