|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2009-03-10 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
Improvement of LFSR Initial State Reconstruction Algorithm in Fast Correlation Attack Using Dynamically Constructed Parity Check Equations Hiroaki Saitoh, Masami Mohri (Gifu Univ.), Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-84 ISEC2008-142 WBS2008-97 |
Fast correlation attack (FCA) has been known as a method of cryptanalysis for the unpredictability of Nonlinear Combiner... [more] |
IT2008-84 ISEC2008-142 WBS2008-97 pp.259-266 |
ISEC, LOIS |
2008-11-13 13:00 |
Aichi |
Nagoya Noh Theater |
On Host-based Packet Capturing Mechanism for Network Forensics Shunsuke Inai (Nagoya Institute of Technology), Youji Fukuta (Aichi Univ. of Edu.), Shoji Mizobuchi (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Institute of Technology), Ryoji Noguchi (Toyotsu Syscom Corp.) ISEC2008-73 OIS2008-49 |
Digital forensics is application of computer crime investigation and analysis techniques in the interests of determing p... [more] |
ISEC2008-73 OIS2008-49 pp.1-6 |
ISEC, LOIS |
2004-11-09 10:55 |
Osaka |
Osaka Univ. |
One-Time Key Type Authentication Scheme for P2P Service Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
In P2P service, there is the case a user would not like to register his/her secret information such as password, because... [more] |
ISEC2004-89 OIS2004-56 pp.29-36 |
ISEC, LOIS |
2004-11-09 11:20 |
Osaka |
Osaka Univ. |
Access Control by Service Connector with Single Sign-On Function Youji Fukuta (The Univ. of Tokushima), Takehito Ninomiya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
In operation of server-hosts in client-server model, allowing to connect to general public is a frequent cause of frauds... [more] |
ISEC2004-90 OIS2004-57 pp.37-43 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|