FOREWORD
スポンサーリンク
概要
- 論文の詳細を見る
- (社)電子情報通信学会の論文
- 2010-03-01
著者
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
Sakurai Kouichi
Kyushu Univ. Fukuoka Jpn
-
Sakurai Kouichi
Kyushu University
-
Wang Guojun
Central South Univ. Hunan Province Chn
-
Wang Guojun
Central South University
-
Yang Laurence
St. Francis Xavier University
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- A study on worms using search engine to spread (情報通信システムセキュリティ)
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- FOREWORD
- FOREWORD
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- Special Section on Cryptography and Information Security
- Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Trends and Security Issues for Contactless Smart Cards
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Fast Implementation of KCipher-2 for Software and Hardware
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism