スポンサーリンク
Chuo university | 論文
- New Security Architecture for Mobile IPv6 Networks
- Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
- A Leakage-Resilient Network Storage System
- Security Analysis of Password-based Protocols via FDR and AVISPA
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- An Efficient Leakage-Resilient Authenticated Key Exchange Protocol
- A Secure and Lightweight Authenticated Key Exchange Protocol for Wireless Networks
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- Clarification of internal current density distribution and self-magnetic field distribution of superconductors
- A NON-HAPTIC INPUT INTERFACE FOR IMMERSIVE SYSTEMS(International Workshop on Advanced Image Technology 2006)
- Development of asymmetrical cortical responses to radial expansion/contraction(Summary of Awarded Presentation at the 25th Annual Meeting)
- AN INTERACTIVE VISUAL SIMULATION OF HIGH FREQUENCY ELECTROMAGNETIC WAVE PROPAGATION(International Workshop on Advanced Image Technology 2005)