A-7-9 Key Management for Privacy Protection in Sensor Information Network using Threshold Cryptography
スポンサーリンク
概要
- 論文の詳細を見る
- 社団法人電子情報通信学会の論文
- 2002-08-20
著者
-
NAKAO KOJI
KDDI RD Laboratories, Inc.
-
Miyake Yutaka
Kddi R&d Lab. Inc. Fujimino‐shi Jpn
-
Nakao Koji
Kddi R&d Laboratories Inc.
-
Nakao Koji
Kddi R&apm;d Laboratories Inc.
-
Miyake Yutaka
Kddi R & D Labs. Inc.
-
Nakao Koji
KDDI R&D Laboratories, Inc.
関連論文
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- T/TCP for DNS: A Performance and Security Analysis (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- QoS Routing-Based Congestion Management over Active Internetworking System Using Stream Code (Special Issue on New Developments on QoS Technologies for Information Networks)
- (Network Services Basics) Notification of Certificate Revocation Status between Different Domains under a PKI System ( Object-Oriented Technologies)
- FOREWORD
- A-7-9 Key Management for Privacy Protection in Sensor Information Network using Threshold Cryptography
- A-7-18 Proposal of Privacy Protection Mechanism for Sensor Information Network
- Implementation and Evaluation of a Micropayment System for Mobile Environments (Security and Society)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (Cryptography and Information Security)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
- A Study of Access Control Method for Mobile Agents by Using Secure Stubs (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- TCP Gateway for Satellite-based Internet Service Considering Accommodation of Multiple Customers (特集 次世代移動通信ネットワークとその応用)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists
- Secure Host Name Resolution Infrastructure for Overlay Networks(Networking Technologies for Overlay Networks)
- Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
- Software Protection Combined with Tamper-Proof Device
- Fast Implementation of KCipher-2 for Software and Hardware
- Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
- FOREWORD
- Securing distributed storage systems based on arbitrary regenerating codes
- BS-7-44 Decodability Attacks in XOR Network Coding