Keyword : security


Rootkit inside GPU Kernel Execution
Ohmin KWON Hyun KWON Hyunsoo YOON 
Publication:   
Publication Date: 2019/11/01
Vol. E102-D  No. 11 ; pp. 2261-2264
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
graphics processing unitsecurityrootkit
 Summary | Full Text:PDF(446.5KB)

Assessing Lightweight Virtualization for Security-as-a-Service at the Network Edge
Abderrahmane BOUDI Ivan FARRIS Miloud BAGAA Tarik TALEB 
Publication:   
Publication Date: 2019/05/01
Vol. E102-B  No. 5 ; pp. 970-977
Type of Manuscript:  INVITED PAPER (Special Section on European ICT R&D Project Activities on Broadband Access Technologies in Conjunction with Main Topics of 2016/2017 IEICE ICT Forum)
Category: 
Keyword: 
NFVsecuritycloud/edge computingIoT
 Summary | Full Text:PDF(1.9MB)

An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal
Hisao OGATA Tomoyoshi ISHIKAWA Norichika MIYAMOTO Tsutomu MATSUMOTO 
Publication:   
Publication Date: 2019/03/01
Vol. E102-D  No. 3 ; pp. 559-567
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
ATMsecuritymalwarecryptographydevice
 Summary | Full Text:PDF(1.5MB)

Resilient Edge: A Scalable, Robust Network Function Backend
Yutaro HAYAKAWA Kenichi YASUKATA Jin NAKAZAWA Michio HONDA 
Publication:   
Publication Date: 2019/03/01
Vol. E102-D  No. 3 ; pp. 550-558
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software switchNFVsecurityoperating system
 Summary | Full Text:PDF(804.2KB)

Security Consideration for Deep Learning-Based Image Forensics
Wei ZHAO Pengpeng YANG Rongrong NI Yao ZHAO Haorui WU 
Publication:   
Publication Date: 2018/12/01
Vol. E101-D  No. 12 ; pp. 3263-3266
Type of Manuscript:  LETTER
Category: Image Recognition, Computer Vision
Keyword: 
image forensicssecuritydeep learningadversarial images
 Summary | Full Text:PDF(1.4MB)

Efficient Approach for Mitigating Mobile Phishing Attacks
Hyungkyu LEE Younho LEE Changho SEO Hyunsoo YOON 
Publication:   
Publication Date: 2018/09/01
Vol. E101-B  No. 9 ; pp. 1982-1996
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
mobile phishingmobile phishing detectionphishing detectionmobile securitysecurity
 Summary | Full Text:PDF(1.8MB)

Synthesis and Enumeration of Generalized Shift Registers for Strongly Secure SR-Equivalents
Hideo FUJIWARA Katsuya FUJIWARA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-D  No. 9 ; pp. 2232-2236
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
design-for-testabilityscan designgeneralized feedback/feed-forward shift registerssecurityscan-based side-channel attack
 Summary | Full Text:PDF(468.4KB)

Incorporating Security Constraints into Mixed-Criticality Real-Time Scheduling
Hyeongboo BAEK Jinkyu LEE 
Publication:   
Publication Date: 2017/09/01
Vol. E100-D  No. 9 ; pp. 2068-2080
Type of Manuscript:  PAPER
Category: Software System
Keyword: 
mixed-criticality systemsecurityreal-time schedulingschedulability analysis
 Summary | Full Text:PDF(701.1KB)

An Overview of Security and Privacy Issues for Internet of Things
Heung Youl YOUM 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8 ; pp. 1649-1662
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
securityprivacythreatsnew work iteminternet of thingsIEEE 802.15standardization direction
 Summary | Full Text:PDF(6.5MB)

Inishing: A UI Phishing Attack to Exploit the Vulnerability of Inotify in Android Smartphones
Woo Hyun AHN Sanghyeon PARK Jaewon OH Seung-Ho LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/09/01
Vol. E99-D  No. 9 ; pp. 2404-2409
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
securityAndroid OSmalwareinotifyphishing attack
 Summary | Full Text:PDF(2.1MB)

Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
Hideo FUJIWARA Katsuya FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2182-2185
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
design-for-testabilityscan designgeneralized feedback/feed-forward shift registerssecurityscan-based side-channel attack
 Summary | Full Text:PDF(399.6KB)

Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems
Hyeongboo BAEK Jaewoo LEE Yongjae LEE Hyunsoo YOON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2121-2130
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
cyber-physical systemsecurityreal-time schedulingschedulability analysis
 Summary | Full Text:PDF(799.9KB)

Behavioral Equivalence of Security-Oriented Interactive Systems
Guanjun LIU Changjun JIANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2061-2068
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
interactive systemslabelled petri netslabelled transition systemsbisimulationsecurity
 Summary | Full Text:PDF(563.6KB)

A Secure RFID Application Revocation Scheme for IoT
Kai FAN Zhao DU Yuanyuan GONG Yue WANG Tongjiang YAN Hui LI Yintang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2027-2035
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
RFIDauthenticationrevocationsecurityIoT
 Summary | Full Text:PDF(612KB)

Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
Remi ANDO Shigeyoshi SHIMA Toshihiko TAKEMURA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 1974-1981
Type of Manuscript:  INVITED PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
IoT (Internet of Things)privacysecuritySEM (Structural Equation Modeling)
 Summary | Full Text:PDF(686.3KB)

Cyber Physical Security for Industrial Control Systems and IoT
Kazukuni KOBARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 787-795
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
securityCyber Physical SystemIndustrial Control SystemIoTM2M
 Summary | Full Text:PDF(1.4MB)

Illegal Interrogation Detectable Products Distribution Scheme in RFID-Enabled Supply Chains
Kentaroh TOYODA Iwao SASASE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/04/01
Vol. E99-B  No. 4 ; pp. 820-829
Type of Manuscript:  Special Section PAPER (Special Section on Autonomous Decentralized Systems Technologies and Applications for Next-Generation Social Infrastructure)
Category: 
Keyword: 
RFID-enabled supply chainssecurityhoneypot
 Summary | Full Text:PDF(660.4KB)

Properties of Generalized Feedback Shift Registers for Secure Scan Design
Hideo FUJIWARA Katsuya FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 1255-1258
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
design-for-testabilityscan designgeneralized feedback/feed-forward shift registerssecurityscan-based side-channel attack
 Summary | Full Text:PDF(395.2KB)

RRT-Based Computation for Dynamic Security Analysis of Power Systems
Qiang WU Yoshihiko SUSUKI T. John KOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/02/01
Vol. E99-A  No. 2 ; pp. 491-501
Type of Manuscript:  Special Section PAPER (Special Section on Mathematical Systems Science and its Applications)
Category: 
Keyword: 
power systemsecurityhybrid automatonreachabilityRRT
 Summary | Full Text:PDF(1MB)

Secure and Efficient Time Synchronization for Border Surveillance Wireless Sensor Networks
Daehee KIM Sangwook KANG Sunshin AN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1 ; pp. 385-401
Type of Manuscript:  PAPER
Category: Mobile Information Network and Personal Communications
Keyword: 
border surveillancesecuritytime synchronizationwireless sensor networks
 Summary | Full Text:PDF(5MB)

Strongly Secure Scan Design Using Generalized Feed Forward Shift Registers
Hideo FUJIWARA Katsuya FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/10/01
Vol. E98-D  No. 10 ; pp. 1852-1855
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
design-for-testabilityscan designgeneralized feed-forward shift registerssecurityscan-based side-channel attack
 Summary | Full Text:PDF(352.9KB)

Partial Encryption Method That Enhances MP3 Security
Twe Ta OO Takao ONOYE Kilho SHIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1760-1768
Type of Manuscript:  PAPER
Category: Digital Signal Processing
Keyword: 
MP3partial encryptionsecurityDRM
 Summary | Full Text:PDF(1.7MB)

An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking
Ryoichi ISAWA Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 883-893
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software packermalwarecode analysisData Execution Prevention (DEP)security
 Summary | Full Text:PDF(637.9KB)

Estimating Korean Residence Registration Numbers from Public Information on SNS
Daeseon CHOI Younho LEE Yongsu PARK Seokhyun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/04/01
Vol. E98-B  No. 4 ; pp. 565-574
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
personal data securitySNS securityKorean residence registration numberdata estimationsecurity
 Summary | Full Text:PDF(2.1MB)

New Directions for a Japanese Academic Backbone Network
Shigeo URUSHIDANI Shunji ABE Kenjiro YAMANAKA Kento AIDA Shigetoshi YOKOYAMA Hiroshi YAMADA Motonori NAKAMURA Kensuke FUKUDA Michihiro KOIBUCHI Shigeki YAMADA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/03/01
Vol. E98-D  No. 3 ; pp. 546-556
Type of Manuscript:  INVITED PAPER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
100-Gigabit EthernetMPLS-TPSDNmulti-layer networksecuritycloud serviceperformance acceleratornetwork monitoring
 Summary | Full Text:PDF(2.8MB)

A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks
Firoz AHMED Seokhoon YOON Hoon OH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/03/01
Vol. E98-B  No. 3 ; pp. 422-436
Type of Manuscript:  PAPER
Category: Network
Keyword: 
AODVsecurityblack hole attackencryptionmobile ad hoc networks
 Summary | Full Text:PDF(2.3MB)

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting
Junghyun NAM Kim-Kwang Raymond CHOO Juryon PAIK Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 424-427
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
securitythree-party key exchangepassword-only authenticated key exchange (PAKE)dictionary attackinsider attack
 Summary | Full Text:PDF(227KB)

Empowering Security and Mobility in Future Networks with an Identity-Based Control Plane
Pedro MARTINEZ-JULIA Antonio F. SKARMETA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2014/12/01
Vol. E97-B  No. 12 ; pp. 2571-2582
Type of Manuscript:  INVITED PAPER (Special Section on Technologies and Architectures for Improving Scalability, Reliability, and Robustness for Future Information Networks)
Category: 
Keyword: 
future networkidentityoverlaysecuritymobility
 Summary | Full Text:PDF(1.6MB)

A Hybrid Trust Management Framework for Wireless Sensor and Actuator Networks in Cyber-Physical Systems
Ruidong LI Jie LI Hitoshi ASAEDA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/10/01
Vol. E97-D  No. 10 ; pp. 2586-2596
Type of Manuscript:  INVITED PAPER (Special Section on Frontiers of Internet of Things)
Category: 
Keyword: 
cyber-physical systemswireless sensor actuator networktrust management frameworksecurity
 Summary | Full Text:PDF(909.8KB)

Data Mining Intrusion Detection in Vehicular Ad Hoc Network
Xiaoyun LIU Gongjun YAN Danda B. RAWAT Shugang DENG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/07/01
Vol. E97-D  No. 7 ; pp. 1719-1726
Type of Manuscript:  Special Section PAPER (Special Section on Cloud and Services Computing)
Category: 
Keyword: 
vehicular networksmobile networksintrusion detectionvehicular ad hoc networksecurity
 Summary | Full Text:PDF(1.8MB)

Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR
Taek-Young YOUN Dowon HONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2014/05/01
Vol. E97-B  No. 5 ; pp. 930-935
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
securityauthenticationdistance bounding protocolfalse acceptance ratedistance fraud attacksmafia fraud attacks
 Summary | Full Text:PDF(478KB)

Evaluations and Analysis of Malware Prevention Methods on Websites
Takeshi YAGI Junichi MURAYAMA Takeo HARIU Hiroyuki OHSAKI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/12/01
Vol. E96-B  No. 12 ; pp. 3091-3100
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
securitywebhoneypotmalwareanti-virusblacklistaccess filtering
 Summary | Full Text:PDF(1.7MB)

Realization of Secure Ambient Wireless Network System Based on Spatially Distributed Ciphering Function
Masashi OKADA Masahide HATANAKA Keiichiro KAGAWA Shinichi MIYAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/11/01
Vol. E96-A  No. 11 ; pp. 2182-2184
Type of Manuscript:  Special Section LETTER (Special Section on Smart Multimedia & Communication Systems)
Category: Mobile Information Network and Personal Communications
Keyword: 
ambient information societycognitive wireless networksecurityspatially distributed ciphering functionIEEE 802.15.4
 Summary | Full Text:PDF(1.3MB)

Deciding Schema k-Secrecy for XML Databases
Chittaphone PHONHARATH Kenji HASHIMOTO Hiroyuki SEKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/06/01
Vol. E96-D  No. 6 ; pp. 1268-1277
Type of Manuscript:  Special Section PAPER (Special Section on Formal Approach)
Category: Static Analysis
Keyword: 
inference attacksecuritystatic analysisXML database
 Summary | Full Text:PDF(656KB)

Generalized Feed Forward Shift Registers and Their Application to Secure Scan Design
Katsuya FUJIWARA Hideo FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/05/01
Vol. E96-D  No. 5 ; pp. 1125-1133
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
design-for-testabilityscan designshift register equivalentsshift register quasi-equivalentsgeneralized feed-forward shift registerssecurityscan-based side-channel attack
 Summary | Full Text:PDF(1.7MB)

