Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]
COMP2017-26
Fundamental Study of Classification of Attackers by Multiple Honeypots
Kazuya Yamashita, Okino Koji (Univ. of Toyama)
pp. 1 - 5
COMP2017-27
Effect on Mix Columns to the Security of Minalpher
-- Experimental Results for 6 Rounds --
Yuki Kishi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ)
pp. 7 - 10
COMP2017-28
Space Efficient Algorithms for Maximum (Weight) Independent Set on Circular Arcs
Shohei Urakawa (Kobe Univ.), Tom C. van der Zanden (Utrecht Univ.), Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST)
pp. 11 - 18
COMP2017-29
O(n^{1/3})-space algorithm for the grid graph reachability problem
Ryo Ashida, Kotaro Nakagawa (Tokyo Tech)
pp. 19 - 24
COMP2017-30
Maximum k-path Vertex Cover Problem on Graph Classes
Tsuyoshi Yagita, Eiji Miyano, Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST), Tom C. van der Zanden (Utrecht U.)
pp. 25 - 31
COMP2017-31
An optimal strategy of the second player for the 1-round voronoi game on trees
Akihiro Sugimoto (Kobe Univ.), Toshiki Saitoh (Kyushu Inst. of Tech.)
pp. 33 - 39
COMP2017-32
[Invited Talk]
Foundations and practical studies of secure computation
Ryo Kikuchi (NTT)
p. 41
COMP2017-33
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.)
pp. 43 - 50
COMP2017-34
Security and Enhancement of a Searchable Public-key Encryption Secure against Keyword Guessing Attack
Takanori Saito, Toru Nakanishi (Hiroshima Univ)
pp. 51 - 57
COMP2017-35
Blacklistable Anonymous Credential System with Reputation Using Accumulator
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.)
pp. 59 - 65
COMP2017-36
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST)
pp. 67 - 74
COMP2017-37
Reputation System with Confidentiality to Administrator Using Linear Homomorophic Signatures
Daiki Uenoyama, Toru nakanishi (Hiroshima Univ.)
pp. 75 - 81
COMP2017-38
Optimizing Bleichenbacher's Attack on Schnorr-Type Signatures with Barely Biased Nonces
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe, Tatsuaki Okamoto (NTT)
pp. 83 - 88
COMP2017-39
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 89 - 94
COMP2017-40
A Note on Rearrangement Errors in a Card-Based Protocol
Takaaki Mizuki (Tohoku Univ.), Yuichi Komano (Toshiba)
pp. 95 - 101
COMP2017-41
[Invited Talk]
Ryuhei Mori (Tokyo Tech)
pp. 103 - 105
COMP2017-42
An ILP Formulation for Maximum Lengh Interval Graph Decomposition Problem
Keisuke Inoue (KTC)
pp. 107 - 110
COMP2017-43
Efficient Enumeration of Dominating Sets in K-Degenerate graphs
Kazuhiro Kurita (HU), Kunihiro Wasa, Takeaki Uno (NII), Hiroki Arimura (HU)
pp. 111 - 117
COMP2017-44
Physical Bucket Sort with Restricted take Operations
Atsuki Nagao, Wei Wu (Seikei Univ.), Hiro Ito (UEC)
pp. 119 - 122
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.