Keyword : information security


Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation
Young-Su JANG Jin-Young CHOI 
Publication:   
Publication Date: 2018/12/01
Vol. E101-D  No. 12 ; pp. 3005-3018
Type of Manuscript:  PAPER
Category: Software System
Keyword: 
information securitybuffer overflow vulnerabilitysoftware security monitoring
 Summary | Full Text:PDF

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
Lingyun XIANG Xinhui WANG Chunfang YANG Peng LIU 
Publication:   
Publication Date: 2017/02/01
Vol. E100-D  No. 2 ; pp. 313-322
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
information securitylinguistic steganographysynonym substitutionrun-length encodingsteganalysis
 Summary | Full Text:PDF

Blind Compressive Sensing Detection of Watermark Coded by Limited-Random Sequence
Chao ZHANG Jialuo XIAO Yaxin ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1747-1750
Type of Manuscript:  Special Section LETTER (Special Section on Image Media Quality)
Category: 
Keyword: 
limited-random sequencecompressive sensingwatermarkLRScryptographyinformation security
 Summary | Full Text:PDF

A Secure and Efficient Certificateless Aggregate Signature Scheme
He LIU Mangui LIANG Haoliang SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/04/01
Vol. E97-A  No. 4 ; pp. 991-995
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
information securityaggregate signaturecertificateless cryptographyauthentication
 Summary | Full Text:PDF

Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
Mingfu XUE Wei LIU Aiqun HU Youdong WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/03/01
Vol. E97-D  No. 3 ; pp. 606-609
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
information securityhardware securityhardware Trojan detectionunified subspace techniquetime domain constrained estimator
 Summary | Full Text:PDF

Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard
Masahiro KINUGAWA Yu-ichi HAYASHI Takaaki MIZUKI Hideaki SONE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/10/01
Vol. E96-B  No. 10 ; pp. 2633-2638
Type of Manuscript:  PAPER
Category: Electromagnetic Compatibility(EMC)
Keyword: 
EM information leakageintegrated oscillatorinformation securityRC oscillator
 Summary | Full Text:PDF

Data Convertors Design for Optimization of the DDPL Family
Song JIA Li LIU Xiayu LI Fengfeng WU Yuan WANG Ganggang ZHANG 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2013/09/01
Vol. E96-C  No. 9 ; pp. 1195-1200
Type of Manuscript:  PAPER
Category: Electronic Circuits
Keyword: 
convertordifferential power analysis (DPA)information securitydelay-based dual-rail precharge logic (DDPL)low power
 Summary | Full Text:PDF

Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current
Yu-ichi HAYASHI Naofumi HOMMA Takaaki MIZUKI Takeshi SUGAWARA Yoshiki KAYANO Takafumi AOKI Shigeki MINEGISHI Akashi SATOH Hideaki SONE Hiroshi INOUE 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2012/06/01
Vol. E95-C  No. 6 ; pp. 1089-1097
Type of Manuscript:  PAPER
Category: Electronic Components
Keyword: 
information securityelectromagnetic information leakagecryptographic modulesside-channel attackscommon-mode currents
 Summary | Full Text:PDF

Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation
Heejin PARK Dong Kyue KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6 ; pp. 1210-1215
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
safe primesafe prime generationtrial divisionmiller-rabin testcryptographyinformation security
 Summary | Full Text:PDF

Low-Overhead Architecture for Security Tag
Ryota SHIOYA Daewung KIM Kazuo HORIO Masahiro GOSHIMA Shuichi SAKAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/01/01
Vol. E94-D  No. 1 ; pp. 69-78
Type of Manuscript:  PAPER
Category: Computer System
Keyword: 
processor architecturetagged architectureinformation securityinformation flow tracking
 Summary | Full Text:PDF

Time-Bound Hierarchical Key Assignment: An Overview
Wen Tao ZHU Robert H. DENG Jianying ZHOU Feng BAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5 ; pp. 1044-1052
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
information securityaccess controltime-bound hierarchical cryptographic key management
 Summary | Full Text:PDF

Low Cost Design of an Advanced Encryption Standard (AES) Processor Using a New Common-Subexpression-Elimination Algorithm
Ming-Chih CHEN Shen-Fu HSIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3221-3228
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Embedded, Real-Time and Reconfigurable Systems
Keyword: 
AESVLSIcommon subexpression elimination (CSE)information securitylogic synthesis
 Summary | Full Text:PDF

Contourlet Based Adaptive Watermarking for Color Images
Haohao SONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/10/01
Vol. E92-D  No. 10 ; pp. 2171-2174
Type of Manuscript:  LETTER
Category: Image Processing and Video Processing
Keyword: 
contourletimage watermarkinginformation securitywavelet
 Summary | Full Text:PDF

A Cyber-Attack Detection Model Based on Multivariate Analyses
Yuto SAKAI Koichiro RINSAKA Tadashi DOHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7 ; pp. 1585-1592
Type of Manuscript:  Special Section PAPER (Special Section on Recent Advances in Technologies for Assessing System Reliability)
Category: 
Keyword: 
information securitycyber-attackintrusion detectionquantification methodcluster analysis
 Summary | Full Text:PDF

Robust Watermarking of 3D Polygonal Meshes
Han Sae SONG Nam Ik CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1512-1521
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
information securitydigital watermarkingrobust watermarking3D polygonal mesh model
 Summary | Full Text:PDF

A Novel Elliptic Curve Dynamic Access Control System
Jyh-Horng WEN Ming-Chang WU Tzer-Shyong CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/08/01
Vol. E90-B  No. 8 ; pp. 1979-1987
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
elliptic curve cryptosysteminformation securitysecure filteraccess control
 Summary | Full Text:PDF

Constructing a Multilayered Boundary to Defend against Intrusive Anomalies
Zonghua ZHANG Hong SHEN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/02/01
Vol. E90-D  No. 2 ; pp. 490-499
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionanomaly detectioninformation securityPOMDP
 Summary | Full Text:PDF

A Coordinator for Workflow Management Systems with Information Access Control
Shih-Chien CHOU Chien-Jung WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2786-2792
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
workflowworkflow management system (WFMS)coordinationaccess controlinformation securityaccess control list
 Summary | Full Text:PDF

Cryptanalysis of Simple Authenticated Key Agreement Protocols
Chou-Chen YANG Ting-Yi CHANG Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2174-2176
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyinformation securitykey agreementkey exchange
 Summary | Full Text:PDF

Multiparty DSA Signature Generation without Simultaneous User Operations
Yoshiki SAMESHIMA Hideaki SAISHO Kazuko OYANAGI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8 ; pp. 2095-2105
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
threshold multisignatureDigital Signature Algorithmmultiparty protocolcryptographyinformation security
 Summary | Full Text:PDF

Polynomial Representation of a Visual Secret Sharing Scheme and Its Application
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/06/01
Vol. E85-A  No. 6 ; pp. 1379-1386
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
information securityvisual secret sharingpolynomial representation
 Summary | Full Text:PDF

All-or-Nothing Transform Based on a Linear Code
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5 ; pp. 1084-1087
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyinformation securityall-or-nothing transformencryption modelinear code
 Summary | Full Text:PDF

Message Authentication for Stream
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 190-193
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitymessage authenticationstreamhash function
 Summary | Full Text:PDF

Linear Complexity of Kronecker Sequences
Kari H. A. KARKKAINEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/05/01
Vol. E84-A  No. 5 ; pp. 1348-1351
Type of Manuscript:  LETTER
Category: Spread Spectrum Technologies and Applications
Keyword: 
spreading codesinformation securitysynchronization
 Summary | Full Text:PDF

Improvement on the Cheater Identifiable Threshold Scheme
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 957-960
Type of Manuscript:  Special Section LETTER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
information securitysecret sharingauthentication codeerasure decodingcheater
 Summary | Full Text:PDF

A Refined Definition of Semantic Security for Public-Key Encryption Schemes
Hideaki SAKAI Noriko NAKAMURA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/01/01
Vol. E84-D  No. 1 ; pp. 34-39
Type of Manuscript:  Special Section PAPER (Special Issue on Selected Papers from LA Symposium)
Category: 
Keyword: 
chosen-ciphertext attackindistinguishabilityinformation securitychosen-plaintext attackpublic-key encryptionsemantic security
 Summary | Full Text:PDF

New Algorithm for Finding Preimages in a Reduced Version of the MD4 Compression Function
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 97-100
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityhash functionone-way functionMD4
 Summary | Full Text:PDF

Comparison of Performance between AND and Majority Logic Type Nonlinear Feedforward Logic Pseudonoise Sequence Generators
Kari H. A. KARKKAINEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/08/25
Vol. E82-A  No. 8 ; pp. 1641-1647
Type of Manuscript:  PAPER
Category: Spread Spectrum Technologies and Applications
Keyword: 
information securityspreading codestream cipherlinear complexitycorrelation attackspread-spectrum systemcode division multiple access
 Summary | Full Text:PDF

Comment on "On the One-Way Algebraic Homomorphism"
Li XIAOJIE Yi Xian YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 105-105
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signaturecryptologyinformation security
 Summary | Full Text:PDF

Group Cipher System for Intranet Security
Hiromichi ITO Seiichi SUSAKI Masato ARAI Minoru KOIZUMI Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 28-34
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitygroup-oriented ciphersmart cardintranet
 Summary | Full Text:PDF

Linear Complexity of Binary Golay Complementary Sequences
Kari H. A. KARKKAINEN Pentti A. LEPPANEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4 ; pp. 609-613
Type of Manuscript:  PAPER
Category: Spread Spectrum Technologies and Applications
Keyword: 
spread-spectrum techniquespreading codesnon-linear sequencesinformation securitylinear complexity
 Summary | Full Text:PDF

Evaluating Security of a Simple Interactive Human Identification Scheme
Ryo MIZUTANI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/05/25
Vol. E78-A  No. 5 ; pp. 577-578
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Fall Conference)
Category: 
Keyword: 
authenticationhuman cryptographyhuman interfaceidentificationinformation securitypasswords
 Summary | Full Text:PDF

Permutation Cipher Scheme Using Polynomials over a Field
Eiji OKAMOTO Tomohiko UYEMATSU Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1995/02/25
Vol. E78-D  No. 2 ; pp. 138-142
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyinformation securitypermutationReed-Solomon code
 Summary | Full Text:PDF

A New Class of Non-interactive ID-Based Key Sharing Schemes and Its Performances
Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 51-58
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key sharingID informationcommon keycryptosysteminformation security
 Summary | Full Text:PDF

A Simple Method to Control Indirect Information Flows
Satoshi OZAKI Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/11/25
Vol. E77-A  No. 11 ; pp. 1938-1941
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
Category: 
Keyword: 
access controlflow controlinformation flowinformation securityUNIX
 Summary | Full Text:PDF

Shared Pseudo-Random Secret Generation Protocols
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4 ; pp. 636-645
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographypseudo-random number generationsecret sharing schemesnon-interactive secure computation
 Summary | Full Text:PDF

Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4 ; pp. 532-545
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographydigital signaturesmultiparty protocolsnoninteracitve secure computationdiscrete log-based cryptosystems
 Summary | Full Text:PDF

An Access Control Mechanism for Object-Oriented Database Systems
Tadashi ARAKI Tetsuya CHIKARAISHI Thomas HARDJONO Tadashi OHTA Nobuyoshi TERASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 112-121
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityobject-oriented database systemmultilevel access controlsecurity policytrusted computing base
 Summary | Full Text:PDF

Improving the Performance of Enciphered B+-Trees
Thomas HARDJONO Tadashi ARAKI Tetsuya CHIKARAISHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 104-111
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitycryptography
 Summary | Full Text:PDF

Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Tomoyuki ASANO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 88-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitypersonalized telecommunicationcaller authenticationcallee specificationkey predistribution systemcryptography
 Summary | Full Text:PDF