Keyword : authentication


How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
SeongHan SHIN Kazukuni KOBARA 
Publication:   
Publication Date: 2018/03/01
Vol. E101-D  No. 3 ; pp. 803-807
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
passwordauthenticationuser anonymity
 Summary | Full Text:PDF(113.1KB)

Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
Ryo KIKUCHI Koji CHIDA Dai IKARASHI Koki HAMADA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 51-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
passwordauthenticationsecret sharingmultiparty computation
 Summary | Full Text:PDF(1.1MB)

Q-Class Authentication System for Double Arbiter PUF
Risa YASHIRO Takeshi SUGAWARA Mitsugu IWAMOTO Kazuo SAKIYAMA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 129-137
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Physically Unclonable Functionauthenticationmachine-learning attack
 Summary | Full Text:PDF(2.8MB)

Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock
So HIGASHIKAWA Tomoaki KOSUGI Shogo KITAJIMA Masahiro MAMBO 
Publication:   
Publication Date: 2018/01/01
Vol. E101-D  No. 1 ; pp. 45-52
Type of Manuscript:  Special Section PAPER (Special Section on Enriched Multimedia — Potential and Possibility of Multimedia Contents for the Future —)
Category: 
Keyword: 
shoulder surfingauthenticationpattern lockandroid application
 Summary | Full Text:PDF(787.3KB)

Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered
SeongHan SHIN Kazukuni KOBARA 
Publication:   
Publication Date: 2017/02/01
Vol. E100-A  No. 2 ; pp. 639-652
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
passwordauthenticationanonymityprovable security
 Summary | Full Text:PDF(926.7KB)

On the Use of m-Ary Challenges for RFID Distance Bounding Protocol
Young-Sik KIM Sang-Hyo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/09/01
Vol. E99-B  No. 9 ; pp. 2028-2035
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
RFIDauthenticationdistance bounding protocolmafia frauddistance fraud
 Summary | Full Text:PDF(1019.5KB)

A Secure RFID Application Revocation Scheme for IoT
Kai FAN Zhao DU Yuanyuan GONG Yue WANG Tongjiang YAN Hui LI Yintang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2027-2035
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
RFIDauthenticationrevocationsecurityIoT
 Summary | Full Text:PDF(612KB)

Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke MORIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1 ; pp. 130-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RFIDauthenticationownership transferprovable security
 Summary | Full Text:PDF(233.4KB)

Security Enhancement of Medical Imaging via Imperceptible and Robust Watermarking
Manuel CEDILLO HERNANDEZ Antonio CEDILLO HERNANDEZ Francisco GARCIA UGALDE Mariko NAKANO MIYATAKE Hector PEREZ MEANA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/09/01
Vol. E98-D  No. 9 ; pp. 1702-1705
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
digital watermarkingmedical imagingauthentication
 Summary | Full Text:PDF(1MB)

On Unlinkability of Password-Based Anonymous Authentication
SeongHan SHIN Kazukuni KOBARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/06/01
Vol. E98-A  No. 6 ; pp. 1320-1324
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
passwordauthenticationanonymityISO/IEC 20009-4unlinkability
 Summary | Full Text:PDF(95KB)

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model
Hung-Yu CHIEN Tzong-Chen WU Chien-Lung HSU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 750-759
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: 
Keyword: 
authenticationRFIDanonymitydistributed serverserror correction code
 Summary | Full Text:PDF(1.6MB)

Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/01/01
Vol. E98-B  No. 1 ; pp. 160-170
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationkey exchangeauthenticationanonymitycommunication binding property
 Summary | Full Text:PDF(762.6KB) | Errata[Uploaded on May 15,2015]

Trends and Development of Information-Theoretic Cryptography
Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 16-25
Type of Manuscript:  INVITED PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information-theoretic cryptographyShannon entropyRényi entropyencryptionauthentication
 Summary | Full Text:PDF(328.1KB)

An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks
Aiguo CHEN Guangchun LUO Jinsheng REN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/06/01
Vol. E97-D  No. 6 ; pp. 1656-1660
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
peer-to-peerauthenticationtrusttrust management
 Summary | Full Text:PDF(80.2KB)

Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR
Taek-Young YOUN Dowon HONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2014/05/01
Vol. E97-B  No. 5 ; pp. 930-935
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
securityauthenticationdistance bounding protocolfalse acceptance ratedistance fraud attacksmafia fraud attacks
 Summary | Full Text:PDF(478KB)

A Secure and Efficient Certificateless Aggregate Signature Scheme
He LIU Mangui LIANG Haoliang SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/04/01
Vol. E97-A  No. 4 ; pp. 991-995
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
information securityaggregate signaturecertificateless cryptographyauthentication
 Summary | Full Text:PDF(118.6KB)

Key De-Synchronization Attack against Yüksel-Nielson's Key Distribution Protocol for ZigBee Wireless Sensor Networks
Chang-Seop PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/03/01
Vol. E97-A  No. 3 ; pp. 877-880
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
ZigBeeauthenticationKey EstablishmentKey De-synchronizationreplay attacks
 Summary | Full Text:PDF(301.2KB)

Relations among Notions of Privacy for RFID Authentication Protocols
Daisuke MORIYAMA Shin'ichiro MATSUO Miyako OHKUBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 225-235
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
RFIDauthenticationsecurity model
 Summary | Full Text:PDF(688.9KB)

Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Fushan WEI Zhenfeng ZHANG Chuangui MA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/09/01
Vol. E96-A  No. 9 ; pp. 1864-1871
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
gatewaypasswordauthenticationkey exchange
 Summary | Full Text:PDF(952.6KB)

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
Yong YU Jianbing NI Ying SUN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/08/01
Vol. E96-D  No. 8 ; pp. 1875-1877
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
security analysiswireless sensor networksreprogrammingauthentication
 Summary | Full Text:PDF(55.5KB)

Secure and Efficient Report Protocol for Networked Smart Grid Systems Using Linear Map
Youngsam KIM Joon HEO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/05/01
Vol. E96-A  No. 5 ; pp. 886-895
Type of Manuscript:  Special Section PAPER (Special Section on Networked Control Systems: Theories & Applications)
Category: 
Keyword: 
networked smart gridauthenticationresource-constrained devicelinear map
 Summary | Full Text:PDF(1.5MB)

Unilateral Distance Bounding Protocol with Bidirectional Challenges
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/01/01
Vol. E96-D  No. 1 ; pp. 134-137
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
mafia fraud attackdistance boundingauthenticationsecurity
 Summary | Full Text:PDF(82KB)

Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks
Atsushi WASEDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 166-170
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
quantum cryptographyauthentication
 Summary | Full Text:PDF(353.4KB)

Anonymous Authentication Scheme without Verification Table for Wireless Environments
Ryoichi ISAWA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2488-2492
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
anonymityauthenticationsecuritywireless communication
 Summary | Full Text:PDF(92.8KB)

Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
Jung-Yoon KIM Hyoung-Kee CHOI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/10/01
Vol. E95-D  No. 10 ; pp. 2393-2400
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
network-level security and protectionauthenticationsecuritypassword
 Summary | Full Text:PDF(531KB)

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1684-1686
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
authenticationpasswordcryptanalysishash functionsmartcard
 Summary | Full Text:PDF(120.6KB)

Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1687-1689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisauthenticationanonymitywireless communicationssecurity
 Summary | Full Text:PDF(61.1KB)

A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/05/01
Vol. E95-B  No. 5 ; pp. 1819-1821
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationauthenticationanonymitytraceabilitysmart card
 Summary | Full Text:PDF(212.6KB)

Lightweight Distance Bounding Protocol against Relay Attacks
Jin Seok KIM Kookrae CHO Dae Hyun YUM Sung Je HONG Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/04/01
Vol. E95-D  No. 4 ; pp. 1155-1158
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securityauthenticationrelay attackmafia fraud attackdistance bounding protocol
 Summary | Full Text:PDF(72.6KB)

EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks
Saber ZRELLI Nobuo OKABE Yoichi SHINODA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2 ; pp. 490-502
Type of Manuscript:  Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
wirelessauthenticationhandoffperformance
 Summary | Full Text:PDF(808.6KB)

An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation
Rehana YASMIN Eike RITTER Guilin WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 126-133
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security
Keyword: 
wireless sensor networkauthenticationonline/offline signatures
 Summary | Full Text:PDF(224.4KB)

Development and Evaluation of FMC Authentication Technology with Cellular Phones
Katsuyuki UMEZAWA Satoru TEZUKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/11/01
Vol. E94-B  No. 11 ; pp. 3009-3017
Type of Manuscript:  PAPER
Category: Network
Keyword: 
mobile phoneauthenticationfederationFMC3GPPbluetooth
 Summary | Full Text:PDF(652.4KB)