Secure and Lightweight Localization Method for Wireless Sensor Networks
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/03/01
Vol. E96-D  No. 3 ; pp. 723-726
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securitywireless sensor networkssecure localizationalgorithms
 Summary | Full Text:PDF(131.1KB)

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
Manabu INUMA Akira OTSUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/02/01
Vol. E96-D  No. 2 ; pp. 357-364
Type of Manuscript:  PAPER
Category: Image Recognition, Computer Vision
Keyword: 
biometricswolf attackwolf attack probabilitymatching algorithmsecurity
 Summary | Full Text:PDF(292.5KB)

Design and Implementation of Security for HIMALIS Architecture of Future Networks
Ved P. KAFLE Ruidong LI Daisuke INOUE Hiroaki HARAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/02/01
Vol. E96-D  No. 2 ; pp. 226-237
Type of Manuscript:  Special Section PAPER (Special Section on The Internet Architectures, Protocols, and Applications for Diversified Futures)
Category: 
Keyword: 
ID/locator split architecturesecuritynew generation networkfuture network
 Summary | Full Text:PDF(2.1MB)

Unilateral Distance Bounding Protocol with Bidirectional Challenges
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/01/01
Vol. E96-D  No. 1 ; pp. 134-137
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
mafia fraud attackdistance boundingauthenticationsecurity
 Summary | Full Text:PDF(82KB)

Anonymous Authentication Scheme without Verification Table for Wireless Environments
Ryoichi ISAWA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2488-2492
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
anonymityauthenticationsecuritywireless communication
 Summary | Full Text:PDF(92.8KB)

Scan-Based Attack on AES through Round Registers and Its Countermeasure
Youhua SHI Nozomu TOGAWA Masao YANAGISAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2338-2346
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: High-Level Synthesis and System-Level Design
Keyword: 
scan-based side channel attackcrypto implementationsecuritytestability
 Summary | Full Text:PDF(2MB)

Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
Jung-Yoon KIM Hyoung-Kee CHOI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/10/01
Vol. E95-D  No. 10 ; pp. 2393-2400
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
network-level security and protectionauthenticationsecuritypassword
 Summary | Full Text:PDF(531KB)

Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1687-1689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisauthenticationanonymitywireless communicationssecurity
 Summary | Full Text:PDF(61.1KB)

Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
You-Seok LEE Young-Jun LEE Dong-Guk HAN Ho-Won KIM Hyoung-Nam KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/06/01
Vol. E95-A  No. 6 ; pp. 1091-1094
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
power analysisside-channel attacksecurity
 Summary | Full Text:PDF(205.9KB)

Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases
Kenji HASHIMOTO Hiroto KAWAI Yasunori ISHIHARA Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/05/01
Vol. E95-D  No. 5 ; pp. 1365-1374
Type of Manuscript:  Special Section PAPER (Special Section on Formal Approach)
Category: Database Security
Keyword: 
XML databaseinference attacksecurityverificationfunctional dependency
 Summary | Full Text:PDF(607.9KB)

Lightweight Distance Bounding Protocol against Relay Attacks
Jin Seok KIM Kookrae CHO Dae Hyun YUM Sung Je HONG Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/04/01
Vol. E95-D  No. 4 ; pp. 1155-1158
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securityauthenticationrelay attackmafia fraud attackdistance bounding protocol
 Summary | Full Text:PDF(72.6KB)

Delay Attack-Resilient Clock Synchronization for Wireless Sensor Networks
Eui-Jik KIM Jeongsik IN Sungkwan YOUM Chul-Hee KANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 188-191
Type of Manuscript:  Special Section LETTER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
time synchronizationsecuritydelay attackwireless sensor networks
 Summary | Full Text:PDF(211.6KB)

A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information
Peidong ZHU Huayang CAO Wenping DENG Kan CHEN Xiaoqiang WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 20-28
Type of Manuscript:  INVITED PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: 
Keyword: 
BGPinter-domain routingtrustworthinesssecurity
 Summary | Full Text:PDF(601.3KB)

Secure and Robust Framework for ID/Locator Mapping System
Pedro MARTINEZ-JULIA Antonio F. GOMEZ-SKARMETA Ved P. KAFLE Masugi INOUE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 108-116
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security
Keyword: 
new generation networkidentitysecurityprivacy
 Summary | Full Text:PDF(790KB)

A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment
Min-Hua SHAO Ying-Chih CHIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 161-168
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
anonymitysingle registrationkey agreementsmart cardsecurity
 Summary | Full Text:PDF(870.1KB)

A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability
Arnau VIVES-GUASCH Maria-Magdalena PAYERAS-CAPELLA Macia MUT-PUIGSERVER Jordi CASTELLA-ROCA Josep-Lluis FERRER-GOMILA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 78-93
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security
Keyword: 
securityprivacyelectronic commercee-commerceelectronic ticketinge-ticketing
 Summary | Full Text:PDF(868.4KB)

JXTAnonym: An Anonymity Layer for JXTA Services Messaging
Marc DOMINGO-PRIETO Joan ARNEDO-MORENO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 169-176
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
peer-to-peersecurityanonymityJXTAJavaonion routing
 Summary | Full Text:PDF(261.6KB)

Differential Behavior Equivalent Classes of Shift Register Equivalents for Secure and Testable Scan Design
Katsuya FUJIWARA Hideo FUJIWARA Hideo TAMAMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/07/01
Vol. E94-D  No. 7 ; pp. 1430-1439
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
design-for-testabilityscan designshift register equivalentssecurityscan-based side-channel attack
 Summary | Full Text:PDF(599.1KB)

A Dynamic Secure Access Mechanism for Wireless Sensor Networks Using Usage Control and Agent Technology
Jun WU Shigeru SHIMAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/06/01
Vol. E94-B  No. 6 ; pp. 1577-1586
Type of Manuscript:  Special Section PAPER (Special Section on New Generation Mobile and Sensor Networking and Future Networks)
Category: 
Keyword: 
wireless sensor networkssecurityusage controlaccess controlauthentication
 Summary | Full Text:PDF(1.5MB)

SAEP: Secure, Accurate and Energy-Efficient Time Synchronization Protocol in WSNs
Kyeong Tae KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/06/01
Vol. E94-B  No. 6 ; pp. 1587-1597
Type of Manuscript:  Special Section PAPER (Special Section on New Generation Mobile and Sensor Networking and Future Networks)
Category: 
Keyword: 
wireless sensor networktime synchronizationsecuritybyzantine failure
 Summary | Full Text:PDF(670.5KB)

