¸¦µæȯɽ¥ê¥¹¥È(È´¿è)

¡Ê2006ǯ11·î1Æü¸½ºß¡Ë English version is here.
Nuttapong Attrapadung, Hideki Imai: ``Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure'', IEICE Transaction on Fundamentalof Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol.E90-A, No.1, pp.187-203, Jan. 2007.
Marc P.C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura: ``An Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication'', Proceeding of 7th International Conference on Cryptology in India: Indocrypt'06 , Kalkata, India , Dec. 2006.
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: ``Efficient Identity-Based Encryption with Tight Security Reduction'', Lecture Notes in Computer Science (The 5th International Conference on Cryptology and Network Security: CANS 2006) , vol. 4301 , pp. 19-36 , Suzhou, Jiangsu, China , Dec. 2006.
Nuttapong Attrapadung, Jun Furukawa, Hideki Imai: ``Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys'', Lecture Notes in Computer Science (ASIACRYPT 2006) , vol. 4284 , pp. 161-177 , Shanghai, China , Dec. 2006.
Thi Lan Anh PHAN, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
ÂçȪ¿¿À¸, ¾¾±º´´ÂÀ: ``BB84Î̻Ҹ°ÇÛÁ÷¥×¥í¥È¥³¥ë¤Î°Ù¤ÎLDPCÉä¹æ¤òÍѤ¤¤¿CSSÉä¹æ¹½À®Ë¡, A Construction Method of CSS Codes Using LDPC Codes for BB84 Quantum Key Distribution'', Âè29²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à: SITA2006 , È¡´Û, Ë̳¤Æ» , Nov. 2006.
ËÌÅÄÏË, ²Ö²¬¸ç°ìϺ, Nuttapong Attrapadung, Ä¥±Ô, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``BDDH²¾Äê¤ÈSquare BDDH²¾Äê¤Î´Ø·¸¤Î¹Í»¡, Relationship between BDDH Assumption and Square BDDH Assumption'', Âè29²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à: SITA2006 , È¡´Û, Ë̳¤Æ» , Nov. 2006.
Nuttapong Attrapadung, Jun Furukawa, Kanta Matsuura, Hideki Imai: ``Searchable Public-Key Broadcast Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: ``Asymmetric RFID System Secure against Active Attack'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: ``Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
Yang Cui, Kazukuni Kobara, Hideki Imai: ``Efficient Multiple Encryption from OW-PCA Primitives'', Proceeding of International Symposium on Information Theory and its Applications: ISITA2006 , Seoul, Korea , Oct. 2006.
¾¾±º´´ÂÀ: ``°Å¹æ²½µ»½Ñ¤ÎÊÑÁ«'', Åŵ¤³Ø²ñ»ï , vol. 126 , no. 10 , pp. 678-681 , Oct. 2006.
Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption'', International Conference on Cryptology in Vietnam 2006¡§VietCrypt 2006 , Hanoi, Vietnam , Sep. 2006.
ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤È¼Ò²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼êË¡¤òÅý¹ç¤·¤¿ÌÂÏǥ᡼¥ë¥Õ¥£¥ë¥¿¥ê¥ó¥°¤È¤½¤ÎºÇŬÅý¹çË¡'', ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï , vol. 47 , no. 8 , pp. 2548-2555 , Aug. 2006.
Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai: ``Relations among Notions of Security for Identity Based Encryption Schemes'', IPSJ Journal , vol. 47 , no. 8 , pp. 2417-2429 , Aug. 2006.
Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa: ``Tag-KEM from Set Partial Domain One-Way Permutations'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 360-370 , Melbourne, Australia , Jul. 2006.
Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 348-359 , Melbourne, Australia , Jul. 2006.
Wei Liu, Hideyuki Tanaka, Kanta Matsuura: ``An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan'', Workshop on the Economics of Information Security 2006¡§WEIS2006 , University of Cambridge, Cambridge, UK , Jun. 2006.