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security
Kyusuk HAN Taeshik SHON Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/08/01
Vol. E94-B  No. 8 ; pp. 2235-2238
Type of Manuscript:  Special Section LETTER (Special Section on Deployment and Operation of New Internet Technology: Challenges and Approaches)
Category: 
Keyword: 
VoIPID-based cryptosystemone-way key agreementauthenticationkey agreement
 Summary | Full Text:PDF(1.2MB)

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies
Kyusuk HAN Kwangjo KIM Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6 ; pp. 1181-1184
Type of Manuscript:  Special Section LETTER (Special Section on Emerging Technologies of Ubiquitous Computing Systems)
Category: 
Keyword: 
ubiquitous computingcontext-awarenessLocation Based Serviceprivacyauthenticationcredibility
 Summary | Full Text:PDF(1MB)

A Dynamic Secure Access Mechanism for Wireless Sensor Networks Using Usage Control and Agent Technology
Jun WU Shigeru SHIMAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/06/01
Vol. E94-B  No. 6 ; pp. 1577-1586
Type of Manuscript:  Special Section PAPER (Special Section on New Generation Mobile and Sensor Networking and Future Networks)
Category: 
Keyword: 
wireless sensor networkssecurityusage controlaccess controlauthentication
 Summary | Full Text:PDF(1.5MB)

Further Improved Remote User Authentication Scheme
Jung-Yoon KIM Hyoung-Kee CHOI John A. COPELAND 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1426-1433
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
network-level security and protectionauthenticationsecuritypassword
 Summary | Full Text:PDF(439.9KB)

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
Eun-Jun YOON Il-Soo JEON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/05/01
Vol. E94-D  No. 5 ; pp. 1113-1116
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
network securityautonomous systemcryptographyauthenticationAES
 Summary | Full Text:PDF(240.9KB)

Secure Authentication Scheme with Improved Anonymity for Wireless Environments
JongHyup LEE Taekyoung KWON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/02/01
Vol. E94-B  No. 2 ; pp. 554-557
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
access controlidentificationauthentication
 Summary | Full Text:PDF(213.8KB)

Improved User Authentication Scheme with User Anonymity for Wireless Communications
Miyoung KANG Hyun Sook RHEE Jin-Young CHOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2 ; pp. 860-864
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
authenticationanonymitywireless communications
 Summary | Full Text:PDF(81.3KB)

iAuth: An HTTP Authentication Framework Integrated into HTML Forms
Takeru INOUE Yohei KATAYAMA Hiroshi SATO Noriyuki TAKAHASHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/02/01
Vol. E94-B  No. 2 ; pp. 466-476
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
HTTPHTMLauthenticationcookie
 Summary | Full Text:PDF(1.5MB)

Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification
Kenta TAKAHASHI Shinji HIRATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 233-244
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics
Keyword: 
biometricsauthenticationcancelable biometricstemplate protection
 Summary | Full Text:PDF(861KB)

A Robust Security Mechanism for Mobile Commerce Transactions
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/11/01
Vol. E93-D  No. 11 ; pp. 2898-2906
Type of Manuscript:  Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
cryptographysecurity analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF(178.1KB)

A Biometric Authenticated Key Agreement Protocol for Secure Token
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/08/01
Vol. E93-D  No. 8 ; pp. 2311-2315
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
biometrictokenauthenticationpasswordsecurity
 Summary | Full Text:PDF(238KB)

Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
Jun-Cheol PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7 ; pp. 1997-2000
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
authenticationuser privacysmart cardone-time credentials
 Summary | Full Text:PDF(70.3KB)

An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4 ; pp. 850-853
Type of Manuscript:  LETTER
Category: Reliability, Maintainability and Safety Analysis
Keyword: 
cryptographyauthenticationpasswordkey exchangecryptanalysis
 Summary | Full Text:PDF(299.6KB)

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard
Pedro PERIS-LOPEZ Tieyan LI Julio C. HERNANDEZ-CASTRO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 518-527
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
RFIDsecurityEPC Class-1 Gen-2 standardauthenticationlightweight cryptographic primitives
 Summary | Full Text:PDF(357KB)

