• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Efficient Countermeasures against DoS Attacks

Research Project

Project/Area Number 20500075
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Computer system/Network
Research InstitutionHiroshima City University

Principal Investigator

SOSHI Masakazu  Hiroshima City University, 情報科学研究科, 准教授 (00293142)

Co-Investigator(Kenkyū-buntansha) MIYAJI Atsuko  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (10313701)
Project Period (FY) 2008 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2010: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2009: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
Fiscal Year 2008: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywordsセキュリティ / サービス不能攻撃 / トレースバック / モデル / 理論的解析 / 実装 / ネットワーク / シミュレーション
Research Abstract

DoS attacks have been serious threat to the Internet security these years. Therefore we studied efficient countermeasures against such DoS attacks, espe-cially focused on IP traceback schemes. In this study we proposed efficient IP traceback schemes and conducted theoretical analysis of them.

Report

(4 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (102 results)

All 2011 2010 2009 2008

All Journal Article (63 results) (of which Peer Reviewed: 39 results) Presentation (39 results)

  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      G. Hanaoka, S. Hirose, A. Miyaji, K. Miyazaki, B. Santoso, P. Yang
    • Journal Title

      IEICE Trans., Fundamentals E94-A

      Pages: 392-404

    • NAID

      10027987169

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 392-404

    • NAID

      10027987169

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: 6584 Pages: 236-254

    • NAID

      120003752191

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] HC-128の内部状態非独立性について2011

    • Author(s)
      陳嘉耕, 柿脇一穂, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3B1-2

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ARMを利用した楕円曲線暗号の効率的な実装2011

    • Author(s)
      永田智芳, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3D2-2

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-3

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 実用的な耐故障性を実現する効率的なグループ鍵共有法2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-4

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 匿名IDベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法2011

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-4C2-6

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの改良2011

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 57-64

    • NAID

      110008689674

    • Related Report
      2010 Annual Research Report
  • [Journal Article] メモリを考慮した事前計算点生成手法の提案2011

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 159-166

    • NAID

      110008689691

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 耐故障性を持つグループ鍵共有法の性能評価2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 167-175

    • NAID

      110008689692

    • Related Report
      2010 Annual Research Report
  • [Journal Article] カウンタを用いたIPトレースバック方式の評価2011

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52 Pages: 7-7

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52 Pages: 31-31

    • NAID

      110008583565

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおけるMicaZを用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52 Pages: 32-32

    • Related Report
      2010 Annual Research Report
  • [Journal Article] A Cipher-text-Policy Attribute-Based Encryp-tion Scheme with Constant Ciphertext Length2010

    • Author(s)
      K. Emura, A. Miyaji, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      IJACT 2

      Pages: 46-59

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      A. Miyaji, M. Sukegawa,
    • Journal Title

      IEICE Trans., Fundamentals E93-A

      Pages: 1066-1077

    • NAID

      10026864635

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol.2 Pages: 46-59

    • NAID

      120002260310

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      Atsuko Miyaji, Masahiro Sukegawa
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th Information Security Practice and Experience Conference, ISPEC 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6047 Pages: 30-44

    • NAID

      120002260312

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6280 Pages: 73-87

    • NAID

      120002753787

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Co-Z Addition Formulae and Binary Ladders on Elliptic Curves2010

    • Author(s)
      Raveen Ravinesh Goundar, Marc Joye, Atsuko Miyaji
    • Journal Title

      The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6225 Pages: 65-79

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Anonymous Designated Veririer Signature Scheme With Revocation : How to Protect a Company's Reputation2010

    • Author(s)
      Keito Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 184-198

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 200-213

    • NAID

      120002710165

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RPoK : A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010

      Pages: 1-5

    • NAID

      120006674763

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Hidden Credential Retrieval Without Random Oracles2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 160-174

    • NAID

      120003184341

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 135-149

    • NAID

      120003184340

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Privacy-Preserving Data Mining in Malicious Model2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 429-440

    • NAID

      120002737938

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Privacy-Preserving Data Mining in Presence of Covert Adversaries2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 370-382

    • NAID

      120002737939

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • NAID

      120003752190

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-4 Pages: 177-182

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1B1-2 Pages: 31-36

    • Related Report
      2010 Annual Research Report
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-3 Pages: 183-188

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 削除機能付き匿名検証者指定署名とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-47 Pages: 17-22

    • NAID

      110008152383

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 時限式プロキシ再暗号化方式とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-48 Pages: 23-28

    • NAID

      110008152384

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 効率的な3倍算公式を用いたスカラー倍算手法の提案2010

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2010-CSEC-51 Pages: 10-10

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ハッシュ連鎖による単純な認証法とセンサーネットワークへの応用2010

    • Author(s)
      双紙正和
    • Journal Title

      Computer Security Symposium 2010 (CSS 2010)

      Volume: CSS2010-ID1-3 Pages: 85-90

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおけるグループ鍵配送プロトコルの検討2010

    • Author(s)
      三吉雄大, 双紙正和
    • Journal Title

      Computer Security Symposium 2010 (CSS 2010)

      Volume: CSS2010-ID1-2 Pages: 79-84

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 新しいハッシュ連鎖の構成による単純な認証方式とその応用2010

    • Author(s)
      双紙正和
    • Journal Title

      信学技報

      Volume: ICSS2010-44 Pages: 1-5

    • NAID

      110008152380

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおける効率的なグループ鍵配送プロトコル2010

    • Author(s)
      三吉雄大, 双紙正和
    • Journal Title

      信学技報

      Volume: ICSS2010-44 Pages: 7-10

    • NAID

      110008152381

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおけるグループ鍵分配プロトコルの考察2010

    • Author(s)
      村上大樹, 双紙正和
    • Journal Title

      コンピュータセキュリティ研究会 CSEC-48

    • NAID

      110007990977

    • Related Report
      2009 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークのためのグループ鍵分配プロトコルの提案2010

    • Author(s)
      村上大樹, 双紙正和
    • Journal Title

      暗号と情報セキュリティシンポジウム SCIS2010, 3C3-3(CD-ROM)

    • Related Report
      2009 Annual Research Report
  • [Journal Article] A Dynamic Attribute-Based Group Sig-nature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      IPSJ Journal 50

      Pages: 1968-1983

    • NAID

      120006674342

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      IPSJ Journal Vol.50

      Pages: 1968-1983

    • NAID

      120006674342

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K.Emura, A.Miyaji, A.Nomura, K.Omote, M.Soshi
    • Journal Title

      The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, Springer-Verlag 5451

      Pages: 13-23

    • NAID

      120002260310

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S.Hirasawa, A.Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory, ISIT 2009

      Pages: 2391-2395

    • NAID

      110007324412

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, Springer-Verlag 5594

      Pages: 134-152

    • NAID

      120002260315

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      Proceedings of 4th International Workshop on Security, IWSEC 2009-Short Papers-, Co-organized by IEICE and IPSJ

      Pages: 49-63

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, Springer-Verlag 5932

      Pages: 281-295

    • NAID

      120002260313

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] ワイヤレスセンサネットワークにおける柔軟な鍵共有プロトコルの検討2009

    • Author(s)
      村上大樹, 双紙正和
    • Journal Title

      電気・情報関連学会中国支部第60回連合大会

      Pages: 367-368

    • Related Report
      2009 Annual Research Report
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      M. Miyaji, S. Hirasawa
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory (to appear)

      Pages: 277-282

    • NAID

      110007324412

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      M. Miyaji, K. Emura, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      ISPEC 2009, Lecture Notes in Computer Science 5451, Springer-Verlag

      Pages: 13-23

    • NAID

      120002260310

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The Forth International Conference on Availability, Reliability and Security (AReS 2009)

