トップページ
|
北陸先端科学技術大学院大学
|
附属図書館
全て
教員登録文献
詳細検索
一覧
コミュニティ
& コレクション
タイトル
著者
日付
学位論文
リサーチレポート・テクニカルメモランダム
登録利用者:
登録者ページ
利用者(E-people)
ヘルプ
当システムについて
JAIST Repository
>
宮地 充子
(ミヤジ アツコ)教授
研究者総覧
発行年月日(降順)
発行年月日(昇順)
No.
書籍情報
51
A Secure and private RFID authentication protocol under SLPN problem / Mamun, Mohammad S. I., Miyaji, Atsuko, Rahman, Mohammad S., Lecture Notes in Computer Science, 7645, pp.476-489, 2012, Springer
52
Unconditionally Secure Oblivious Transfer Based on Channel Delays / Cheong, Kai-Yuen, Miyaji, Atsuko, Lecture Notes in Computer Science, 7043/2011, pp.112-120, 2011-11-01, Springer
53
Generalized Analysis on Key Collisions of Stream Cipher RC4 / Chen, Jiageng, Atsuko Miyaji, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(11), pp.2194-2206, 2011-11-01, 電子情報通信学会
54
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys / Chen, Jiageng, Emura, Keita, Miyaji, Atsuko, Lecture Notes in Computer Science, 7043/2011, pp.57-68, 2011-11-01, Springer
55
Ideal Secret Sharing Schemes with Share Selectability / Emura, Keita, Miyaji, Atsuko, Nomura, Akito, Rahman, Mohammad Shahriar, Soshi, Masakazu, Lecture Notes in Computer Science, 7043/2011, pp.143-157, 2011-11-01, Springer
56
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7001/2011, pp.102-118, 2011-10-12, Springer
57
How to Find Short RC4 Colliding Key Pairs / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 7001/2011, pp.32-46, 2011-10-12, Springer
58
POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks / Iida, Tatsuro, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 6976/2011, pp.253-267, 2011-10-08, Springer
59
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes / Miyaji, Atsuko, Omote, Kazumasa, IEICE Transactions on Information and Systems, E94-D(10), pp.1955-1965, 2011-10-01, 電子情報通信学会
60
Efficient and Low-Cost RFID Authentication Schemes / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Soshi, Masakazu, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2(3), pp.4-25, 2011-09, Innovative Information Science & Technology Research Group
61
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic / Goundar, Raveen R., Joye, Marc, Miyaji, Atsuko, Rivain, Matthieu, Venelli, Alexandre, Journal of Cryptographic Engineering, 1(2), pp.161-176, 2011-08-09, Springer
62
A Timed-Release Proxy Re-Encryption Scheme / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(8), pp.1682-1695, 2011-08-01, 電子情報通信学会
63
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 6584/2011, pp.62-76, 2011-07-19, Springer
64
Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments / Desmedt, Yvo, Miyaji, Atsuko, Lecture Notes in Computer Science, 6584/2011, pp.236-254, 2011-07-19, Springer
65
Toward Dynamic Attribute-Based Signcryption (Poster) / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6812/2011, pp.439-443, 2011-07-02, Springer
66
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity / Hatano, Tetsuya, Miyaji, Atsuko, Sato, Takashi, Lecture Notes in Computer Science, 6812/2011, pp.189-207, 2011-07-02, Springer
67
Privacy-Preserving Data Mining: A Game-theoretic Approach / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6818/2011, pp.186-200, 2011-06-29, Springer
68
New Concrete Relation between Trace, Definition Field, and Embedding Degree / Hirasawa, Shoujirou, Miyaji, Atsuko, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(6), pp.1368-1374, 2011-06-01, 電子情報通信学会
69
Sequential Bitwise Sanitizable Signature Schemes / HANAOKA, Goichiro, HIROSE, Shoichi, MIYAJI, Atsuko, MIYAZAKI, Kunihiko, SANTOSO, Bagus, YANG, Peng, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(1), pp.392-404, 2011-01-01, 電子情報通信学会
70
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 6513/2011, pp.135-149, 2011, Springer
71
Hidden Credential Retrieval Without Random Oracles / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Soshi, Masakazu, Lecture Notes in Computer Science, 6513/2011, pp.160-174, 2011, Springer
72
RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks / Ito, Hisashige, Miyaji, Atsuko , Omote, Kazumasa, The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010, pp.1-5, 2010-12, Institute of Electrical and Electronics Engineers (IEEE)
73
APRAP: Another Privacy Preserving RFID Authentication Protocol / Miyaji, Atsuko, Rahman, Mohammad Shahriar, 2010 6th IEEE Workshop on Secure Network Protocols (NPSec), pp.13-18, 2010-10-05, Institute of Electrical and Electronics Engineers (IEEE)
74
Generalized RC4 Key Collisions and Hash Collisions / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 6280/2010, pp.73-87, 2010-09, Springer
75