Development of Single Sign-On System with Hardware Token and Key Management Server
Daiki NOBAYASHI Yutaka NAKAMURA Takeshi IKENAGA Yoshiaki HORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 826-835
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication and Authorization Techniques
Keyword: 
single sign-onhardware tokenkey management serverauthenticationsecurity
 Summary | Full Text:PDF(795.9KB)

An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET
Youngho PARK Kyung-Hyune RHEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 810-817
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Ad-Hoc/Sensor Networks
Keyword: 
secure ad hoc routingauthenticationID-based keykey exchangeDSR
 Summary | Full Text:PDF(293.4KB)

A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose CARRIJO Rafael TONICELLI Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2 ; pp. 658-662
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
authenticationprotocol HB/HB+cryptoanalysis
 Summary | Full Text:PDF(83KB)

Light Weight MP3 Watermarking Method for Mobile Terminals
Koichi TAKAGI Shigeyuki SAKAZAWA Yasuhiro TAKISHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2546-2554
Type of Manuscript:  PAPER
Category: Engineering Acoustics
Keyword: 
watermarkingcompressed audioMP3mobile terminalscalefactorauthentication
 Summary | Full Text:PDF(1.3MB)

Complementing Security Breach of Authentication by Using Shared Authentication Information in Mobile WiMAX Networks
Youngwook KIM Hyoung-Kyu LIM Saewoong BAHK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/08/01
Vol. E91-B  No. 8 ; pp. 2728-2730
Type of Manuscript:  LETTER
Category: Wireless Communication Technologies
Keyword: 
SAIprotocol vulnerabilityDDoSauthenticationMobile WiMAX
 Summary | Full Text:PDF(213.7KB)

Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback
Rongrong NI Qiuqi RUAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/08/01
Vol. E91-D  No. 8 ; pp. 2196-2198
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationchaotic systemlocalizationneighbor-aidedfeedback
 Summary | Full Text:PDF(253.5KB)

Security Analysis of Yeh-Tsai Security Mechanism
Dae Hyun YUM Jong Hoon SHIN Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1477-1480
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Secure Communication
Keyword: 
security analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF(108.7KB)

Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication
Davar PISHVA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1369-1379
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Biometrics
Keyword: 
aliveness detectionsecurityauthenticationmulti-factor authenticationbiometricsspectral biometrics
 Summary | Full Text:PDF(1MB)

Safe and Secure Services Based on NGN
Tomoo FUKAZAWA Takemi NISASE Masahisa KAWASHIMA Takeo HARIU Yoshihito OSHIMA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1226-1233
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
NGNsecurityauthenticationstandard
 Summary | Full Text:PDF(1.1MB)

A Scalable and Practical Authentication Protocol in Mobile IP
Yong Lee  Goo-Yeon LEE Hwa-Jong KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/02/01
Vol. E91-B  No. 2 ; pp. 601-604
Type of Manuscript:  LETTER
Category: Network
Keyword: 
authenticationpublic keyMobile IPcertificatescalability
 Summary | Full Text:PDF(67.6KB)

A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification
Mohammad Mesbah UDDIN Yasunobu NOHARA Daisuke IKEDA Hiroto YASUURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 229-235
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
smart cardscryptographic protocols for smart cardsmulti-application smart cardssecurityauthentication
 Summary | Full Text:PDF(737.7KB)

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards
Al-Sakib Khan PATHAN Choong Seon HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11 ; pp. 1885-1888
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationcryptanalysisforgery attacksmart card
 Summary | Full Text:PDF(85.3KB)

Integrated Authentication Model for Network Access in Next Generation Networks
Kihun HONG Souhwan JUNG Namhi KANG Younghan KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/11/01
Vol. E90-B  No. 11 ; pp. 3246-3249
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
NGNauthenticationEAPhandover
 Summary | Full Text:PDF(406.5KB)

A Practical Method for Generating Digital Signatures Using Biometrics
Taekyoung KWON Hyung-Woo LEE Jae-il LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/06/01
Vol. E90-B  No. 6 ; pp. 1381-1389
Type of Manuscript:  PAPER
Category: Network
Keyword: 
authenticationdigital signaturebiometricspublic key infrastructure
 Summary | Full Text:PDF(395.7KB)

