|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2015-05-15 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Security of QUIC Masaya Iseki (titech), Eiichiro Fujisaki (NTT) ISEC2015-5 |
We study the security of Quick UDP Internet Connections (QUIC for short) --
an experimental transport layer network pro... [more] |
ISEC2015-5 pp.31-38 |
LOIS |
2015-03-05 09:20 |
Okinawa |
|
Session Key Exchange Scheme with Instant Authentication and Effect of Audiovisual Media Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-62 |
In order to send and receive data with secrecy via network, both users can securely communicate by valid authentication ... [more] |
LOIS2014-62 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 09:10 |
Hokkaido |
|
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 |
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] |
ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 pp.247-254 |
IT, ISEC, WBS |
2010-03-04 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55 |
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] |
IT2009-76 ISEC2009-84 WBS2009-55 pp.31-38 |
AI |
2005-10-21 14:10 |
Kyoto |
|
Design and Security Verification of One-time ID Key-Exchange Protocol by Modal Logic Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
In order to conceal user's identity from eavesdroppers and construct a system
with high scalability, we propose a thre... [more] |
AI2005-18 pp.19-24 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|