|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2016-03-04 18:00 |
Oita |
|
A Study of Layer Interaction Diagram for Context-Oriented Technique Daisuke Moriya, Eri Ogawa, Hiroki Kamijo, Harumi Watanabe (Tokai Univ) KBSE2015-70 |
The article proposes a Layer Interaction Diagram. That diagram is a part of Context-Oriented software development that i... [more] |
KBSE2015-70 pp.125-130 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack Daisuke Moriyama (NICT) ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 |
Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneous... [more] |
ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 pp.17-24 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 09:35 |
Hokkaido |
|
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol Daisuke Moriyama (NICT) ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38 |
Radio Frequency IDentications (RFID) are useful low-cost devices for identication or authentication systems through wi... [more] |
ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38 pp.255-261 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
WBS, IT, ISEC |
2006-03-17 10:45 |
Aichi |
Nagoya Univ. |
A secure ID based authenticated key agreement with pairing Daisuke Moriyama, Jinhui Chao (Chuo Univ.) |
[more] |
IT2005-112 ISEC2005-169 WBS2005-126 pp.103-108 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|