A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication
Nozomi ISHIHARA Koki ABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5 ; pp. 1045-1054
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
watermarkingDWTsemi-fragileauthenticationtamper-proofing
 Summary | Full Text:PDF(768.2KB)

Secure Route Discovery Protocol for Ad Hoc Networks
YoungHo PARK Hwangjun SONG KyungKeun LEE CheolSoo KIM SangGon LEE SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/02/01
Vol. E90-A  No. 2 ; pp. 539-541
Type of Manuscript:  LETTER
Category: Mobile Information Network and Personal Communications
Keyword: 
ad hoc networkroute discovery protocolsecurityauthentication
 Summary | Full Text:PDF(56.7KB)

Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/02/01
Vol. E90-B  No. 2 ; pp. 331-333
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
authenticationpassword guessing attacksmart cardefficiency
 Summary | Full Text:PDF(60.2KB)

A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks
Kihun HONG Souhwan JUNG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/12/01
Vol. E89-B  No. 12 ; pp. 3417-3420
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
authenticationmobile networkmobilityroaminghandover
 Summary | Full Text:PDF(485.1KB)

Scalable Authentication and Nonrepudiation Technique for JPEG 2000 Images Using JPSEC Protection Tools
Ayman HAGGAG Mohamed GHONEIM Jianming LU Takashi YAHAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/11/01
Vol. E89-A  No. 11 ; pp. 2945-2954
Type of Manuscript:  Special Section PAPER (Special Section on Image Media Quality)
Category: 
Keyword: 
JPEG 2000JPSECscalable codingauthenticationnonrepudiationPublic Key Infrastructure (PKI)
 Summary | Full Text:PDF(805.6KB)

Securing Mobile Commerce Transactions
Tzu-Chang YEH Shih-Chang TSAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/09/01
Vol. E89-B  No. 9 ; pp. 2608-2611
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
mobile commercesecurityauthentication
 Summary | Full Text:PDF(179.3KB)

Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web
KyungKeun LEE YoungHo PARK SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1859-1862
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
authenticationpassword based key exchange protocolsmart-cardinterleaving attackDiffie-Hellman problem
 Summary | Full Text:PDF(76.9KB)

A Key Management Scheme for Secure Mobile IP Registration Based on AAA Protocol
Hyun-Sun KANG Chang-Seop PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1842-1846
Type of Manuscript:  PAPER
Category: Mobile Information Network and Personal Communications
Keyword: 
mobile IPregistration protocolAAAauthenticationkey management
 Summary | Full Text:PDF(159.4KB)

Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows
Min-Shiang HWANG Jung-Wen LO Shu-Yin HSIAO Yen-Ping CHU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/04/01
Vol. E89-D  No. 4 ; pp. 1575-1577
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationcryptographydigital signatureencryption
 Summary | Full Text:PDF(68KB)

Image Authentication Based on Modular Embedding
Moon Ho LEE Valery KORZHIK Guillermo MORALES-LUNA Sergei LUSSE Evgeny KURBATOV 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/04/01
Vol. E89-D  No. 4 ; pp. 1498-1506
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
watermarkingauthenticationspread-spectrum signalsoptimal detectioncodebookWiener filtering
 Summary | Full Text:PDF(372.8KB)

Zero-Knowledge Hierarchical Authentication in MANETs
Pino CABALLERO-GIL Candelaria HERNANDEZ-GOYA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/03/01
Vol. E89-D  No. 3 ; pp. 1288-1289
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
wireless networksauthenticationalgorithms
 Summary | Full Text:PDF(56.7KB)

The Fusion of Two User-friendly Biometric Modalities: Iris and Face
Byungjun SON Yillbyung LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1 ; pp. 372-376
Type of Manuscript:  LETTER
Category: Image Recognition, Computer Vision
Keyword: 
multimodal systemwavelet transformRJFVDLDAauthentication
 Summary | Full Text:PDF(336.4KB)

A Survey on Identity Management Protocols and Standards
Teruko MIYATA Yuzo KOGA Paul MADSEN Shin-ichi ADACHI Yoshitsugu TSUCHIYA Yasuhisa SAKAMOTO Kenji TAKAHASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1 ; pp. 112-123
Type of Manuscript:  INVITED SURVEY PAPER
Category: 
Keyword: 
identityfederationpseudonymsecurityprivacyauthentication
 Summary | Full Text:PDF(1.6MB)

Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines
Ting-Yi CHANG Chou-Chen YANG Chia-Meng CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/06/01
Vol. E88-B  No. 6 ; pp. 2557-2565
Type of Manuscript:  PAPER
Category: Terrestrial Radio Communications
Keyword: 
authenticationgeometric properties of linesmalicious behaviorsMobile IProuting securitywireless ad hoc networks
 Summary | Full Text:PDF(478.1KB)

An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading
JaeYong JEONG Yongsu PARK Yookun CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/05/01
Vol. E88-D  No. 5 ; pp. 1077-1081
Type of Manuscript:  LETTER
Category: Networks
Keyword: 
mobile communications securitynetwork securityauthentication
 Summary | Full Text:PDF(111.4KB)

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A  No. 3 ; pp. 736-754
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
entropy of passwordson-line and off-line attacksauthenticationkey establishment protocolleakage of stored secretsproactive securityDDH problemstandard model
 Summary | Full Text:PDF(524.8KB)

A Distributed Authentication Platform Architecture for Peer-to-Peer Applications
Kazuhiko SAGARA Kenya NISHIKI Minoru KOIZUMI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/03/01
Vol. E88-B  No. 3 ; pp. 865-872
Type of Manuscript:  Special Section PAPER (Special Section on Ubiquitous Networks)
Category: Software Platform Technologies
Keyword: 
authenticationpeer-to-peer applicationsecure-path setup
 Summary | Full Text:PDF(874.4KB)

A Receiver Authentication and Group Key Delivery Protocol for Secure Multicast
Hidetoshi UENO Hideharu SUZUKI Norihiro ISHIKAWA Osamu TAKAHASHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/03/01
Vol. E88-B  No. 3 ; pp. 1139-1148
Type of Manuscript:  PAPER
Category: Network
Keyword: 
multicastsecure multicastgroup key managementauthenticationaccounting
 Summary | Full Text:PDF(1.1MB)

Comments on YEH-SHEN-HWANG's One-Time Password Authentication Scheme
Il-Sun YOU Kyungsan CHO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/02/01
Vol. E88-B  No. 2 ; pp. 751-753
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
authenticationS/KEYone-time passwordsmart card
 Summary | Full Text:PDF(56.6KB)

Watermarking Combined with CELP Speech Coding for Authentication
Zhe-Ming LU Bin YAN Sheng-He SUN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/02/01
Vol. E88-D  No. 2 ; pp. 330-334
Type of Manuscript:  LETTER
Category: Speech and Hearing
Keyword: 
watermarkingauthenticationCELPstatistical detection
 Summary | Full Text:PDF(553.5KB)

Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards
Eun-Jun YOON Eun-Kyung RYU Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 319-321
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypasswordauthenticationsecuritysmart card
 Summary | Full Text:PDF(63.4KB)

Provably Secure Three-Party Password-Authenticated Key Exchange
Chun-Li LIN Hsiang-An WEN Tzonelih HWANG Hung-Min SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/11/01
Vol. E87-A  No. 11 ; pp. 2990-3000
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographypassworddictionary attackauthenticationkey exchangeprovable security
 Summary | Full Text:PDF(369.5KB)

An Improvement of a Deniable Authentication Protocol
Bin-Tsan HSIEH Hung-Min SUN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/10/01
Vol. E87-B  No. 10 ; pp. 3099-3101
Type of Manuscript:  LETTER
Category: Network
Keyword: 
cryptanalysisauthenticationprotocol
 Summary | Full Text:PDF(67.2KB)

Password Authentication without the Server Public Key
Ya-Fen CHANG Chin-Chen CHANG Yi-Long LIU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/10/01
Vol. E87-B  No. 10 ; pp. 3088-3091
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
passwordauthenticationpublic keypassword guessing attacks
 Summary | Full Text:PDF(201.9KB)

An Enhanced SAIDA: Stream Authentication with High Verification Probability and Low Computation Cost
Yongsu PARK Yookun CHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/09/01
Vol. E87-A  No. 9 ; pp. 2471-2473
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
network securityauthenticationdigital signaturestream distribution
 Summary | Full Text:PDF(304.5KB)

Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Scheme
Wei-Chi KU Hao-Chuan TSAI Maw-Jinn TSAUR 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/08/01
Vol. E87-B  No. 8 ; pp. 2374-2376
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
smartcardpasswordauthenticationS/KEYhash function
 Summary | Full Text:PDF(69.6KB)

