JAIST Repository >

宮地 充子(ミヤジ アツコ)教授研究者総覧

No.書籍情報
1 A Matrix based ORAM: Design, Implementation and Experimental Analysis / GORDON, Steven, MIYAJI, Atsuko, SU, Chunhua, SUMONGKAYOTHIN, Karin, IEICE TRANSACTIONS on Information and Systems, E99-D(8), pp.2044-2055, 2016-08-01, The Institute of Electronics, Information and Communication Engineers (IEICE)
2 Refined RC4 key correlations of internal states in WPA / Ito, Ryoma, Miyaji, Atsuko, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, E99-A(6), pp.1132-1144, 2016-06-01, The Institute of Electronics, Information and Communication Engineers (IEICE)
3 Security and Experimental Performance Analysis of a Matrix ORAM / Gordon, Steven, Miyaji, Atsuko, Su, Chunhua, Sumongkaoythin, Karin, 2016 IEEE International Conference on Communications (ICC), pp.1-6, 2016-05-22, IEEE
4 Accurate Estimation of the Full Differential Distribution for General Feistel Structures / Chen, Jiageng, Miyiaji, Atsuko, Su, Chunhua, The, Je Sen, Lecture Notes in Computer Science, 9589, pp.108-124, 2016-05-07, Springer
5 New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA / Ito, Ryoma, Miyaji, Atsuko, Lecture Notes in Computer Science, 9054, pp.557-576, 2015-08-12, Springer
6 Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags / Chen, Jiageng, Miyaji, Atsuko, Sato, Hiroyuki, Su, Chunhua, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.17-24, 2015-08, Institute of Electrical and Electronics Engineers (IEEE)
7 How TKIP Induces Biases of Internal States of Generic RC4 / Ito, Ryoma, Miyaji, Atsuko, Lecture Notes in Computer Science, 9144, pp.329-342, 2015-06-25, Springer
8 楕円曲線上の離散対数問題の安全性に関する研究 / 宮地, 充子, 科学研究費助成事業研究成果報告書, pp.1-5, 2015-06-04
9 センサネットワークの安全・安心を保証する情報セキュリティ技術の研究 / 宮地, 充子, 科学研究費助成事業研究成果報告書, pp.1-6, 2015-06-03
10 Self-healing wireless sensor networks / Miyaji, Atsuko, Omote, Kazumasa, Concurrency and Computation: Practice and Experience, 27(10), pp.2547-2568, 2015-04-08, John Wiley & Sons
11 A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 / Chen, Jiageng, Hirose, Shoichi, Kuwakado, Hidenori, Miyaji, Atsuko, Lecture Notes in Computer Science, 8949, pp.271-285, 2015-03-17, Springer
12 New Integrated Long-Term Glimpse of RC4 / Ito, Ryoma, Miyaji, Atsuko, Lecture Notes in Computer Science, pp.137-149, 2015-01-22, Springer
13 A privacy-preserving efficient RFID authentication protocol from SLPN assumption / Islam Mamun, Mohammad Saiful, Miyaji, Atsuko, International Journal of Computational Science and Engineering, 10(3), pp.234-243, 2015, Inderscience
14 A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security / Miyaji, Atsuko, Rashed, Mazumder, Smart Innovation, Systems and Technologies, 33, pp.519-528, 2014-12-12, Springer
15 A multi-purpose Group Signature for Vehicular Network Security / Islam Mamun, Mohammad Saiful, Miyaji, Atsuko, Takada, Hiroaki, 2014 17th International Conference on Network-Based Information Systems (NBiS), pp.511-516, 2014-09, Institute of Electrical and Electronics Engineers (IEEE)
16 A new (n,n) Blockcipher based Hash Function for Short Messages / Miyaji, Atsuko, Rashed, Mazumder, Sawada, Tsuyoshi, 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS), pp.56-63, 2014-09, Institute of Electrical and Electronics Engineers (IEEE)
17 POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme / Huang, Cheng-Qiang, Miyaji, Atsuko, Li, Long-Hai, Xu, Shang-Mei, 2014 IEEE International Conference on Computer and Information Technology (CIT), pp.373-380, 2014-09, Institute of Electrical and Electronics Engineers (IEEE)
18 Secure VANET Applications with a refined Group Signature / Islam Mamun, Mohammad Saiful, Miyaji, Atsuko, 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp.199-206, 2014-07, Institute of Electrical and Electronics Engineers (IEEE)
19 情報セキュリティの標準化動向について -ISO/IEC JTC1/SC27/WG2 2014年4月香港会議報告- / 宮地, 充子, 近澤, 武, 竜田, 敏男, 大熊, 建司, 渡辺, 創, 松尾, 真一郎, 電子情報通信学会研究報告, 114(115), pp.171-179, 2014-06-26, The Institute of Electronics, Information and Communication Engineers (IEICE)
20 An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Journal of Applied Mathematics, 2014, pp.Article ID 983040-, 2014-06-01, Hindawi Publishing Corporation
21 RFID Path Authentication, Revisited / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp.245-252, 2014-05, Institute of Electrical and Electronics Engineers (IEEE)
22 A Scalable and Secure RFID Ownership Transfer Protocol / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp.343-350, 2014-05, Institute of Electrical and Electronics Engineers (IEEE)
23 A Provable Secure Batch Authentication Scheme for EPCGen2 Tags / Chen, Jiageng, Miyaji, Atsuko, Su, Chunhua, Lecture Notes in Computer Science, 8782, pp.103-116, 2014, Springer
24 Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to Lblock / Chen, Jiageng, Futa, Yuichi, Miyaji, Atsuko, Su, Chunhua, Lecture Notes in Computer Science, 8792, pp.184-197, 2014, Springer
25 Distributed Pseudo-Random Number Generation and Its Application to Cloud Database / Chen, Jiageng, Miyaji, Atsuko, Su, Chunhua, Lecture Notes in Computer Science, 8434, pp.373-387, 2014, Springer
26 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告 / 宮地, 充子, 近澤, 武, 竜田, 敏男, 渡辺, 創, 松尾, 真一郎, 大熊, 健司, 電子情報通信学会技術研究報告, 113(135), pp.75-84, 2013-07-18, 電子情報通信学会
27 A fully-secure RFID authentication protocol from exact LPN assumption / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.102-109, 2013-07, Institute of Electrical and Electronics Engineers (IEEE)
28 Private Multiparty Set Intersection Protocol in Rational Model / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.431-438, 2013-07, Institute of Electrical and Electronics Engineers (IEEE)
29 Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 8128, pp.1-15, 2013, Springer
30 Novel Strategies for Searching RC4 Key Collisions / Chen, Jiageng, Miyaji, Atsuko, Computers & Mathematics with Applications, 66(1), pp.81-90, 2013, Elsevier
31 Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack / Chen, Jiageng, Miyaji, Atsuko, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E95-A(12), pp.2148-2159, 2012-12-01, The Institute of Electronics, Information and Communication Engineers (IEICE)
32 An Optimized Signature Verification System for Vehicle Ad hoc NETwork / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp.1-8, 2012-09, Institute of Electrical and Electronics Engineers (IEEE)
33 A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7259/2012, pp.186-203, 2012-07-15, Springer
34 An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs / Iida, Tatsuro, Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp.552-557, 2012-03, Institute of Electrical and Electronics Engineers (IEEE)
35 Privacy-preserving Set Operations in the Presence of Rational Parties / Miyaji, Atsuko, Rahman, Mohammad Shahriar, 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp.869-874, 2012-03, Institute of Electrical and Electronics Engineers (IEEE)
36 Dynamic Attribute-based Signcryption without Random Oracles / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, International Journal of Applied Cryptography (IJACT), 2(3), pp.199-211, 2012, Inderscience
37 Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks / Izawa, Kazuya, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7232/2012, pp.245-248, 2012, Springer
38 A Novel Hybrid IP Traceback Scheme with Packet Counters / Tomoyuki Karasawa, Soshi, Masakazu, Miyaji, Atsuko, Lecture Notes in Computer Science, 7646, pp.71-84, 2012, Springer
39 Constant-Ciphertext-Size Dual Policy Attribute Based Encryption / Miyaji, Atsuko, Tran, Phuong V.X., Lecture Notes in Computer Science, 7672, pp.400-413, 2012, Springer
40 How to Enhance the Security on the Least Significant Bit / Miyaji, Atsuko, Mo, Yiren, Lecture Notes in Computer Science, 7712, pp.263-279, 2012, Springer
41 A Secure and private RFID authentication protocol under SLPN problem / Mamun, Mohammad S. I., Miyaji, Atsuko, Rahman, Mohammad S., Lecture Notes in Computer Science, 7645, pp.476-489, 2012, Springer
42 Unconditionally Secure Oblivious Transfer Based on Channel Delays / Cheong, Kai-Yuen, Miyaji, Atsuko, Lecture Notes in Computer Science, 7043/2011, pp.112-120, 2011-11-01, Springer
43 Generalized Analysis on Key Collisions of Stream Cipher RC4 / Chen, Jiageng, Atsuko Miyaji, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(11), pp.2194-2206, 2011-11-01, 電子情報通信学会
44 Non-interactive Opening for Ciphertexts Encrypted by Shared Keys / Chen, Jiageng, Emura, Keita, Miyaji, Atsuko, Lecture Notes in Computer Science, 7043/2011, pp.57-68, 2011-11-01, Springer
45 Ideal Secret Sharing Schemes with Share Selectability / Emura, Keita, Miyaji, Atsuko, Nomura, Akito, Rahman, Mohammad Shahriar, Soshi, Masakazu, Lecture Notes in Computer Science, 7043/2011, pp.143-157, 2011-11-01, Springer
46 Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7001/2011, pp.102-118, 2011-10-12, Springer
47 How to Find Short RC4 Colliding Key Pairs / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 7001/2011, pp.32-46, 2011-10-12, Springer
48 POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks / Iida, Tatsuro, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 6976/2011, pp.253-267, 2011-10-08, Springer
49 Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes / Miyaji, Atsuko, Omote, Kazumasa, IEICE Transactions on Information and Systems, E94-D(10), pp.1955-1965, 2011-10-01, 電子情報通信学会
50 Efficient and Low-Cost RFID Authentication Schemes / Miyaji, Atsuko, Rahman, Mohammad Shahriar, Soshi, Masakazu, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2(3), pp.4-25, 2011-09, Innovative Information Science & Technology Research Group

1 2 3 4 次へ

 


お問い合わせ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係