TOP Page >  Search Result  >  Profile > Display All

Published Papers
Results per page:
Chronological sort:

 

 

Atsuko Miyaji Professor
School of Information Science、Security and Networks Area

Results 1-20 of about 204

  • 1. Privacy-preserving integration of medical data,Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida,Journal of medical systems, Springer US,41,3,37,2017/3/1
  • 2. Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2,Hiroshi Nomaguchi, Atsuko Miyaji and Chunhua Su,The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17),To appear,To appear,To appear
  • 3. (p, N)-identifiability: Anonymity Under Practical Adversaries,Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka and Atsuko Miyaji,The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17),To appear,To appear,To appear
  • 4. Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection,Atsuko Miyaji, Kazuhisa Nakasho and Shohei Nishida,Journal of Medical Systems, Plenum Press,41,3,1-10,2017/01/16
  • 5. Recursive Matrix Oblivious RAM: An ORAM construction for constrained storage devices,Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, and Komwut Wipusitwarakun,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,to apper,to apper,1-15
  • 6. A Simple Authentication Encryption Scheme,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,Proceedings: Concurrency and Computation: Practice and Experience, IEEE TrustCom'16,2016/XX/XX
  • 7. Variable message encryption through blockcipher compression function,Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su,Concurrency and Computation: Practice and Experience, Wiley Publishers,to apper,to apper,to apper
  • 8. (invited paper)Flexible and scalable implementation of elliptic-curve cryptography on FPGA,Bo-Yuan Peng, Bo-Yin Yang, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, and Atsuko Miyaji,the 13th International SoC Design Conference (ISOCC 2016),to apper,to apper,to apper,to apper
  • 9. Improved Differential Characteristic Searching Methods,Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh,The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), IEEE,500-508,2015/11/03
  • 10. A New Scheme of Blockcipher Hash,Rashed Mazumder and Atsuko Miyjaji,IEICE Trans., Information and Systems.,Vol. E99-D,No.4,796-804,2016/4/1
  • 11. Refined Construction of RC4 Key Setting in WPA,Ryoma Ito and Atsuko Miyaji,IEICE Trans., Fundamentals.,Vol. E100-A,No.1,XX-XX,2017/XX/XX
  • 12. Security and Experimental Performance Analysis of a Matrix ORAM,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkaoythin,IEEE International Conference on Communications. (IEEE ICC'2016)
  • 13. Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space,Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, and Komwut Wipusitwarakun,International Conference on Applications and Techniques in Information Security (ATIS 2016),CCIS, 651,130-141,2016/9/27
  • 14. A Matrix based ORAM: Design, Implementation and ExperimentalAnalysis,Steven GORDON, Atsuko MIYAJI, Chunhua SU, and Karin SUMONGKAYOTHIN,IEICE TRANSACTIONS on Information and Systems,Vol.E99-D,No.8,2044-2055,2016/08/01
  • 15. Secure and Traceable Framework for Data Circulation,Kaitai Liang, Atsuko Miyaji and Chunhua Su,The 21st Australasian Conference on Information Security and Privacy (ACISP),Vol.9722(2016),Springer-Verlag,376-388,2016/6/30
  • 16. Refined RC4 key correlations of internal states in WPA,Ryoma Ito, Atsuko Miyaji,IEICE TRANS. FUNDAMENTALS.,VOL.E99-A,No.6,1132-1144,2016/6/1
  • 17. A Blockcipher based Authentication Encryption,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,International Cross Domain Conference and Workshop (CD-ARES'16),Springer, LNCS,9817,106-123,2016/08/23
  • 18. An Efficient Construction of a Compression Functionfor Cryptographic Hash,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,International Cross Domain Conference and Workshop (CD-ARES'16),LNCS,9817,124-140,2016/08/23
  • 19. Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags,Jiageng Chen, Atsuko Miyajiy, Hiroyuki Satoz and Chunhua Su,The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Lecture Notes in Computer Science (IEEE TrustCom 2015),1,17-24,2015
  • 20. A New Statistical Approach for Integral Attack,Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao,The 9th International Conference on Network and System Security, NSS2015, Lecture Notes in Computer Science, Springer-Verlag,9408,345-356,2015/11

 1  2  3  4  5  6  7  8  9  10 Next ≫ ]