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Nomura, Akito, Soshi, Masakazu, International Journal of Applied Cryptography, 2(1), pp.46-59, 2010-07-02, Inderscience
76
New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences / MIYAJI, Atsuko, SUKEGAWA, Masahiro, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E93-A(6), pp.1066-1077, 2010-06-01, 電子情報通信学会
77
A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication / Emura, Keita, Miyaji, Atsuko , Omote, Kazumasa, Lecture Notes in Computer Science, 6402/2010, pp.200-213, 2010, Springer
78
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation / Emura, Keita, Miyaji, Atsuko , Omote, Kazumasa, Lecture Notes in Computer Science, 6402, pp.184-198, 2010, Springer
79
A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 6047/2010, pp.30-44, 2010, Springer
80
Privacy-Preserving Data Mining in Presence of Covert Adversaries / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6440/2010, pp.429-440, 2010, Springer
81
Efficient Privacy-Preserving Data Mining in Malicious Model / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6440/2010, pp.370-382, 2010, Springer
82
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves / Goundar, Raveen Ravinesh, Joye, Marc, Miyaji, Atsuko, Lecture Notes in Computer Science, 6225/2010, pp.65-79, 2010, Springer
83
サイドチャネル攻撃に対して安全な公開鍵暗号に関する研究 / 宮地, 充子, 科学研究費補助金研究成果報告書, pp.1-4, 2009-09-07
84
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, 情報処理学会論文誌, 50(9), pp.1968-1983, 2009-09-02, 情報処理学会
85
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, International Conference on Availability, Reliability and Security, 2009. ARES '09., pp.487-492, 2009-03, Institute of Electrical and Electronics Engineers (IEEE)
86
A Secure RFID Authentication Protocol with Low Communication Cost / Rahman, Mohammad Shahriar, Soshi, Masakazu, Miyaji, Atsuko, International Conference on Systems, 2009. CISIS '09., pp.559-564, 2009-03, Institute of Electrical and Electronics Engineers (IEEE)
87
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, International Conference on Availability, Reliability and Security, 2009. ARES '09., pp.769-773, 2009-03, Institute of Electrical and Electronics Engineers (IEEE)
88
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length / Emura, Keita, Miyaji, Atsuko, Nomura, Akito, Omote, Kazumasa, Soshi, Masakazu, Lecture Notes in Computer Science, 5451/2009, pp.13-23, 2009, Springer
89
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 5932/2009, pp.281-295, 2009, Springer
90
New Correlations of RC4 PRGA Using Nonzero-Bit Differences / Miyaji, Atsuko, Sukegawa, Masahiro, Lecture Notes in Computer Science, 5594/2009, pp.134-152, 2009, Springer
91
Elliptic curves with a pre-determined embedding degree / Hirasawa, Shoujirou, Miyaji, Atsuko, IEEE International Symposium on Information Theory, 2009. ISIT 2009., pp.2391-2395, 2009, Institute of Electrical and Electronics Engineers (IEEE)
92
Simple Certificateless Signature with Smart Cards / Omote, Kazumasa, Miyaji, Atsuko, Kato, Kazuhiko, IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008. EUC '08., pp.431-436, 2008-12, Institute of Electrical and Electronics Engineers (IEEE)
93
Generalized Scalar Multiplication Secure against SPA, DPA, and RPA / MIYAJI, Atsuko, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E91-A(10), pp.2833-2842, 2008-10-01, 電子情報通信学会
94
Security and Access Control for Vehicular Communications / Zrelli, Saber, Miyaji, Atsuko, Shinoda, Yoichi, Ernst, Thierry, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008. WIMOB '08., pp.561-566, 2008-10, Institute of Electrical and Electronics Engineers (IEEE)
95
Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point / Miyaji, Atsuko, Mizosoe, Kenji, IPSJ Journal, 49(9), pp.2975-2988, 2008-09-15, 情報処理学会
96
情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2008年4月京都会議報告 / 宮地, 充子, 近澤, 武, 竜田, 敏男, 渡辺, 創, 大熊, 建司, 情報処理学会研究報告 : コンピュータセキュリティ, 2008(71), pp.27-35, 2008-07-24, 情報処理学会
97
Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption / Miyaji, Atsuko, 情報処理学会論文誌, 48(9), pp.2999-3013, 2007-09, 情報処理学会
98
The security of RC6 against asymmetric Chi-square test attack / Hinoue, Tomohiko, Miyaji, Atsuko, Wada, Takatomi, 情報処理学会論文誌, 48(9), pp.2966-2975, 2007-09, 情報処理学会
99
情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2007年5月ロシア会議報告 / 宮地, 充子, 近澤, 武, 竜田, 敏男, 渡辺, 創, 大熊, 建司, 情報処理学会研究報告 : コンピュータセキュリティ, 2007(71), pp.159-169, 2007-07-19, 情報処理学会
100
量子複数秘密分散に関する考察 / 早稲田, 篤志, 双紙, 正和, 宮地, 充子, 情報処理学会論文誌, 48(7), pp.2447-2464, 2007-07, 情報処理学会
前へ
1
2
3
4
次へ
お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)