北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学研究科(情報科学専攻・理論情報科学領域)

219件中121-140件目

  • 121. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ARES2009,487-492
  • 122. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ARES2009,769-773
  • 123. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length,Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi,ISPEC2009,13-23
  • 124. A Selectable k-Times Relaxed Anonymous Authentication Scheme,Keita Emura, Atsuko Miyaji, Kazumasa Omote,WISA2009,281-295
  • 125. ``Elliptic curves with a pre-determined embedding degree",S. Hirasawa and A. Miyaji,The 2009 IEEE International Symposium on Information Theory (ISIT2009),2391-2395,2009
  • 126. ``Generalized Scalar Multiplication Secure against SPA, DPA, and RPA",A. Miyaji,IEICE Trans. Fundamentals.,vol. E91-A,No.10,2833-2842,2008/10
  • 127. ``情報セキュリティの標準化動向について 〜 ISO/IEC JTC1/SC27/WG2 2008年4月京都会議報告 〜",宮地充子, 近澤 武, 竜田敏男, 渡辺 創, 大熊建司,IEICE Japan Tech. Rep.,ISEC2008-20,27-36
  • 128. ``A Secure RFID Authentication Protocol with Low Communication Cost",M. S. Rahman, M. Soshi and A. Miyaji,The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009),IEEE,559-564,2009
  • 129. ``Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair",A. Miyaji, A. Waseda, T. Takagi, and M. Soshi,The 2008 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2008,2008
  • 130. ``Simple Certificateless Signature with Smart Cards",A. Miyaji, K. Omote and K. Kato,International Workshop on Security in Ubiquitous Computing Systems (SECUBIQ'08), IEEE,2008
  • 131. ``A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier",K. Emura, A. Miyaji and K. Omote,The First International Workshop on Recent Innovations and Breakthroughs in Cryptography (RIBC 2009),IEEE,769-773,2009
  • 132. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",K. Emura, A. Miyaji and K. Omote,The Forth International Conference on Availability and Security (AReS 2009),IEEE,487-492,2009
  • 133. ``Security and Access Control for Vehicular Communications",Saber Zrelli, Atsuko Miyaji, Yoichi Shinoda and Thierry Ernst,WIMOB '08, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications 2008,561-566,2008/10
  • 134. ``Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point",A. Miyaji and K. Mizosoe,IPSJ Trans.,vol. 49,No.9,2975-2988,2008/9
  • 135. ``量子複数秘密分散に関する考察"(Consideration for quantum multi-secret sharing),早稲田 篤志,双紙 正和,宮地 充子,情報処理学会論文誌,vol. 48,No.7(2007),2447-2464,2007
  • 136. ``Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption",A. Miyaji,IPSJ Trans.,vol.48,No.9,2999-3013,2007
  • 137. ``The security of RC6 against asymmetric chi-square test attack",T. Hinoue, A. Miyaji and T. Wada,IPSJ Trans.,vol.48,No.9,2966-2975,2007
  • 138. ``Consideration for quantum multi-secret sharing"(in Japanese),A. Waseda, M. Soshi and A. Miyaji,IPSJ Trans.,vol.48,No.7,2447-2464,2007
  • 139. ``Generalized MMM-algorithm Secure against SPA, DPA, and RPA",A.Miyaji,ICISC 2007, Lecture Notes in Computer Science,Springer-Verlag,4817,282-296,2007
  • 140. ``Mobile agent security with efficient oblivious transfer",W. Hasegawa, M. Soshi and A. Miyaji,In International Conference on Security and Cryptography(SECRYPT 2007),299-304,2007

≪ 前へ ]  3  4  5  6  7  8  9  10  11 次へ ≫ ]