BS-7-44 Decodability Attacks in XOR Network Coding
スポンサーリンク
概要
- 論文の詳細を見る
- 一般社団法人電子情報通信学会の論文
- 2013-09-03
著者
-
KIYOMOTO Shinsaku
KDDI R & D Laboratories Inc.
-
Miyake Yutaka
Kddi R&d Laboratories Inc.
-
Ohtsuki Tomoaki
Graduate School Of Science And Technology Keio University
-
Miyake Yutaka
Kddi R & D Labs. Inc.
-
Basu Anirban
KDDI R&D Laboratories Inc.
-
Juan C.
KDDI R&D Laboratories Inc.
関連論文
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Universally Composable Client-to-Client General Authenticated Key Exchange
- Efficient Implementation of the Pairing on Mobilephones Using BREW
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Review on Sufficient Conditions of SHA-0
- Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification(Biometrics)(Cryptography and Information Security)
- A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
- Design of Anonymous Attribute Authentication Mechanism
- A-7-3 Revocation and Addition Mechanisms for Fast (k, n)-Threshold Schemes
- On a Fast (K, n)-Threshold Secret Sharing Scheme
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
- Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution (特集:ユビキタス時代を支えるモバイル通信と高度交通システム)
- An Obfuscation Scheme Using Affine Transformation and Its Implementation (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Design of Self-Delegation for Mobile Terminals (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Design of Security Architecture for Beyond 3G Mobile Terminals (特集:プライバシを保護するコンピュータセキュリティ技術)
- (Network Services Basics) Notification of Certificate Revocation Status between Different Domains under a PKI System ( Object-Oriented Technologies)
- A-7-9 Key Management for Privacy Protection in Sensor Information Network using Threshold Cryptography
- A-7-18 Proposal of Privacy Protection Mechanism for Sensor Information Network
- Implementation and Evaluation of a Micropayment System for Mobile Environments (Security and Society)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (Cryptography and Information Security)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
- A Study of Access Control Method for Mobile Agents by Using Secure Stubs (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- TCP Gateway for Satellite-based Internet Service Considering Accommodation of Multiple Customers (特集 次世代移動通信ネットワークとその応用)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists
- Secure Host Name Resolution Infrastructure for Overlay Networks(Networking Technologies for Overlay Networks)
- Improved Subset Difference Method with Ternary Tree
- B-5-86 Codebook-based Interference Mitigation with Capacity Trade-off in Base Station Cooperation
- A-6-3 Pollution Attacks in XOR Network Coding : a Broadcast Encryption Perspective
- Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
- Cooperation for Secure Communications in the MIMO Relay Wire-tap Channel
- Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques(Information Hiding, Cryptography and Information Security)
- B-19-9 A Hierarchical Reservoir Computing Technique for Indoor Localization based on Signal Subspace Features
- Robust DOA Estimation for Uncorrelated and Coherent Signals
- EXIT Chart Analysis of Iteratively Decoded Parallel Concatenated Codes in a Relay-Assisted Communication Scenario (無線通信システム)
- EXIT Chart Analysis of Iteratively Decoded Parallel Concatenated Codes in a Relay-Assisted Communication Scenario (信号処理)
- Software Protection Combined with Tamper-Proof Device
- Multiuser MIMO Modulation Transparency in 3GPP LTE-A : A Capacity Perspective
- EXIT Chart Analysis of Iteratively Decoded Parallel Concatenated Codes in a Relay-Assisted Communication Scenario
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Design of Self-Delegation for Mobile Terminals
- Design of Self-Delegation for Mobile Terminals
- Fast Implementation of KCipher-2 for Software and Hardware
- Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
- FOREWORD
- Securing distributed storage systems based on arbitrary regenerating codes
- An Obfuscation Scheme Using Affine Transformation and Its Implementation
- BS-7-44 Decodability Attacks in XOR Network Coding
- An Obfuscation Scheme Using Affine Transformation and Its Implementation
- Security Challenges in Network Coding : The case of the Diversity Problem
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Multiuser MIMO Modulation Transparency in 3GPP LTE-A : A Capacity Perspective