|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-03-04 15:05 |
Okinawa |
Meio Univiersity |
A Message authentication scheme with variable-length MAC Yumiko Murakami, Nobuhiro Kobayashi (MELCO) ICSS2014-97 |
[more] |
ICSS2014-97 pp.205-210 |
ICSS, IPSJ-SPT |
2014-03-27 15:20 |
Okinawa |
Meio Univiersity |
An authenticated key exchange protocol for the network between a server and terminals Yumiko Murakami, Yutaka Kawai, Nobuhiro Kobayashi (Mitsubishi Electric) ICSS2013-67 |
[more] |
ICSS2013-67 pp.31-35 |
IT, ISEC, WBS |
2013-03-07 14:05 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Extensive Performance Analysis of Cryptographic Primitives on the RL78 microcontroller Yumiko Murakami, Mitsuru Matsui (Mitsubishi Electric) IT2012-74 ISEC2012-92 WBS2012-60 |
[more] |
IT2012-74 ISEC2012-92 WBS2012-60 pp.79-85 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:25 |
Iwate |
Iwate Prefectural University |
Cheater Identifiable Quantum Secret Sharing Schemes Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST) |
In this paper, we show that there exists a cheater identifiable
$(k, n)$ threshold secret sharing scheme for a quantum ... [more] |
ISEC2005-55 pp.89-92 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|