|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
ICM |
2013-03-14 09:40 |
Kagoshima |
Yakushima Environmental Culture Village Center |
Updating Group Encryption Key for Removing Multiple Members Satoshi Horiike (Hyogo Univ.) ICM2012-59 |
The contents of group communication must be encrypted to prevent access by nodes outside the group. The keys used for th... [more] |
ICM2012-59 pp.1-6 |
DE |
2009-07-28 10:00 |
Hyogo |
Kobe fashion mart |
Efficient Incremental Top-k Keyword Search in Relational Databases Yanwei Xu, Yoshiharu Ishikawa (Nagoya Univ.) DE2009-1 |
Keyword search in relational databases has attracted a lot of research interests in recent yeas. It is widely realized t... [more] |
DE2009-1 pp.1-6 |
IT, ISEC, WBS |
2007-03-16 09:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Key Update by Broadcast Encryption for Wireless Sensor Networks Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI) |
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] |
IT2006-96 ISEC2006-151 WBS2006-93 pp.65-70 |
ISEC, IPSJ-CSEC |
2004-07-20 14:45 |
Tokushima |
Tokushima Univ. |
A Secure Traitor Tracing Scheme against Key Exposure Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK) |
Copyright protection is a major issue in distributing content on the Internet. One well-known method of protecting copyr... [more] |
ISEC2004-35 pp.151-158 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|