北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中1-20件目

  • 1. Privacy-preserving integration of medical data,Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida,Journal of medical systems, Springer US,41,3,37,2017/3/1
  • 2. New Iterated RC4 Key Correlations,Ryoma Ito and Atsuko Miyaji,The 23rd Australasian Conference on Information Security and Privacy(ACISP 2018), Lecture Notes in Computer Science,10946(2018),154-171,2018/7/11
  • 3. Efficient and Quasi-accurate Multiparty Private Set Union,Katsunari Shishido and Atsuko Miyaji,The 2nd IEEE International Workshop on Big Data and IoT Security in Smart Computing (SMARTCOMP 2018 BITS WORKSHOP),309-314
  • 4. Revisited Diffusion Analysis of Salsa and ChaCha,Yusuke Matsuoka and Atsuko Miyaji,The 15th International Symposium on Information Theory and Its Applications (ISITA 2018),XX-XX
  • 5. An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields,Shota Terada, Hideto Nakano, Shinya Okumura and Atsuko Miyaji,The 15th International Symposium on Information Theory and Its Applications (ISITA 2018),XX-XX
  • 6. SupAUTH: A new approach to supply chain authentication for the IoT,Mohammad Saiful Islam Mamun, Ali A Ghorbani, Atsuko Miyaji, and Uyen Trang Nguyen,Computational Intelligence,34,2,582-602,2018/5
  • 7. The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data,Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu and Atsuko Miyaji,The 16 Annual Conference on Privacy, Security and Trust(PST2018), IEEE,1-7,2018/8/28
  • 8. Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2,Hiroshi Nomaguchi, Atsuko Miyaji and Chunhua Su,The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17),To appear,To appear,To appear
  • 9. (p, N)-identifiability: Anonymity Under Practical Adversaries,Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka and Atsuko Miyaji,The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17),To appear,To appear,To appear
  • 10. Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection,Atsuko Miyaji, Kazuhisa Nakasho and Shohei Nishida,Journal of Medical Systems, Plenum Press,41,3,1-10,2017/01/16
  • 11. Recursive Matrix Oblivious RAM: An ORAM construction for constrained storage devices,Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, and Komwut Wipusitwarakun,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,to apper,to apper,1-15
  • 12. Robust ORAM: Enhancing Availability, Confidentiality and Integrity,Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, and Ayumu Kubota,The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC2017),30-39,2017/1/22
  • 13. A simple construction of encryption for a tiny domain message,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,The 51th Annual Conference on Information Sciences and Systems (CISS2017),1-7,2017/8/25
  • 14. On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus,Chen-Mou Cheng, Kenta Kodera, and Atsuko Miyaji,The 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), Lecture Notes in Computer Science,10779(2017),245-263,2017/11/29
  • 15. Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings,Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi,Springer,10355,2017/6/23
  • 16. A simple authentication encryption scheme,Rashed Mazumder, Atsuko Miyaji, adn Chunhua Su,Concurrency and Computation: Practice and Experience,Vol.29,16,2018/8/25
  • 17. Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data,Rashed Mazumder, Atsuko Miyaji, adn Chunhua Su,International Journal of Foundations of Computer Science,Vol.28,661,2017/9
  • 18. Cloud computing security and privacy: Standards and regulations,Yong Yu, Atsuko Miyaji, Man Ho Au, and Willy Susilo,Computer Standards & Interfaces,Vol.54,Part 1,1-2,2017/11/1
  • 19. Improved Differential Characteristic Searching Methods,Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh,The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), IEEE,500-508,2015/11/03
  • 20. A New Scheme of Blockcipher Hash,Rashed Mazumder and Atsuko Miyjaji,IEICE Trans., Information and Systems.,Vol. E99-D,No.4,796-804,2016/4/1

 1  2  3  4  5  6  7  8  9  10 次へ ≫ ]