      Pages: 487-492

    • NAID

      120006674342

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography RIBC 2009

      Pages: 769-773

    • NAID

      120006674343

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      M. S. Rahman, M. Soshi, A. Miyaji
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing IMIS 2009

      Pages: 559-564

    • NAID

      120006674344

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Mul-tiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Journal 49, 9

      Pages: 2975-2988

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fun-damentals E91-A, 10

      Pages: 2833-2842

    • NAID

      10026852444

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans vol. 49, No. 9

      Pages: 2975-2988

    • NAID

      130002073193

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals. V01. E91-A, No. 10

      Pages: 2833-2842

    • NAID

      10026852444

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      A. Miyaii, S. Zrelli, Y. Shinoda, T. Ernst
    • Journal Title

      IEEE International Conference on Wireless and Mobile Computing (WIMOB'08)

      Pages: 561-566

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Simple Certificateless Signature with Start Cards2008

    • Author(s)
      A. Miyaji, K. Omote, K. Kato
    • Journal Title

      International Workshop on Security in Ubiauitous Computing Systems (SECUBIQ'08)

      Pages: 431-436

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A. Miyaji, A. Waseda, T. Takagi, M. Soshi
    • Journal Title

      The 2008 International Symposium on Information Theory and its Applications Proceedings of ISITA 2008(CD-ROM)

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An RFID Authentication Protocol Suitable for Batch-mode Authentication2008

    • Author(s)
      M. S. Rahman, M. Soshi, K. Omote, A. Miyaji
    • Journal Title

      Computer Security Symposium CSS2008-C3-2

      Pages: 277-282

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Presentation] Rede-signing Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments2011

    • Author(s)
      Y. Desmedt, A.Miyaji
    • Organizer
      Inscrypt 2010, LNCS, 6584, 236-254
    • Related Report
      2010 Final Research Report
  • [Presentation] カウンタを用いたIPトレースバック方式の評価2011

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Organizer
      IPSJ SIG Tech.Rep. 2011-CSEC
    • Related Report
      2010 Final Research Report
  • [Presentation] 安全・安心かつ便利な情報社会を実現する情報セキュリティー技術2010

    • Author(s)
      宮地充子
    • Organizer
      第4回関西安全・安心を支える科学技術推進会議シンポジウム
    • Place of Presentation
      大阪科学技術センター(招待講演)
    • Year and Date
      2010-06-16
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおけるグループ鍵分配プロトコルの考察2010

    • Author(s)
      双紙正和
    • Organizer
      CSEC-48
    • Related Report
      2010 Final Research Report
  • [Presentation] ワイヤレスセンサネットワークのためのグループ鍵分配プロトコルの提案2010

    • Author(s)
      村上大樹, 双紙正和
    • Organizer
      暗号と情報セキュリティシンポジウム, SCIS 2010, 3C3-3
    • Related Report
      2010 Final Research Report
  • [Presentation] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance2010

    • Author(s)
      J. Chen, A.Miyaji
    • Organizer
      ISPEC 2010, LNCS, Springer-Verlag, 6047, 30-44
    • Related Report
      2010 Final Research Report
  • [Presentation] Generalized RC4 Key Collisions and Hash Colli-sions2010

    • Author(s)
      J. Chen, A.Miyaji
    • Organizer
      SCN 2010, LNCS, Sprin-ger-Verlag, 6280, 73-87
    • Related Report
      2010 Final Research Report
  • [Presentation] Co-Z Addition Formulae and Binary Ladders on Elliptic Curves2010

    • Author(s)
      R. Goundar, M. Joye, A.Miyaji
    • Organizer
      CHES 2010, LNCS, Springer-Verlag, 6225, 65-79
    • Related Report
      2010 Final Research Report
  • [Presentation] An Anonymous Designated Verifier Sig-nature Scheme with Revocation : How to Protect a Company's Reputation2010