Further Improved Remote User Authentication Scheme
Jung-Yoon KIM Hyoung-Kee CHOI John A. COPELAND 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1426-1433
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
network-level security and protectionauthenticationsecuritypassword
 Summary | Full Text:PDF(439.9KB)

Secure Sensor Sharing Framework for Mobile and Sensor Access Platform Network
Ruidong LI Masugi INOUE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/06/01
Vol. E94-B  No. 6 ; pp. 1565-1576
Type of Manuscript:  Special Section PAPER (Special Section on New Generation Mobile and Sensor Networking and Future Networks)
Category: 
Keyword: 
NWGNregional networknervenetsensorsecurity
 Summary | Full Text:PDF(900.7KB)

Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme
Takeshi YAGI Naoto TANIMOTO Takeo HARIU Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/05/01
Vol. E94-B  No. 5 ; pp. 1339-1347
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
securitywebhoneypotattackURL conversion
 Summary | Full Text:PDF(641.7KB)

Survey of Network Coding and Its Applications
Takahiro MATSUDA Taku NOGUCHI Tetsuya TAKINE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/03/01
Vol. E94-B  No. 3 ; pp. 698-717
Type of Manuscript:  INVITED SURVEY PAPER
Category: 
Keyword: 
network codingdesign problemthroughput/capacity enhancementrobustness enhancementnetwork tomographysecurity
 Summary | Full Text:PDF(1.1MB)

Towards a UML Extension of Reusable Secure Use Cases for Mobile Grid Systems
David G. ROSADO Eduardo FERNANDEZ-MEDINA Javier LOPEZ 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/02/01
Vol. E94-D  No. 2 ; pp. 243-254
Type of Manuscript:  PAPER
Category: Fundamentals of Information Systems
Keyword: 
securitysecurity use casessecure developmentsecure mobile gridreusability
 Summary | Full Text:PDF(4.5MB)

Trust Management of Grid System Embedded with Resource Management System
Sherihan ABU ELENIN Masato KITAKAMI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/01/01
Vol. E94-D  No. 1 ; pp. 42-50
Type of Manuscript:  PAPER
Category: Computer System
Keyword: 
Grid computingsecuritytrust modelresource management system
 Summary | Full Text:PDF(242.2KB)

Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks
Eitaro KOHNO Tomoyuki OHTA Yoshiaki KAKUDA Masaki AIDA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/01/01
Vol. E94-D  No. 1 ; pp. 19-26
Type of Manuscript:  Special Section PAPER (IEICE/IEEE Joint Special Section on Autonomous Decentralized Systems Technologies and Their Application to Networked Systems)
Category: Assurance
Keyword: 
wireless sensor networkssecuritynode capture attacksecret sharing schemekey refreshment
 Summary | Full Text:PDF(452.7KB)

Scan-Based Side-Channel Attack against RSA Cryptosystems Using Scan Signatures
Ryuta NARA Kei SATOH Masao YANAGISAWA Tatsuo OHTSUKI Nozomu TOGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/12/01
Vol. E93-A  No. 12 ; pp. 2481-2489
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Logic Synthesis, Test and Verification
Keyword: 
scan-based side-channel attackscan pathtestabilitycryptosystemRSAsecurity
 Summary | Full Text:PDF(1.2MB)

Improvement of the Efficient Secret Broadcast Scheme
Eun-Jun YOON Muhammad KHURRAM KHAN Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/12/01
Vol. E93-D  No. 12 ; pp. 3396-3399
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
broadcasting networksecret broadcastbinding encryptionmessage consistencysecurity
 Summary | Full Text:PDF(132.3KB)

Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
Eun-Jun YOON Muhammad Khurram KHAN Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/12/01
Vol. E93-D  No. 12 ; pp. 3400-3402
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
handover authenticationchameleon hashingsecurityforward/backward secrecy
 Summary | Full Text:PDF(291.9KB)

A Key Establishment Protocol for RFID User in IPTV Environment
Yoon-Su JEONG Yong-Tae KIM Jae-Min SOHN Gil-Cheol PARK Sang-Ho LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/09/01
Vol. E93-B  No. 9 ; pp. 2407-2415
Type of Manuscript:  PAPER
Category: Terrestrial Wireless Communication/Broadcasting Technologies
Keyword: 
IPTVRFIDauthentication protocolsecurityaccess control
 Summary | Full Text:PDF(747.1KB)

A Biometric Authenticated Key Agreement Protocol for Secure Token
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/08/01
Vol. E93-D  No. 8 ; pp. 2311-2315
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
biometrictokenauthenticationpasswordsecurity
 Summary | Full Text:PDF(238KB)

Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network
Meng GE Kwok-Yan LAM Jianbin LI Siu-Leung CHUNG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7 ; pp. 1848-1856
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
securityavailabilityad hoc networkskey managementcertificate authority
 Summary | Full Text:PDF(432.6KB)

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
Takeshi YAGI Naoto TANIMOTO Takeo HARIU Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1122-1130
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
securitywebvulnerabilityapplicationmalware
 Summary | Full Text:PDF(877.3KB)

Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network
Taeshik SHON Eui-jik KIM Jeongsik IN Yongsuk PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/04/01
Vol. E93-B  No. 4 ; pp. 1016-1019
Type of Manuscript:  LETTER
Category: Network
Keyword: 
IEEE 802.15.4securityenergy consumptionreliabilitywireless sensor network
 Summary | Full Text:PDF(615.3KB)

A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks
Song GUO An-Ni SHEN Minyi GUO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 421-429
Type of Manuscript:  INVITED PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
key managementgroup rekeyinghierarchical wireless sensor networksecurity
 Summary | Full Text:PDF(287.3KB)

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard
Pedro PERIS-LOPEZ Tieyan LI Julio C. HERNANDEZ-CASTRO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 518-527
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
RFIDsecurityEPC Class-1 Gen-2 standardauthenticationlightweight cryptographic primitives
 Summary | Full Text:PDF(357KB)

LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network
Xiaofeng LU Pan HUI Don TOWSLEY Juhua PU Zhang XIONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 503-509
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
location privacyanonymous routinganti-localizationsecurityDTN
 Summary | Full Text:PDF(375.2KB)

High-Speed Passphrase Search System for PGP
Koichi SHIMIZU Daisuke SUZUKI Toyohiro TSURUMARU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 202-209
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
passphrasesearchFPGAPGPsecurity
 Summary | Full Text:PDF(599.6KB)

A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
Sanghan LEE Hae-Yong YANG Yongjin YEOM Jongsik PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 194-201
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
battery backup SRAM (BB-SRAM)cryptographic SoCIPTVkey protectionsecurity
 Summary | Full Text:PDF(788.1KB)

A Scan-Based Attack Based on Discriminators for AES Cryptosystems
Ryuta NARA Nozomu TOGAWA Masao YANAGISAWA Tatsuo OHTSUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3229-3237
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Embedded, Real-Time and Reconfigurable Systems
Keyword: 
scan-based attackside-channel attackscan chaintestabilitysecuritycryptographyAES
 Summary | Full Text:PDF(1.2MB)

Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
Taek-Young YOUN Young-Ho PARK Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/12/01
Vol. E92-D  No. 12 ; pp. 2520-2523
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
securitytrapdoor commitmentkey exposure freenessstrong trapdoor openinginteger factoring problem
 Summary | Full Text:PDF(89.1KB)

A Robust Secure Cooperative Spectrum Sensing Scheme Based on Evidence Theory and Robust Statistics in Cognitive Radio
Nhan NGUYEN-THANH Insoo KOO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/12/01
Vol. E92-B  No. 12 ; pp. 3644-3652
Type of Manuscript:  Special Section PAPER (Special Section on Dynamic Spectrum Access)
Category: Spectrum Sensing
Keyword: 
cognitive radiospectrum sensingcooperativesecuritymalicious userrobust statistics
 Summary | Full Text:PDF(757.9KB)

Modeling Security Bridge Certificate Authority Architecture
Yizhi REN Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6 ; pp. 1544-1547
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
PKIbridge certificate authoritysecurity
 Summary | Full Text:PDF(408.2KB)

Robust Node Positioning in Wireless Sensor Networks
Ayong YE Jianfeng MA Xiaohong JIANG Susumu HORIGUCHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/06/01
Vol. E92-B  No. 6 ; pp. 2023-2031
Type of Manuscript:  PAPER
Category: Network
Keyword: 
wireless sensor networksnode localizationsecurity
 Summary | Full Text:PDF(650.6KB)

Development of Single Sign-On System with Hardware Token and Key Management Server
Daiki NOBAYASHI Yutaka NAKAMURA Takeshi IKENAGA Yoshiaki HORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 826-835
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication and Authorization Techniques
Keyword: 
single sign-onhardware tokenkey management serverauthenticationsecurity
 Summary | Full Text:PDF(795.9KB)

Verification of the Security against Inference Attacks on XML Databases
Kenji HASHIMOTO Kimihide SAKANO Fumikazu TAKASUKA Yasunori ISHIHARA Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 1022-1032
Type of Manuscript:  Special Section PAPER (Special Section on Formal Approach)
Category: Security
Keyword: 
XML databaseinference attacksecurityverification
 Summary | Full Text:PDF(814.8KB)

Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
Yoonjeong KIM SeongYong OHM Kang YI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/03/01
Vol. E92-D  No. 3 ; pp. 545-547
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographysecuritysecurity of data
 Summary | Full Text:PDF(166.4KB)

A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks
Chang Wu YU Tung-Kuang WU Rei-Heng CHENG Kun-Ming YU Shun Chao CHANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/02/01
Vol. E92-B  No. 2 ; pp. 483-490
Type of Manuscript:  PAPER
Category: Network
Keyword: 
ad hoc networksblack holewireless networkssecurity
 Summary | Full Text:PDF(1.6MB)

SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
LeXuan HUNG Sungyoung LEE Young-Koo LEE Heejo LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/01/01
Vol. E92-B  No. 1 ; pp. 131-142
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
sensor networkssink mobilityroutingsecuritysecure routing
 Summary | Full Text:PDF(440.4KB)

Distributed Computing Software Building-Blocks for Ubiquitous Computing Societies
K.H. (Kane) KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/09/01
Vol. E91-D  No. 9 ; pp. 2233-2242
Type of Manuscript:  INVITED PAPER (IEICE/IEEE Joint Special Section on Autonomous Decentralized Systems Theories and Application Deployments)
Category: 
Keyword: 
distributed computingubiquitous computingsoftware engineeringbuilding-blockreal timeautonomyobjectclasscomponentglobal timefault tolerancesecuritymobile agentweb service component
 Summary | Full Text:PDF(601.2KB)

Tracing Stored Program Counter to Detect Polymorphic Shellcode
Daewon KIM Ikkyun KIM Jintae OH Jongsoo JANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/08/01
Vol. E91-D  No. 8 ; pp. 2192-2195
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
networksecurityshellcodepolymorphism
 Summary | Full Text:PDF(344.4KB)

Efficient ID-Based Threshold Random Key Pre-Distribution Scheme for Wireless Sensor Networks
Tran Thanh DAI Choong Seon HONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/08/01
Vol. E91-B  No. 8 ; pp. 2602-2609
Type of Manuscript:  PAPER
Category: Network
Keyword: 
ID-basedrandom key pre-distributionkey agreementthresholdsecuritywireless sensor networks
 Summary | Full Text:PDF(397.5KB)

Safe and Secure Services Based on NGN
Tomoo FUKAZAWA Takemi NISASE Masahisa KAWASHIMA Takeo HARIU Yoshihito OSHIMA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1226-1233
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
NGNsecurityauthenticationstandard
 Summary | Full Text:PDF(1.1MB)

Toward a Scalable Visualization System for Network Traffic Monitoring
Erwan LE MALECOT Masayoshi KOHARA Yoshiaki HORI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1300-1310
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
visualizationinteractivitynetworkmonitoringsecurity
 Summary | Full Text:PDF(1.1MB)

Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication
Davar PISHVA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1369-1379
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Biometrics
Keyword: 
aliveness detectionsecurityauthenticationmulti-factor authenticationbiometricsspectral biometrics
 Summary | Full Text:PDF(1MB)

Random Visitor: Defense against Identity Attacks in P2P Networks
Jabeom GU Jaehoon NAH Hyeokchan KWON Jongsoo JANG Sehyun PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/04/01
Vol. E91-D  No. 4 ; pp. 1058-1073
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
peer-to-peeroverlay networksecurityidentifier authenticationrandom visitoridentity-based cryptography
 Summary | Full Text:PDF(1.1MB)

A Palmprint Recognition Algorithm Using Phase-Only Correlation
Koichi ITO Takafumi AOKI Hiroshi NAKAJIMA Koji KOBAYASHI Tatsuo HIGUCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/04/01
Vol. E91-A  No. 4 ; pp. 1023-1030
Type of Manuscript:  Special Section PAPER (Special Section on Selected Papers from the 20th Workshop on Circuits and Systems in Karuizawa)
Category: 
Keyword: 
biometricspalmprint recognitionsecurityimage recognitionphase-only correlation
 Summary | Full Text:PDF(2.9MB)