Cryptanalysis on One-Time Password Authentication Schemes Using Counter Value
Takasuke TSUJI Akihiro SHIMIZU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/06/01
Vol. E87-B  No. 6 ; pp. 1756-1759
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
authenticationone-time passwordattacksmart cardcounter value
 Summary | Full Text:PDF(73.6KB)

Two Factor Authenticated Key Exchange (TAKE) Protocol in Public Wireless LANs
Young Man PARK Sang Kyu PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/05/01
Vol. E87-B  No. 5 ; pp. 1382-1385
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationwireless securityEAP methodkey management802.11i
 Summary | Full Text:PDF(129.5KB)

Reflection Attack on a Generalized Key Agreement and Password Authentication Protocol
Wei-Chi KU Hui-Lung LEE Chien-Ming CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/05/01
Vol. E87-B  No. 5 ; pp. 1386-1388
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationkey agreementpasswordreflection attack
 Summary | Full Text:PDF(67.5KB)

Three Party Mutual Authentication Schemes for the Virtual Home Environment in the Next Generation Mobile Network
Jong-Min JEONG Goo-Yeon LEE Yong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/11/01
Vol. E86-D  No. 11 ; pp. 2479-2482
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
mutualauthenticationVHEpasswordCHAP
 Summary | Full Text:PDF(116.4KB)

Security Enhancement for Protecting Password Transmission
Chou-Chen YANG Ting-Yi CHANG Jian-Wei LI Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/07/01
Vol. E86-B  No. 7 ; pp. 2178-2181
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationcryptographypasswordsecurity
 Summary | Full Text:PDF(118.2KB)

Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme
Wei-Chi KU Chien-Ming CHEN Hui-Lung LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/05/01
Vol. E86-B  No. 5 ; pp. 1682-1684
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationpassworddenial of service attackreplay attack
 Summary | Full Text:PDF(107.6KB)

The Improved One-Time Password Algorithm Using Time
Joonggil PARK Bongjoo PARK Jongyoul PARK Jae-cheol RYOU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/12/01
Vol. E85-D  No. 12 ; pp. 1962-1966
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
authenticationone-time passwordtime-slippage
 Summary | Full Text:PDF(461.3KB)

A Secure One-Time Password Authentication Scheme Using Smart Cards
Tzu-Chang YEH Hsiao-Yun SHEN Jing-Jang HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/11/01
Vol. E85-B  No. 11 ; pp. 2515-2518
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationone-time passwordsmart cardreplay attackoff-line dictionary attack
 Summary | Full Text:PDF(122.7KB)

Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10 ; pp. 2229-2237
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
entropy of passwordskey exchangeauthenticationDDH problemstandard model
 Summary | Full Text:PDF(271.4KB)

An Efficient Kerberos Authentication Mechanism Associated with X.509 and DNS (Domain Name System)
Cheolhyun KIM Ilyong CHUNG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/09/01
Vol. E85-D  No. 9 ; pp. 1384-1389
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
KerberosauthenticationX.509domain name system
 Summary | Full Text:PDF(467.6KB)

Improvement on Peyravian-Zunic's Password Authentication Schemes
Jing-Jang HWANG Tzu-Chang YEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/04/01
Vol. E85-B  No. 4 ; pp. 823-825
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationpasswordsecurity
 Summary | Full Text:PDF(104.7KB)

Standardization of Accuracy Evaluation for Biometric Authentication in Japan
Yoichi SETO Masahiro MIMURA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/07/01
Vol. E84-D  No. 7 ; pp. 800-805
Type of Manuscript:  INVITED PAPER (Special Issue on Biometric Person Authentication)
Category: 
Keyword: 
biometricsauthenticationaccuracyevaluationstandardization
 Summary | Full Text:PDF(531.1KB)

Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards
Shuichi ISHIDA Masahiro MIMURA Yoichi SETO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/07/01
Vol. E84-D  No. 7 ; pp. 812-818
Type of Manuscript:  Special Section PAPER (Special Issue on Biometric Person Authentication)
Category: 
Keyword: 
biometricssmart cardsauthenticationelectronic transactions
 Summary | Full Text:PDF(808.6KB)

A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems
Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/10/25
Vol. E83-A  No. 10 ; pp. 1983-1986
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticationimpersonation attacksubstitution attackinformation-theoretic boundsinformation-spectrum methods
 Summary | Full Text:PDF(209.3KB)

