北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

234件中81-100件目

  • 81. ``An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs",Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE,552-557
  • 82. ``Privacy-preserving Set Operations in the Presence of Rational Parties",Atsuko Miyaji and Mohammad Shahriar Rahman,The 5th International Symposium on Mining and Web (AINA 2012 Workshops), MAW 2012, IEEE,869-874
  • 83. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th International Conference on Information Security and Cryptology (ICISC 2011), Lecture Notes in Computer Science, Springer-Verlag,7259,186-203
  • 84. ``Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks",Kazuya Izawa, Atsuko Miyaji and Kazumasa Omote,The 8th Information Security Practice and Experience Conference (ISPEC 2012), Lecture Notes in Computer Science, Springer-Verlag,7232,245-248
  • 85. A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ICISC 2011, Springer-Verlag,Vol. 7259 of LNCS,186-203
  • 86. ``Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments",Yvo Desmedt and Atsuko Miyaji,The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, Springer-Verlag,6584,236-254,2011
  • 87. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th International Conference on Information and Security Cryptology, ICISC 2011, Lecture Notes in Computer Science, Springer-Verlag,To appear
  • 88. ``An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science, Springer-Verlag,6711,77-92
  • 89. Privacy-Preserving Data Mining: A Game-theoretic Approach,Atsuko Miyaji and Mohammad Shahriar Rahman,The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag
  • 90. Toward Dynamic Attribute-Based Signcryption (Poster),Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman,The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science,Springer-Verlag
  • 91. T-Robust Group Key Exchange Protocol with O(log n) complexity,Tetsuya Hatano, Atsuko Miyaji, and Takashi Sato,The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science,Springer-Verlag
  • 92. ``Efficient and Low-Cost RFID Authentication Schemes",Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi,Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),2,3,4-25,2011
  • 93. ``Generalized Analysis on Key Collisions of Stream Cipher RC4",Jiageng Chen and Atsuko Miyaji,IEICE Trans., Fundamentals.,E94-A,11,2194-2206,2011/11
  • 94. An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System,Keita Emura, Atsuko Miyaji, and Kazumasa Omote,EuroPKI 2010, Springer-Verlag,77-92
  • 95. A Timed-Release Proxy Re-Encryption Scheme,Keita Emura, Atsuko Miyaji, and Kazumasa Omote,IEICE Transactions on Fundamentals,E94-A,8,1682-1695,2011/08/01
  • 96. Towards Restricting Plaintext Space in Public Key Encryption,Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote,IWSEC 2011, Springer-Verlag,193-209
  • 97. POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks,Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote,SSS 2011, Springer-Verlag
  • 98. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption,Keita Emura, Atsuko Miyaji, and Kazumasa Omote,ISC 2011, Springer-Verlag,Vol. 7001 of LNCS
  • 99. ``How to Find Short RC4 Colliding Key Pairs",Jiageng Chen and Atsuko Miyaji,The 14th Information Security Conference (ISC 2011),Lecture Notes in Computer Science, Springer-Verlag,7001,32-46,2011
  • 100. ``POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks",Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote,The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Lecture Notes in Computer Science, Springer-Verlag,6976,253-267,2011

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]