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      ProvSec 2010, LNCS, Springer-Verlag, 6402, 184-198
    • Related Report
      2010 Final Research Report
  • [Presentation] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fair-ly-Opened Multicast Communication2010

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      ProvSec 2010, LNCS, Springer-Verlag, 6402, 200-213
    • Related Report
      2010 Final Research Report
  • [Presentation] RPoK : A Strongly Resilient Poly-nomial-based Random Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks2010

    • Author(s)
      H. Ito, A.Miyaji, K. Omote
    • Organizer
      IEEE GLOBECOM 2010, 1-5
    • Related Report
      2010 Final Research Report
  • [Presentation] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      EuroPKI 2010, LNCS,
    • Related Report
      2010 Final Research Report
  • [Presentation] Hidden Credential Retrieval Without Random Oracles2010

    • Author(s)
      A.Miyaji, M. Shahriar Rahman, M. Soshi
    • Organizer
      WISA 2010, LNCS, Springer-Verlag, 6513, 160-174
    • Related Report
      2010 Final Research Report
  • [Presentation] Efficient and Optimally Secure In-Network Ag-gregation in Wireless Sensor Net-works2010

    • Author(s)
      A.Miyaji, K. Omote
    • Organizer
      WISA 2010, LNCS, Springer-Verlag, 6513, 135-149
    • Related Report
      2010 Final Research Report
  • [Presentation] Efficient Priva-cy-Preserving Data Mining in Mali-cious Model2010

    • Author(s)
      K. Emura, A.Miyaji, M. Shahriar Rahman
    • Organizer
      ADMA 2010, LNCS, Springer-Verlag, 6440, 429-440
    • Related Report
      2010 Final Research Report
  • [Presentation] Privacy-Preserving Data Mining in Presence of Covert Adversaries2010

    • Author(s)
      A.Miyaji, M. Shahriar Rahman
    • Organizer
      ADMA 2010, LNCS, Springer-Verlag, 6440, 370-382
    • Related Report
      2010 Final Research Report
  • [Presentation] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2010

    • Author(s)
      J. Chen, A.Miyaji
    • Organizer
      Inscrypt 2010, LNCS
    • Related Report
      2010 Final Research Report
  • [Presentation] ハッシュ連鎖による単純な認証法とセンサーネットワークへの応用2010

    • Author(s)
      双紙正和
    • Organizer
      CSS 2010, CSS2010-ID1-3, 85-90
    • Related Report
      2010 Final Research Report
  • [Presentation] ワイヤレスセンサネットワークにおけるグループ鍵配送プロトコルの検討2010

    • Author(s)
      三吉雄大, 双紙正和
    • Organizer
      CSS 2010, CSS2010-ID1-2, 79-84
    • Related Report
      2010 Final Research Report
  • [Presentation] 新しいハッシュ連鎖の構成による単純な認証方式とその応用2010

    • Author(s)
      双紙正和
    • Organizer
      信学技報, ICSS2010-44, 1-5
    • Related Report
      2010 Final Research Report
  • [Presentation] ワイヤレスセンサネットワークにおける効率的なグループ鍵配送プロトコル2010

    • Author(s)
      三吉雄大, 双紙正和
    • Organizer
      信学技報, ICSS2010-44, 7-10
    • Related Report
      2010 Final Research Report
  • [Presentation] (解説)"情報セキュリティの標準化動向について~ISO/IEC JTC1/SC27/WG2 2010年4月マラッカ会議報告~"2010

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司, 渡辺創
    • Organizer
      情報セキュリティ研究会(ISEC)
    • Place of Presentation
      弘前大学
    • Related Report
      2010 Annual Research Report
  • [Presentation] (パネルディスカッション)「セキュリティとディペンダビリティ」2010

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会創立50周年記念(第72回)全国大会
    • Place of Presentation
      東京大学本郷キャンパス
    • Related Report
      2009 Annual Research Report
  • [Presentation] 情報セキュリティの標準化動向について ~ISO/IEC JTC1/SC27/WG2 2009年5月北京会議報告~2009

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司
    • Organizer
      IEICE Japan Tech.Rep
    • Place of Presentation
      機械振興会館
    • Year and Date
      2009-09-25
    • Related Report
      2009 Annual Research Report
  • [Presentation] ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場
    • Year and Date
      2009-06-10
    • Related Report
      2009 Annual Research Report
  • [Presentation] A Cipher-text-Policy Attribute-Based Encryp-tion Scheme with Constant Ciphertext Length2009

    • Author(s)
      A.Miyaji, K. Emura, A. Nomura, K. Omote, M. Soshi
    • Organizer
      ISPEC 2009, LNCS, 5451, Springer-Verlag, 13-23
    • Related Report
      2010 Final Research Report
  • [Presentation] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      AReS, 487-492
    • Related Report
      2010 Final Research Report
  • [Presentation] A Certificate Revocable Anonymous Au-thentication Scheme with Designated Verifier2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      RIBC 769-773
    • Related Report
      2010 Final Research Report
  • [Presentation] A Cipher-text-Policy Attribute-Based Encryp-tion Scheme with Constant Ciphertext Length2009

    • Author(s)
      K. Emura, A.Miyaji, A. Nomura, K. Omote, M. Soshi
    • Organizer
      ISPEC 2009, LNCS, Springer-Verlag, 5451,13-23
    • Related Report
      2010 Final Research Report
  • [Presentation] Elliptic curves with a pre-determined embed-ding degree2009

    • Author(s)
      S. Hirasawa, A.Miyaji
    • Organizer
      ISIT 2009, 2391-2395
    • Related Report
      2010 Final Research Report
  • [Presentation] New Correlations of RC4 PRGA Using Non-zero-Bit Differences2009

    • Author(s)
      A.Miyaji, M. Sukegawa
    • Organizer
      ACISP 2009, LNCS, Springer-Verlag, 5594, 134-152
    • Related Report
      2010 Final Research Report
  • [Presentation] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Reci-pient Anonymity2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      IWSEC 2009, 49-63
    • Related Report
      2010 Final Research Report
  • [Presentation] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      WISA 2009, LNCS, Springer-Verlag, 5932, 281-295
    • Related Report
      2010 Final Research Report
  • [Presentation] ワイヤレスセンサネットワークにおける柔軟な鍵共有プロトコルの検討2009

    • Author(s)
      村上大樹, 双紙正和
    • Organizer
      電気・情報関連学会中国支部第60回連合大会, 367-368
    • Related Report
      2010 Final Research Report
  • [Presentation] 効率の良い space-time encoding を利用した{IP}トレースバックの検討2008

    • Author(s)
      高原加誉子, 双紙正和.
    • Organizer
      Computer Security Symposium 2008 (CSS 2008)
    • Place of Presentation
      沖縄コンベンションセンター
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      A.Miyaji, S. Zrelli, Y. Shinoda, T. Ernst
    • Organizer
      WIMOB'08, 561-566
    • Related Report
      2010 Final Research Report
  • [Presentation] Simple Certificateless Signature with Smart Cards2008

    • Author(s)
      A.Miyaji, K. Omote, K. Kato
    • Organizer
      SECU-BIQ'08
    • Related Report
      2010 Final Research Report
  • [Presentation] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A.Miyaji, A. Waseda, T. Takagi, M. Soshi
    • Organizer
      Proceedings of ISITA 2008
    • Related Report
      2010 Final Research Report
  • [Presentation] 効率の良いspace-time encodingを利用したIPトレースバックの検討2008

    • Author(s)
      高原加誉子, 双紙正和
    • Organizer
      Computer Secu-rity Symposium 2008 (CSS 2008)
    • Related Report
      2010 Final Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi