JAIST Repository >

宮地 充子(ミヤジ アツコ)教授研究者総覧

No.書籍情報
51 A Secure and private RFID authentication protocol under SLPN problem / Mamun, Mohammad S. I., Miyaji, Atsuko, Rahman, Mohammad S., Lecture Notes in Computer Science, 7645, pp.476-489, 2012, Springer
52 Unconditionally Secure Oblivious Transfer Based on Channel Delays / Cheong, Kai-Yuen, Miyaji, Atsuko, Lecture Notes in Computer Science, 7043/2011, pp.112-120, 2011-11-01, Springer
53 Generalized Analysis on Key Collisions of Stream Cipher RC4 / Chen, Jiageng, Atsuko Miyaji, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(11), pp.2194-2206, 2011-11-01, 電子情報通信学会
54 Non-interactive Opening for Ciphertexts Encrypted by Shared Keys / Chen, Jiageng, Emura, Keita, Miyaji, Atsuko, Lecture Notes in Computer Science, 7043/2011, pp.57-68, 2011-11-01, Springer
55 Ideal Secret Sharing Schemes with Share Selectability / Emura, Keita, Miyaji, Atsuko, Nomura, Akito, Rahman, Mohammad Shahriar, Soshi, Masakazu, Lecture Notes in Computer Science, 7043/2011, pp.143-157, 2011-11-01, Springer
56 Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7001/2011, pp.102-118, 2011-10-12, Springer
57 How to Find Short RC4 Colliding Key Pairs / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 7001/2011, pp.32-46, 2011-10-12, Springer
58 POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks / Iida, Tatsuro, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 6976/2011, pp.253-267, 2011-10-08, Springer
59 Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes / Miyaji, Atsuko, Omote, Kazumasa, IEICE Transactions on Information and Systems, E94-D(10), pp.1955-1965, 2011-10-01, 電子情報通信学会
60 Efficient and Low-Cost RFID Authentication Schemes / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Soshi, Masakazu, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2(3), pp.4-25, 2011-09, Innovative Information Science & Technology Research Group
61 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic / Goundar, Raveen R., Joye, Marc, Miyaji, Atsuko, Rivain, Matthieu, Venelli, Alexandre, Journal of Cryptographic Engineering, 1(2), pp.161-176, 2011-08-09, Springer
62 A Timed-Release Proxy Re-Encryption Scheme / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(8), pp.1682-1695, 2011-08-01, 電子情報通信学会
63 A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 6584/2011, pp.62-76, 2011-07-19, Springer
64 Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments / Desmedt, Yvo, Miyaji, Atsuko, Lecture Notes in Computer Science, 6584/2011, pp.236-254, 2011-07-19, Springer
65 Toward Dynamic Attribute-Based Signcryption (Poster) / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6812/2011, pp.439-443, 2011-07-02, Springer
66 T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity / Hatano, Tetsuya, Miyaji, Atsuko, Sato, Takashi, Lecture Notes in Computer Science, 6812/2011, pp.189-207, 2011-07-02, Springer
67 Privacy-Preserving Data Mining: A Game-theoretic Approach / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6818/2011, pp.186-200, 2011-06-29, Springer
68 New Concrete Relation between Trace, Definition Field, and Embedding Degree / Hirasawa, Shoujirou, Miyaji, Atsuko, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(6), pp.1368-1374, 2011-06-01, 電子情報通信学会
69 Sequential Bitwise Sanitizable Signature Schemes / HANAOKA, Goichiro, HIROSE, Shoichi, MIYAJI, Atsuko, MIYAZAKI, Kunihiko, SANTOSO, Bagus, YANG, Peng, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(1), pp.392-404, 2011-01-01, 電子情報通信学会
70 Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 6513/2011, pp.135-149, 2011, Springer
71 Hidden Credential Retrieval Without Random Oracles / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Soshi, Masakazu, Lecture Notes in Computer Science, 6513/2011, pp.160-174, 2011, Springer
72 RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks / Ito, Hisashige, Miyaji, Atsuko , Omote, Kazumasa, The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010, pp.1-5, 2010-12, Institute of Electrical and Electronics Engineers (IEEE)
73 APRAP: Another Privacy Preserving RFID Authentication Protocol / Miyaji, Atsuko, Rahman, Mohammad Shahriar, 2010 6th IEEE Workshop on Secure Network Protocols (NPSec), pp.13-18, 2010-10-05, Institute of Electrical and Electronics Engineers (IEEE)
74 Generalized RC4 Key Collisions and Hash Collisions / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 6280/2010, pp.73-87, 2010-09, Springer
75 A ciphertext-policy attribute-based encryption scheme with constant ciphertext length / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Nomura, Akito, Soshi, Masakazu, International Journal of Applied Cryptography, 2(1), pp.46-59, 2010-07-02, Inderscience