Temporary Mobile User Certificate for Mobile Information Services in UMTS
Byung-Rae LEE Kyung-Ah CHANG Tai-Yun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/08/25
Vol. E83-B  No. 8 ; pp. 1880-1886
Type of Manuscript:  Special Section PAPER (Special Issue on Personal, Indoor and Mobile Radio Communications)
Category: 
Keyword: 
certificateauthenticationUMTSASPeCTpublic key cryptography
 Summary | Full Text:PDF(829.2KB)

Coding Theorems for Secret-Key Authentication Systems
Hiroki KOGA Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8 ; pp. 1691-1703
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
authenticationimpersonation attacksubstitution attackinformation-theoretic boundscoding theorem
 Summary | Full Text:PDF(544.6KB)

An Improvement of the Password-Based Authentication Protocol (K1P) on Security against Replay Attacks
Taekyoung KWON Myeongho KANG Sangjoon JUNG Jooseok SONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1999/07/25
Vol. E82-B  No. 7 ; pp. 991-997
Type of Manuscript:  PAPER
Category: Communication Networks and Services
Keyword: 
securityauthenticationauthentication protocolreplay attackguessing attack
 Summary | Full Text:PDF(414.5KB)

Network Access Control for DHCP Environment
Kazumasa KOBAYASHI Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1998/09/25
Vol. E81-B  No. 9 ; pp. 1718-1723
Type of Manuscript:  PAPER
Category: Communication Networks and Services
Keyword: 
mobile computing environmentDHCPaccess controlgatewayauthentication
 Summary | Full Text:PDF(546.2KB)

Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets
Taekyoung KWON Jooseok SONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 156-163
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
securitykey exchangeauthenticationguessing attackone-time padone-way hash function
 Summary | Full Text:PDF(707.8KB)

High Performance Nonce-Based Authentication and Key Distribution Protocols against Password Guessing Attacks
Sung-Ming YEN Meng-Tzung LIU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11 ; pp. 2209-2217
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
authenticationchallenge-responsecryptographykey distributionnonceoff-line dictionary attackon-line attackpasswordtrusted third-partyverifiable text attack
 Summary | Full Text:PDF(782.7KB)

Mobility Support with Authentic Firewall Traversal in IPv6
Fumio TERAOKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1997/08/25
Vol. E80-B  No. 8 ; pp. 1132-1137
Type of Manuscript:  INVITED PAPER (Special Issue on Mobile Computing)
Category: 
Keyword: 
internetmobilityIPv6protocolfirewallauthentication
 Summary | Full Text:PDF(523.9KB)

User Authentication in Mobile Computing Environment
Akio TAKUBO Mutsumi ISHIKAWA Takashi WATANABE Masakazu SOGA Tadanori MIZUNO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/07/25
Vol. E80-A  No. 7 ; pp. 1288-1298
Type of Manuscript:  Special Section PAPER (Special Section on Multi-dimensional Mobile Information Network)
Category: 
Keyword: 
mobile computingauthenticationsecurityprotocolcryptography
 Summary | Full Text:PDF(898.2KB)

An lmproved Method for Formal Security Verification of Cryptographic Protocols
Hajime WATANABE Toru FUJIWARA Tadao KASAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/07/25
Vol. E79-A  No. 7 ; pp. 1089-1096
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticationcomputer securitycryptographic protocolprotocol verification
 Summary | Full Text:PDF(689.3KB)

Combinatorial Bounds and Design of Broadcast Authentication
Hiroshi FUJII Wattanawong KACHEN Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4 ; pp. 502-506
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptologyauthenticationcombinatorial design
 Summary | Full Text:PDF(403.7KB)

Evaluating Security of a Simple Interactive Human Identification Scheme
Ryo MIZUTANI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/05/25
Vol. E78-A  No. 5 ; pp. 577-578
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Fall Conference)
Category: 
Keyword: 
authenticationhuman cryptographyhuman interfaceidentificationinformation securitypasswords
 Summary | Full Text:PDF(142.5KB)

A Key Distribution Protocol for Mobile Communication Systems
Choonsik PARK Kaoru KUROSAWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 77-81
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
mobile communicationkey distributionauthenticationlow exponent RSA
 Summary | Full Text:PDF(388.4KB)