北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中161-180件目

  • 161. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",H. Mamiya, and A. Miyaji,ACNS 2005
  • 162. ``Efficient Group Signature Scheme based on Modified Nyberg-Rueppel Signature",A. Miyaji, and K. Umeda,IPSJ Trans.,vol. 46,No.8(2005),1889-1902
  • 163. ``Quantum coin flipping protocol using n-dimensional quantum states",A. Waseda, M. Soshi, and A. Miyaji,,IPSJ Trans.,vol. 46,No.8,1903-1911,2005
  • 164. ``Java Obfuscation -- Approaches to Construct Tamper-Resistant Object-Oriented Programs",Y. Sakabe, M. Soshi, and A. Miyaji,IPSJ Trans,vol. 46,No.8,2107-2119,2005
  • 165. A Generic Construction of Intrusion-Resilient Public-Key Encryption,Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung,Topics in Cryptology - CT-RSA 2004, Lecture Notes in Computer Science, Springer-Verlag, .,2964,81-98,2004
  • 166. ``Efficient proxy-bidding system",A. Miyaji, T. Shiotsuki and Y. Tamura,IEICE Trans.,Fundamentals. No.6,vol. J87-A,835-842,2004
  • 167. ``On anonymity metrics for practical anonymous communication protocols",S. Kitazawa, M. Soshi, and A. Miyaji,,IPSJ Trans.,vol. 45,No.82004,1887-1897,2004
  • 168. ``Efficient Countermeasures against RPA, DPA, and SPA",H. Mamiya, A. Miyaji and H. Hiroaki,CHES 2004, Lecture Notes in Computer Science,3156,Springer-Verlag,343-356,2004
  • 169. 双線型写像の公開鍵暗号への応用に関して,宮地充子,符号と暗号の代数的数理,京都大学数理解析研講究録,1420,117-127
  • 170. A New Pushback Mechanism Resistant to DDoS Attacks,T.Terada, M.Soshi and A.Miyaji,2004International Symposium on Information Theory and its Applications-Proceedings of ISITA2004,wed1-6-4
  • 171. Pushback機構の一提案とそのモデル化に向けて,T.Terada, M.Soshi and A.Miyaji,,IPSJ Trans,,Vol.45,No.8,1948-1953,2004
  • 172. A Fully-Functional group signature scheme over only known-order group,Atsuko Miyaji and Kozue Umeda,Applied Cryptography and Network Security-ACNS2004,Lecture Notes in Computer Science, Spring-Verlag,3089,164-179,2004
  • 173. Success probability in X2-attacks,Takashi Matsunaka, Atsuko Miyaji, and Yuuki Takano,Applied Cryptography and Network Security - ACNS 2004,Lecture Notes in Computer Science,Springer-Verlag,3089,310-325,2004
  • 174. Optimized X2-Attack against RC6,Norihisa Isogai, Takashi Matsunaka, and Atsuko Miyaji,Applied Cryptography and Network Security - ACNS 2003, Lecture Notes in Computer Science, Springer-Verlag,2846,16-32,2003
  • 175. Evaluation of anonymity of practical anonymous communication networks,Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji,The Eighth Australasian Conference on Information Security and Privacy - ACISP 2003, Lecture Notes in Computer Science,,2727,13-26,2003
  • 176. ``Cryptanalysis of the reduced-round RC6 without whitening",A. Miyaji and M. Nonaka,IEICE Trans., Fundamentals.,vol.E86-A,No.1,19-30,2003
  • 177. 解説:楕円曲線暗号の原理と国際規格について,宮地 充子,情報処理学会/情報規格調査会,情報技術標準-Newsletter-,61,16-17,2004
  • 178. Intrusion-Resilient Public-Key Encryption,Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung,RSA Conference 2003, Lecture Notes in Computer Science,2612(2003),Springer-Verlag,19-32,2003
  • 179. Java obfuscation with a theoretical basis for building secure mobile agents,Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji,Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS'03), LNCS, Springer-Verlag,2828,89-103,2003
  • 180. Statistical Analysis of chi^2-Attacks,N. Isogai, A. Miyaji, and M. Nonaka,IEICE Trans.,,E86-A,5,1190-1197,2003/5

≪ 前へ ]  5  6  7  8  9  10  11  12 次へ ≫ ]