76 New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences / MIYAJI, Atsuko, SUKEGAWA, Masahiro, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E93-A(6), pp.1066-1077, 2010-06-01, 電子情報通信学会
77 A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication / Emura, Keita, Miyaji, Atsuko , Omote, Kazumasa, Lecture Notes in Computer Science, 6402/2010, pp.200-213, 2010, Springer
78 An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation / Emura, Keita, Miyaji, Atsuko , Omote, Kazumasa, Lecture Notes in Computer Science, 6402, pp.184-198, 2010, Springer
79 A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 6047/2010, pp.30-44, 2010, Springer
80 Privacy-Preserving Data Mining in Presence of Covert Adversaries / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6440/2010, pp.429-440, 2010, Springer
81 Efficient Privacy-Preserving Data Mining in Malicious Model / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, Lecture Notes in Computer Science, 6440/2010, pp.370-382, 2010, Springer
82 Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves / Goundar, Raveen Ravinesh, Joye, Marc, Miyaji, Atsuko, Lecture Notes in Computer Science, 6225/2010, pp.65-79, 2010, Springer
83 サイドチャネル攻撃に対して安全な公開鍵暗号に関する研究 / 宮地, 充子, 科学研究費補助金研究成果報告書, pp.1-4, 2009-09-07
84 A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, 情報処理学会論文誌, 50(9), pp.1968-1983, 2009-09-02, 情報処理学会
85 A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, International Conference on Availability, Reliability and Security, 2009. ARES '09., pp.487-492, 2009-03, Institute of Electrical and Electronics Engineers (IEEE)
86 A Secure RFID Authentication Protocol with Low Communication Cost / Rahman, Mohammad Shahriar, Soshi, Masakazu, Miyaji, Atsuko, International Conference on Systems, 2009. CISIS '09., pp.559-564, 2009-03, Institute of Electrical and Electronics Engineers (IEEE)
87 A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, International Conference on Availability, Reliability and Security, 2009. ARES '09., pp.769-773, 2009-03, Institute of Electrical and Electronics Engineers (IEEE)
88 A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length / Emura, Keita, Miyaji, Atsuko, Nomura, Akito, Omote, Kazumasa, Soshi, Masakazu, Lecture Notes in Computer Science, 5451/2009, pp.13-23, 2009, Springer
89 A Selectable k-Times Relaxed Anonymous Authentication Scheme / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 5932/2009, pp.281-295, 2009, Springer
90 New Correlations of RC4 PRGA Using Nonzero-Bit Differences / Miyaji, Atsuko, Sukegawa, Masahiro, Lecture Notes in Computer Science, 5594/2009, pp.134-152, 2009, Springer
91 Elliptic curves with a pre-determined embedding degree / Hirasawa, Shoujirou, Miyaji, Atsuko, IEEE International Symposium on Information Theory, 2009. ISIT 2009., pp.2391-2395, 2009, Institute of Electrical and Electronics Engineers (IEEE)
92 Simple Certificateless Signature with Smart Cards / Omote, Kazumasa, Miyaji, Atsuko, Kato, Kazuhiko, IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008. EUC '08., pp.431-436, 2008-12, Institute of Electrical and Electronics Engineers (IEEE)
93 Generalized Scalar Multiplication Secure against SPA, DPA, and RPA / MIYAJI, Atsuko, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E91-A(10), pp.2833-2842, 2008-10-01, 電子情報通信学会
94 Security and Access Control for Vehicular Communications / Zrelli, Saber, Miyaji, Atsuko, Shinoda, Yoichi, Ernst, Thierry, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008. WIMOB '08., pp.561-566, 2008-10, Institute of Electrical and Electronics Engineers (IEEE)
95 Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point / Miyaji, Atsuko, Mizosoe, Kenji, IPSJ Journal, 49(9), pp.2975-2988, 2008-09-15, 情報処理学会
96 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2008年4月京都会議報告 / 宮地, 充子, 近澤, 武, 竜田, 敏男, 渡辺, 創, 大熊, 建司, 情報処理学会研究報告 : コンピュータセキュリティ, 2008(71), pp.27-35, 2008-07-24, 情報処理学会
97 Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption / Miyaji, Atsuko, 情報処理学会論文誌, 48(9), pp.2999-3013, 2007-09, 情報処理学会
98 The security of RC6 against asymmetric Chi-square test attack / Hinoue, Tomohiko, Miyaji, Atsuko, Wada, Takatomi, 情報処理学会論文誌, 48(9), pp.2966-2975, 2007-09, 情報処理学会
99 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2007年5月ロシア会議報告 / 宮地, 充子, 近澤, 武, 竜田, 敏男, 渡辺, 創, 大熊, 建司, 情報処理学会研究報告 : コンピュータセキュリティ, 2007(71), pp.159-169, 2007-07-19, 情報処理学会
100 量子複数秘密分散に関する考察 / 早稲田, 篤志, 双紙, 正和, 宮地, 充子, 情報処理学会論文誌, 48(7), pp.2447-2464, 2007-07, 情報処理学会

前へ 1 2 3 4 次へ

 


お問い合わせ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係