北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中141-160件目

  • 141. ``Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point",A. Miyaji and K. Mizosoe,IPSJ Trans.,vol. 49,No.9,2975-2988,2008/9
  • 142. ``Generalized Scalar Multiplication Secure against SPA, DPA, and RPA",A. Miyaji,IEICE Trans. Fundamentals.,vol. E91-A,No.10,2833-2842,2008/10
  • 143. ``Security and Access Control for Vehicular Communications",Saber Zrelli, Atsuko Miyaji, Yoichi Shinoda and Thierry Ernst,WIMOB '08, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications 2008,561-566,2008/10
  • 144. ``A Secure RFID Authentication Protocol with Low Communication Cost",M. S. Rahman, M. Soshi and A. Miyaji,The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009),IEEE,559-564,2009
  • 145. ``A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier",K. Emura, A. Miyaji and K. Omote,The First International Workshop on Recent Innovations and Breakthroughs in Cryptography (RIBC 2009),IEEE,769-773,2009
  • 146. ``Simple Certificateless Signature with Smart Cards",A. Miyaji, K. Omote and K. Kato,International Workshop on Security in Ubiquitous Computing Systems (SECUBIQ'08), IEEE,2008
  • 147. ``Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair",A. Miyaji, A. Waseda, T. Takagi, and M. Soshi,The 2008 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2008,2008
  • 148. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",K. Emura, A. Miyaji and K. Omote,The Forth International Conference on Availability and Security (AReS 2009),IEEE,487-492,2009
  • 149. ``Generalized MMM-algorithm Secure against SPA, DPA, and RPA",A.Miyaji,ICISC 2007, Lecture Notes in Computer Science,Springer-Verlag,4817,282-296,2007
  • 150. ``Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption",A. Miyaji,IPSJ Trans.,vol.48,No.9,2999-3013,2007
  • 151. ``The security of RC6 against asymmetric chi-square test attack",T. Hinoue, A. Miyaji and T. Wada,IPSJ Trans.,vol.48,No.9,2966-2975,2007
  • 152. ``Consideration for quantum multi-secret sharing"(in Japanese),A. Waseda, M. Soshi and A. Miyaji,IPSJ Trans.,vol.48,No.7,2447-2464,2007
  • 153. ``量子複数秘密分散に関する考察"(Consideration for quantum multi-secret sharing),早稲田 篤志,双紙 正和,宮地 充子,情報処理学会論文誌,vol. 48,No.7(2007),2447-2464,2007
  • 154. ``Mobile agent security with efficient oblivious transfer",W. Hasegawa, M. Soshi and A. Miyaji,In International Conference on Security and Cryptography(SECRYPT 2007),299-304,2007
  • 155. ``Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA",A. Miyaji, H. Mamiya and H. Morimoto,IEICE Trans., Fundamentals,vol. 89-A,No.8,2207-2215,2006
  • 156. ``An IP Traceback Scheme with Variably Probabilistic Packet Marking",T. Terada, M. Soshi, and A. Miyaji,The 2006 International Symposium on Information Theory and its Applications (ISITA 2006),2006
  • 157. Evaluation of the Security of RC6 against the x2-Attack,Atsuko Miyaji, Yuuki Takano,IEICE Transactions on Fundamentals of Electronics, Communications and Sciences,VOL.E90-A,NO.1,22-28,2007/1
  • 158. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",Hideyo Mamiya and Atuko Miyaji,IPSJ Trans.,vol. 47,No.8,2430-2439,2006
  • 159. ``On the Success Probability of $\chi^2$-attack on RC6",A. Miyaji, and Y. Takano,ACISP 2005, Lecture Notes in Computer Science,3089,Springer-Verlag,310-325,2005
  • 160. ``n-state quantum coin flipping protocol",A. Waseda, M. Soshi, and A. Miyaji,International Conference on Information Technology - ITCC2005,Vol. II,776-777,2005

≪ 前へ ]  4  5  6  7  8  9  10  11  12 次へ ≫ ]