検索
  
[
english page
] [
top page
]
2005
Journal
Hyung-Chan KIM R.S. RAMAKRISHNA Kouichi SAKURAI,
"
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment
",
IEICE Transactions, Vol.E88-A No.1, pp.270-279 PAPER, Jan. 2005
Wook SHIN Jeong-Gun LEE Hong Kook KIM Kouichi SAKURAI,
"
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling
",
IEICE Transactions, Vol.E88-A No.1, pp.327-330 LETTER, Jan. 2005
Satoshi KOGA, Kouichi SAKURAI,
"
Proposal and Analysis of Distributed Online Certificate Status Protocol with Low Communication Cost
",
IEICE Transactions, Vol.E88-A No.1, pp.247-254, Jan. 2005
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee and Kouichi Sakurai,
"
PGV Style Block-Cipher-Based Hash Families and Black Box Analysis
",
IEICE Transactions, Vol.E88-A No.1, pp.39-48, Jan. 2005
鑪講平,田端利宏,櫻井幸一,
"
システムコールに基づく異常検知システムの設計と評価
",
情報処理学会論文誌Vol.46 No.8, pp.1967-1975
岩永学,田端利宏,櫻井幸一,
"
ベイジアンフィルタリングを用いた迷惑メール対策における多言語環境でのコーパス分離手法の提案と評価
",
情報処理学会論文誌Vol.46 No.8, pp.1959-1966
福島和英,田端利宏,田中俊昭,櫻井幸一,
"
クラス構造変換手法を用いたJavaプログラムへの利用者識別情報の埋め込み手法
",
情報処理学会論文誌Vol.46 No.8, pp.2042-2052
Junichiro SAITO, Kouichi SAKURAI,
"
A Survey on Cryptographic Techniques for RFID privacy
",
Korea Information Processing Society Review, Vol.12, No5, Sep. 2005.
Yasuyuki SAKAI, Kouichi SAKURAI,
"
On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks
",
IEICE Transactions, Vol.E88-A No.1, pp.154-160, Jan. 2005
田端 利宏, 末安 克也, 櫻井 幸一,
"
設定ツールによるSELinuxアクセスパーミッション統合の安全性評価
",
情報処理学会論文誌Vol.46 No.8, pp.1070-1073
Dong-Guk HAN , Tetsuya IZU, Jongin LIM, Kouichi SAKURAI,
"
Side Channel Cryptanalysis on XTR Public Key Cryptosystem
",
IEICE Transactions, Vol.E88-A No.5, pp.1214-1223, May. 2005
Shinsaku KIYOMOTO, Toshiaki TANAKA, Kouichi SAKURAI,
"
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers
",
IEICE Transactions, Vol.E88-A No.10, pp.2778-2791, May. 2005
[
top page
]