北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

220件中101-120件目

  • 101. ``A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance",Jiageng Chen and Atsuko Miyaji,The 6th Information Security Practice and Experience Conference(ISPEC 2010), Lecture Notes in Computer Science, Springer-Verlag,6047,30-44,2010
  • 102. ``Sequential Bitwise Sanitizable Signature Schemes",Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang,IEICE Trans., Fundamentals,E94-A,No.1,392-404,2011
  • 103. ``Efficient Privacy-Preserving Data Mining in Malicious Model",Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman,The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag,6440,429-440,2010
  • 104. ``Privacy-Preserving Data Mining in Presence of Covert Adversaries",Atsuko Miyaji and Mohammad Shahriar Rahman,The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag,6440,370-382,2010
  • 105. ``A Ciphertext-Policy Attribute-Based Encryption Scheme withConstant Ciphertext Length",Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote and Masakazu Soshi,International Journal of Applied Cryptography (IJACT), Inderscience Publishers,Vol. 2,No. 1,46-59,2010/5
  • 106. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length,Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi,IJACT,2,1,46-59,2010/01
  • 107. ``A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication",Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag,6402,200-213,2010
  • 108. ``RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks",Hisashige Ito, Atsuko Miyaji and Kazumasa Omote,The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010,1-5
  • 109. ``An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System",Keita Emura, Atsuko Miyaji and Kazumasa Omote,The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science, Springer-Verlag,To Appear,2010
  • 110. ``APRAP: Another Privacy Preserving RFID Authentication Protocol",Atsuko Miyaji and Mohammad Shahriar Rahman,The 6th workshop on Secure Network Protocols, NPSec 2010, IEEE,13-18,2010/10/05
  • 111. Hidden Credential Retrieval Without Random Oracles,Atsuko Miyaji, Mohammad Shahriar Rahman and Masakazu Soshi,The 11th International Workshop on Information SecurityApplications (WISA 2010), Lecture Notes in Computer Science, 6513, Springer-Verlag,6513,135-149,2010
  • 112. RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks,Hisashige Ito, Atsuko Miyaji, Kazumasa Omote,The 8th Grobal Communications Conference ExhibitionIndustry Forum (IEEE GLOBECOM 2010),1-5
  • 113. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ProvSec 2010, Springer-Verlag,184-198
  • 114. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ProvSec 2010, Springer-Verlag,200-213
  • 115. ``New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences",A. Miyaji and M. Sukegawa,IEICE Trans., Fundamentals,vol. E93-A,No.6,1066-1077,2010/6
  • 116. ``Co-Z Addition Formulae and Binary Ladders on Elliptic Curves",Raveen Ravinesh Goundar, Marc Joye and Atsuko Miyaji,The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, Springer-Verlag,6225,65-79,2010
  • 117. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity",K. Emura, A. Miyaji and K. Omote,The 4th International Workshop on Security(IWSEC 2009)-Short paper-,49-63
  • 118. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length",K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi,The 5th Information Security Practice and Experience Conference(ISPEC 2009), Lecture Notes in Computer Science, Springer-Verlag,5451,13-23,2009
  • 119. ``New Correlations of RC4 PRGA Using Nonzero-Bit Differences",A. Miyaji and M. Sukegawa,ACISP 2009, Lecture Notes in Computer Science, Springer-Verlag,5594,134-152,2009
  • 120. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",K. Emura, A. Miyaji, K. Omote,IPSJ,50,9,1968-1983

≪ 前へ ]  2  3  4  5  6  7  8  9  10  11 次へ ≫ ]