A Secure Test Technique for Pipelined Advanced Encryption Standard
Youhua SHI Nozomu TOGAWA Masao YANAGISAWA Tatsuo OHTSUKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/03/01
Vol. E91-D  No. 3 ; pp. 776-780
Type of Manuscript:  Special Section LETTER (Special Section on Test and Verification of VLSIs)
Category: 
Keyword: 
scan testsecuritytest quality
 Summary | Full Text:PDF(145.8KB)

A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification
Mohammad Mesbah UDDIN Yasunobu NOHARA Daisuke IKEDA Hiroto YASUURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 229-235
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
smart cardscryptographic protocols for smart cardsmulti-application smart cardssecurityauthentication
 Summary | Full Text:PDF(737.7KB)

Classification of Hash Functions Suitable for Real-Life Systems
Yasumasa HIRAI Takashi KUROKAWA Shin'ichiro MATSUO Hidema TANAKA Akihiro YAMAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 64-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
securityhash function
 Summary | Full Text:PDF(290.5KB)

Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy
Wonjoon CHOI Myungchul YOON Byeong-hee ROH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/01/01
Vol. E91-B  No. 1 ; pp. 172-182
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
RFIDbackward channelsecurityprivacytree-walking algorithm
 Summary | Full Text:PDF(652KB)

Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks
Hae Young LEE Tae Ho CHO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/12/01
Vol. E90-B  No. 12 ; pp. 3346-3353
Type of Manuscript:  Special Section PAPER (Special Section on Ubiquitous Sensor Networks)
Category: 
Keyword: 
sensor networkssecurityfuzzy logicnode compromisingfalse data filtering
 Summary | Full Text:PDF(994.6KB)

A Context-Aware Seamless Interoperator Roaming Management Framework in 4G Networks
Minsoo LEE Sehyun PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/11/01
Vol. E90-B  No. 11 ; pp. 3015-3023
Type of Manuscript:  Special Section PAPER (Special Section on Next Generation Network Management)
Category: 
Keyword: 
4Gcontext-awareinterworkingmobility managementroamingsecurityubiquitous computing
 Summary | Full Text:PDF(2.1MB)

Secure Route Discovery Protocol for Ad Hoc Networks
YoungHo PARK Hwangjun SONG KyungKeun LEE CheolSoo KIM SangGon LEE SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/02/01
Vol. E90-A  No. 2 ; pp. 539-541
Type of Manuscript:  LETTER
Category: Mobile Information Network and Personal Communications
Keyword: 
ad hoc networkroute discovery protocolsecurityauthentication
 Summary | Full Text:PDF(56.7KB)

Return Address Protection on Cache Memories
Koji INOUE 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2006/12/01
Vol. E89-C  No. 12 ; pp. 1937-1947
Type of Manuscript:  PAPER
Category: Integrated Electronics
Keyword: 
low energysecuritycachebuffer overflowstack smashing
 Summary | Full Text:PDF(1.6MB)

Implementing a Secure Autonomous Bootstrap Mechanism for Control Networks
Nobuo OKABE Shoichi SAKANE Kazunori MIYAZAWA Ken'ichi KAMADA Masahiro ISHIYAMA Atsushi INOUE Hiroshi ESAKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/12/01
Vol. E89-D  No. 12 ; pp. 2822-2830
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet IV)
Category: 
Keyword: 
control networkssecurityauto-configuration
 Summary | Full Text:PDF(585KB)

Securing Mobile Commerce Transactions
Tzu-Chang YEH Shih-Chang TSAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/09/01
Vol. E89-B  No. 9 ; pp. 2608-2611
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
mobile commercesecurityauthentication
 Summary | Full Text:PDF(179.3KB)

A Survey on Identity Management Protocols and Standards
Teruko MIYATA Yuzo KOGA Paul MADSEN Shin-ichi ADACHI Yoshitsugu TSUCHIYA Yasuhisa SAKAMOTO Kenji TAKAHASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1 ; pp. 112-123
Type of Manuscript:  INVITED SURVEY PAPER
Category: 
Keyword: 
identityfederationpseudonymsecurityprivacyauthentication
 Summary | Full Text:PDF(1.6MB)

Improvement of One-Time Password Authentication Scheme Using Smart Cards
Narn-Yih LEE Jung-Chic CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/09/01
Vol. E88-B  No. 9 ; pp. 3765-3767
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographysecurityone-time passworduser authenticationsmart card
 Summary | Full Text:PDF(61.5KB)

An RBAC-Based Access Control Model for Object-Oriented Systems Offering Dynamic Aspect Features
Shih-Chien CHOU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/09/01
Vol. E88-D  No. 9 ; pp. 2143-2147
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
access controlsecurityrole-based access control (RBAC)object-oriented system
 Summary | Full Text:PDF(314.8KB)

Access Control for Security and Privacy in Ubiquitous Computing Environments
Shigeki YAMADA Eiji KAMIOKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/03/01
Vol. E88-B  No. 3 ; pp. 846-856
Type of Manuscript:  INVITED PAPER (Special Section on Ubiquitous Networks)
Category: 
Keyword: 
ubiquitous computingaccess controlsecurityprivacycontexttrust
 Summary | Full Text:PDF(1015.8KB)

Secure Access of Products in a Process Environment
Shih-Chien CHOU Chia-Wei LAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/02/01
Vol. E88-D  No. 2 ; pp. 197-203
Type of Manuscript:  PAPER
Category: Software Engineering
Keyword: 
software processprocess-centered software engineering environment (PSEE)access controlaccess control listsecurity
 Summary | Full Text:PDF(141.7KB)

Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards
Eun-Jun YOON Eun-Kyung RYU Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 319-321
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypasswordauthenticationsecuritysmart card
 Summary | Full Text:PDF(63.4KB)

Security Notes on Generalization of Threshold Signature and Authenticated Encryption
Shuhong WANG Guilin WANG Feng BAO Jie WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/12/01
Vol. E87-A  No. 12 ; pp. 3443-3446
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
digital signaturethreshold signatureauthenticated encryptionsecuritycryptography
 Summary | Full Text:PDF(91.2KB)

A Group Key Management Scheme Using Core Based Tree and Height Balanced Tree
Taenam CHO Sang-Ho LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/10/01
Vol. E87-D  No. 10 ; pp. 2329-2338
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
group key managementsecuritymulticastCBT
 Summary | Full Text:PDF(1.1MB)

Performance Improvement Scheme for Chaotic Synchronization Based Multiplex Communication Systems
Kazuhiko NAKAMURA Teruyuki MIYAJIMA Kazuo YAMANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/09/01
Vol. E87-A  No. 9 ; pp. 2292-2300
Type of Manuscript:  Special Section PAPER (Special Section on Nonlinear Theory and its Applications)
Category: 
Keyword: 
chaotic communicationschaotic synchronizationsecuritymultiplex communicationgeneralized inverse
 Summary | Full Text:PDF(577KB)

On-Board Automatic Certification System for Software Defined Radio
Kazuyuki OKUIKE Ryuji KOHNO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2002-2009
Type of Manuscript:  Special Section PAPER (Special Section on Digital Signal Processing)
Category: Signal Processing for Communications
Keyword: 
software defined radiotype approvalsecurity
 Summary | Full Text:PDF(862.3KB)

A Framework for One-Round Mobile Agent Transaction
Chi-Chao CHANG Narn-Yih LEE Tzonelih HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/07/01
Vol. E87-B  No. 7 ; pp. 1883-1889
Type of Manuscript:  Special Section PAPER (Special Section on Next Generation Networks Software)
Category: Security Issues
Keyword: 
mobile agent systemselectronic commercesecurityundetachable signatures
 Summary | Full Text:PDF(190.8KB)

Orthogonal Transformation to Enhance the Security of the Still Image Watermarking System
Guo-rui FENG Ling-ge JIANG Chen HE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/04/01
Vol. E87-A  No. 4 ; pp. 949-951
Type of Manuscript:  LETTER
Category: Digital Signal Processing
Keyword: 
watermarkingsecuritychaotic sequenceorthonormalization
 Summary | Full Text:PDF(288.9KB)

Comment on Traceability Analysis on Chaum Blind Signature Scheme
Narn-Yih LEE Chien-Nan WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/02/01
Vol. E87-A  No. 2 ; pp. 511-512
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyblind signaturedigital signatureuntraceabilitysecurity
 Summary | Full Text:PDF(52.1KB)

A Distributed Sign-and-Encryption for Anonymity
DongJin KWAK SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 228-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritysignaturegroup signaturesigncryptionanonymity
 Summary | Full Text:PDF(131.7KB)

Sufficient Conditions for Update Operations on Object-Oriented Databases to Preserve the Security against Inference Attacks
Yasunori ISHIHARA Kengo MORI Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/10/01
Vol. E86-D  No. 10 ; pp. 2187-2197
Type of Manuscript:  PAPER
Category: Databases
Keyword: 
object-oriented databaseauthorizationinference attacksecurityincremental checking
 Summary | Full Text:PDF(337.6KB)

Secure Distributed Configuration Management with Randomised Scheduling of System-Administration Tasks
Frode EIKA SANDNES 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/09/01
Vol. E86-D  No. 9 ; pp. 1601-1610
Type of Manuscript:  Special Section PAPER (Special Issue on Parallel and Distributed Computing, Applications and Technologies)
Category: Algorithms and Applications
Keyword: 
securitydistributed managementschedulingsystem administration
 Summary | Full Text:PDF(379.1KB)

An Untraceable Blind Signature Scheme
Min-Shiang HWANG Cheng-Chi LEE Yan-Chi LAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/07/01
Vol. E86-A  No. 7 ; pp. 1902-1906
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
blind signaturescryptographyuntraceabilitysecurity
 Summary | Full Text:PDF(257.2KB)

Security Enhancement for Protecting Password Transmission
Chou-Chen YANG Ting-Yi CHANG Jian-Wei LI Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/07/01
Vol. E86-B  No. 7 ; pp. 2178-2181
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationcryptographypasswordsecurity
 Summary | Full Text:PDF(118.2KB)

A Secure Multisignature Scheme with Signing Order Verifiability
Mitsuru TADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 73-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
multisignature schemesigning orderorder-specified multisignature schemeseries-parallel graphsecurity
 Summary | Full Text:PDF(430.8KB)

Robust Digital Signature Scheme with Subliminal Channels
Narn-Yih LEE Dai-Rui LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 187-188
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritydigital signaturesubliminal channel
 Summary | Full Text:PDF(103.3KB)

Interoperability and Regulatory Issues around Software Defined Radio (SDR) Implementation
Yasuo SUZUKI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/12/01
Vol. E85-B  No. 12 ; pp. 2564-2572
Type of Manuscript:  INVITED PAPER (Special Issue on Software Defined Radio Technology and Its Applications)
Category: 
Keyword: 
interoperabilityregulationstandardizationsecuritycertification
 Summary | Full Text:PDF(931.1KB)

Security Issues for Software Defined Radio: Design of a Secure Download System
Lachlan B. MICHAEL Miodrag J. MIHALJEVIC Shinichiro HARUYAMA Ryuji KOHNO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/12/01
Vol. E85-B  No. 12 ; pp. 2588-2600
Type of Manuscript:  Special Section PAPER (Special Issue on Software Defined Radio Technology and Its Applications)
Category: 
Keyword: 
software defined radio (SDR)securityencryptionauthentification
 Summary | Full Text:PDF(949.8KB)

Secure Download System Based on Software Defined Radio Composed of FPGAs
Hironori UCHIKAWA Kenta UMEBAYASHI Ryuji KOHNO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/12/01
Vol. E85-B  No. 12 ; pp. 2601-2609
Type of Manuscript:  Special Section PAPER (Special Issue on Software Defined Radio Technology and Its Applications)
Category: 
Keyword: 
downloadsecurityfield programmable gate array (FPGA)software defined radio (SDR)
 Summary | Full Text:PDF(717.5KB)

The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10 ; pp. 2364-2367
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographythreshold signaturegroup-oriented cryptographyauthenticated encryptionsecurity
 Summary | Full Text:PDF(138.1KB)

Hybrid Networked Cryptographic Devices in Practice
Taekyoung KWON Sang-Youn LEE Young-Sik CHOI Haekwang KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/09/01
Vol. E85-B  No. 9 ; pp. 1832-1834
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
securitypublic key infrastructurenetworked cryptographic devicePKCS#5
 Summary | Full Text:PDF(127.3KB)

Improvement on Peyravian-Zunic's Password Authentication Schemes
Jing-Jang HWANG Tzu-Chang YEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/04/01
Vol. E85-B  No. 4 ; pp. 823-825
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationpasswordsecurity
 Summary | Full Text:PDF(104.7KB)

A Fast Finite Field Multiplier Architecture for High-Security Elliptic Curve Cryptosystems
Sangook MOON Yong Joo LEE Jae Min PARK Byung In MOON Yong Surk LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D  No. 2 ; pp. 418-420
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
finite field multiplierelliptic curve cryptographysecurityVLSI
 Summary | Full Text:PDF(185KB)

An Experimental Study on IPSec
Katsuji TSUKAMOTO Masaaki MATSUSHIMA Kazuhiko MATSUKI Yusuke TAKANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 175-180
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
IPSecPKIsecurityinteroperability
 Summary | Full Text:PDF(1.2MB)

Biometrics Systems: Anatomy of Performance
Anil JAIN Sharath PANKANTI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/07/01
Vol. E84-D  No. 7 ; pp. 788-799
Type of Manuscript:  Special Section PAPER (Special Issue on Biometric Person Authentication)
Category: 
Keyword: 
biometricsidentity theftperformance evaluationperson identificationsecurity
 Summary | Full Text:PDF(5.8MB)

Simple and Secure Coin (SAS-Coin)--A Practical Micropayment System
Manjula SANDIRIGAMA Akihiro SHIMIZU Matu-Tarow NODA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A  No. 12 ; pp. 2679-2688
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functionssecuritySAS password authenticationmicropayment schemes
 Summary | Full Text:PDF(387.7KB)

A Study on the Generalized Key Agreement and Password Authentication Protocol
Taekyoung KWON Jooseok SONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/09/25
Vol. E83-B  No. 9 ; pp. 2044-2050
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
securitykey agreementpassword authenticationdiscrete logarithm problem
 Summary | Full Text:PDF(293.9KB)

Simple and Secure Password Authentication Protocol (SAS)
Manjula SANDIRIGAMA Akihiro SHIMIZU Matu-Tarow NODA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/06/25
Vol. E83-B  No. 6 ; pp. 1363-1365
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographyhash functionspassword authenticationsecurityone time password
 Summary | Full Text:PDF(396.2KB)

Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks
Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/05/25
Vol. E83-D  No. 5 ; pp. 972-979
Type of Manuscript:  Special Section PAPER (Special Issue on Next Generation Internet Technologies and Their Applications)
Category: 
Keyword: 
InternetsecurityIKEDenial-of-ServiceCookie
 Summary | Full Text:PDF(409.8KB)

An Electronic Soccer Lottery System that Uses Bit Commitment
Kunio KOBAYASHI Hikaru MORITA Mitsuari HAKUTA Takanori NAKANOWATARI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/05/25
Vol. E83-D  No. 5 ; pp. 980-987
Type of Manuscript:  Special Section PAPER (Special Issue on Next Generation Internet Technologies and Their Applications)
Category: 
Keyword: 
soccer lotterysecuritybit commitmenthash functiondigital signaturebulletin board
 Summary | Full Text:PDF(594.4KB)

Protection and Interoperability for Mobile Agents: A Secure and Open Programming Environment
Paolo BELLAVISTA Antonio CORRADI Cesare STEFANELLI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/05/25
Vol. E83-B  No. 5 ; pp. 961-972
Type of Manuscript:  Special Section PAPER (IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems)
Category: Mobile Agents
Keyword: 
mobile agentssecurityinteroperabilityCORBAnetwork and systems management
 Summary | Full Text:PDF(830.3KB)

Secure Multi-Party Computation over Networks
Yasuaki NISHITANI Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/03/25
Vol. E83-D  No. 3 ; pp. 561-569
Type of Manuscript:  INVITED SURVEY PAPER
Category: Parallel and Distributed Algorithms
Keyword: 
securitysecure protocolsmulti-party computationcryptography
 Summary | Full Text:PDF(325.1KB)

An Improvement of the Password-Based Authentication Protocol (K1P) on Security against Replay Attacks
Taekyoung KWON Myeongho KANG Sangjoon JUNG Jooseok SONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1999/07/25
Vol. E82-B  No. 7 ; pp. 991-997
Type of Manuscript:  PAPER
Category: Communication Networks and Services
Keyword: 
securityauthenticationauthentication protocolreplay attackguessing attack
 Summary | Full Text:PDF(414.5KB)

Nomadic Computing Environment Employing Wired and Wireless Networks
Toshiaki TANAKA Masahiro MORIKURA Hitoshi TAKANASHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1998/08/25
Vol. E81-B  No. 8 ; pp. 1565-1573
Type of Manuscript:  INVITED PAPER (Special Issue on Multimedia Communications in Heterogeneous Network Environments)
Category: 
Keyword: 
LANwireless LANmobile computinghand offsecurityMAC
 Summary | Full Text:PDF(868KB)

A Password Authentication Method for Contents Communications on the Internet
Akihiro SHIMIZU Tsutomu HORIOKA Hirohito INAGAKI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1998/08/25
Vol. E81-B  No. 8 ; pp. 1666-1673
Type of Manuscript:  PAPER
Category: Communication Networks and Services
Keyword: 
password authenticationonetime passwordsecuritycryptosystemFEALPERM
 Summary | Full Text:PDF(692.6KB)

Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets
Taekyoung KWON Jooseok SONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 156-163
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
securitykey exchangeauthenticationguessing attackone-time padone-way hash function
 Summary | Full Text:PDF(707.8KB)

User Authentication in Mobile Computing Environment
Akio TAKUBO Mutsumi ISHIKAWA Takashi WATANABE Masakazu SOGA Tadanori MIZUNO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/07/25
Vol. E80-A  No. 7 ; pp. 1288-1298
Type of Manuscript:  Special Section PAPER (Special Section on Multi-dimensional Mobile Information Network)
Category: 
Keyword: 
mobile computingauthenticationsecurityprotocolcryptography
 Summary | Full Text:PDF(898.2KB)

On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis
Kouichi SAKURAI Yuliang ZHENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 19-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptographyData Encryption Standarddifferential cryptanalysislinear cryptanalysispseudorandom permutationsecuritysecret-key block cipher
 Summary | Full Text:PDF(580.7KB)

Information Leakage Measurement in a Distributed Computation Protocol
Shin-ichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 59-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
server-aided secure computationRSAinformation theorysecuritycryptography
 Summary | Full Text:PDF(519.1KB)

An Electronic Retail Payment System with Distributed Control--A Conceptual Design--
Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 67-76
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic paymentfunds transfercashwalletcardcryptographysecurity
 Summary | Full Text:PDF(788.2KB)

The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications
Yuliang ZHENG Thomas HARDJONO Josef PIEPRZYK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 4-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
informationsecuritycryptography
 Summary | Full Text:PDF(983.9KB)