IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2013-03-08
15:35
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Toward Practical Application of Searchable Encryption
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric) IT2012-106 ISEC2012-124 WBS2012-92
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] IT2012-106 ISEC2012-124 WBS2012-92
pp.279-283
IT, ISEC, WBS 2012-03-02
16:35
Kanagawa   Secure Tabular Data Analysis Allowing Partial Disclosure of Statistics
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.) IT2011-76 ISEC2011-103 WBS2011-77
 [more] IT2011-76 ISEC2011-103 WBS2011-77
pp.189-193
ISEC, IT, WBS 2011-03-03
10:00
Osaka Osaka University Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] IT2010-68 ISEC2010-72 WBS2010-47
pp.1-6
ISEC, IT, WBS 2011-03-03
10:25
Osaka Osaka University Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric) IT2010-69 ISEC2010-73 WBS2010-48
Hattori et al. proposed privacy-preserving biometric authentication protocols with generic 2-DNF homomorphic encryption ... [more] IT2010-69 ISEC2010-73 WBS2010-48
pp.7-14
ISEC, LOIS 2009-11-13
14:15
Gifu Gifu Univ. Secure Biometric Authentication Using 2-DNF Homomorphic Encryption
Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric) ISEC2009-68 LOIS2009-57
In this paper, a secure biometric authentication protocol is proposed which can authenticate users using encrypted biome... [more] ISEC2009-68 LOIS2009-57
pp.113-120
ISEC, LOIS 2004-11-09
15:45
Osaka Osaka Univ. Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules
Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida (Kyoto Univ.)
SHA-0 employs a primitive polynomial of degree 16 over GF(2) in its message scheduling. There are 2048 primitive polynom... [more] ISEC2004-97 OIS2004-64
pp.85-91
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan