Keyword : security analysis


Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model
Xiaoming HU Yinchun YANG Jian WANG Huajie XU Wenan TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 758-761
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographysecurity analysisID-based proxy signaturestandard model
 Summary | Full Text:PDF

Improvement on a Knapsack-Based Probabilistic Encryption Scheme
Baocang WANG Fagen LI Yupu HU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 421-424
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key cryptographyknapsack problemsecurity analysistrapdoor knapsack
 Summary | Full Text:PDF

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
Yong YU Jianbing NI Ying SUN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/08/01
Vol. E96-D  No. 8 ; pp. 1875-1877
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
security analysiswireless sensor networksreprogrammingauthentication
 Summary | Full Text:PDF

A Robust Security Mechanism for Mobile Commerce Transactions
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/11/01
Vol. E93-D  No. 11 ; pp. 2898-2906
Type of Manuscript:  Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
cryptographysecurity analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/04/01
Vol. E92-A  No. 4 ; pp. 1246-1250
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
privacy-preservingk-means clusteringsecurity analysis
 Summary | Full Text:PDF

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
Koji NUIDA Satoshi FUJITSU Manabu HAGIWARA Hideki IMAI Takashi KITAGAWA Kazuto OGAWA Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 197-206
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
fingerprintc-secure codecollusion attacksecurity analysiswatermarkDRM
 Summary | Full Text:PDF

Security Analysis of Yeh-Tsai Security Mechanism
Dae Hyun YUM Jong Hoon SHIN Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1477-1480
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Secure Communication
Keyword: 
security analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF

An Improved Nominative Proxy Signature for Mobile Communication
Jianhong ZHANG Qianhong WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/07/01
Vol. E88-D  No. 7 ; pp. 1697-1699
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
nominative proxy signaturesecurity analysisimproved scheme
 Summary | Full Text:PDF