»³¸ý¹â¹¯, ÀÄÌîÇî, Ëܶ¿ÀáÇ·, ¾¾±º´´ÂÀ: ``ʬÎव¤ì¤¿¾ðÊ󥻥­¥å¥ê¥Æ¥£Âкö¤Ë°Í¸¤¹¤ë¶¼°ÒȯÀ¸Î¨¤òƳÆþ¤·¤¿¥ê¥¹¥¯¥¢¥»¥¹¥á¥ó¥È¥â¥Ç¥ë, Risk Assessment Model Using Threat Probability Depending on Classified Information Security Measures'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð , vol. 2006 , no. 43 , pp. 7-12 , May. 2006.
Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Silent Cascade: Enhancing Location Privacy without Communication QoS Degradation'', Lecture Notes in Computer Science (Security in Pervasive Computing: Third International Conference: SPC 2006) , vol. 3934 , pp. 165-180 , York, UK , Apr. 2006.
Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: ``Relations Among Notions of Security for Identity Based Encryption Schemes'', Lecture Notes in Computer Science (Jose R. Correa, Alejandro Hevia, Marcos Kiwi (editors)) (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium) , vol. 3887 , pp. 130-141 , Valdivia, Chile , Mar. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Applying Fujisaki-Okamoto to Identity-Based Encryption'', Lecture Notes in Computer Science (Marc Fossorier, Hideki Imai, Shu Lin, and Alain Poli (editors)) (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16) , vol. 3857 , pp. 183-192 , Las Vegas, NV, USA , Feb. 2006.
°ÂÀ¾Í´°ìϺ(ȯ¹Ô), ¾¾ËÜ ÊÙ(ÊÔ): ``¾ðÊ󥻥­¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ'', Ê¿À®17ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×¸¦µæÀ®²ÌÊó¹ð½ñ, A04¾ðÊ󥻥­¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ , pp. 60-67 , Jan. 2006.
ËÌÀîδ, ÍÌ˲, ²Ö²¬¸ç°ìϺ, Ä¥±Ô, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Æ£ºê¡¦²¬ËÜÊÑ´¹¤ÈREACT¤ÎID¥Ù¡¼¥¹°Å¹æ¤Ø¤ÎŬÍÑ'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹­Åç , Jan. 2006.
Wei Liu, Hideyuki Tanaka, Kanta Matsuura: ``Information Security Incidents and Countermeasures: An Empirical Analysis Based on an Enterprise Survey in Japan'', Proceedings of the 2006 Symposium on Cryptography and Information Security: SCIS2006 , ¹­Åç , Jan. 2006.
Xiaoyi Yu, Kanta Matsuura: ``Steganography with Hashing'', Proceedings of the 2006 Symposium on Cryptography and Information Security: SCIS2006 , ¹­Åç , Jan. 2006.
»³º¬¹°, ²«³ÚÊ¿, ¾¾±º´´ÂÀ, À¥ºê·°: ``Silent period¤òÍѤ¤¤¿RFID¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·¡¼Êݸî¼êË¡¤ÎÄó°Æ'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹­Åç , Jan. 2006.
ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤Ë¤è¤ëÆüËܸì¤ò´Þ¤à¥á¡¼¥ë¤Î¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ë¤Ä¤¤¤Æ¤Î¹Í»¡'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹­Åç , Jan. 2006.
ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``°Å¹æÍ×Áǵ»½Ñ¤òÍѤ¤¤Ê¤¤·èÄêÏÀŪ¥Ñ¥±¥Ã¥È¥Þ¡¼¥­¥ó¥°Ë¡¤Ë¤è¤ëñ°ì¥Ñ¥±¥Ã¥ÈIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯¤Ë¤Ä¤¤¤Æ'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹­Åç , Jan. 2006.
ÂçȪ¿¿À¸, Ç븶³Ø, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``BB84Î̻Ҹ°ÇÛÁ÷¥×¥í¥È¥³¥ë¤Î¤¿¤á¤ÎLDPCÉä¹æ¹½À®Ë¡'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹­Åç , Jan. 2006.
Kanta Matsuura: ``University-Industry Collaboration in SCIS Compared to the IEEE Symposium on Security and Privacy'', Proceedings of the 2006 Symposium on Cryptography and Information Security: SCIS2006 , ¹­Åç , Jan. 2006.
ÅÄÃ潨¹Ô, ¾¾±º´´ÂÀ: ``¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¡¦¥·¥¹¥Æ¥à¤ÎÀȼåÀ­¤È¥»¥­¥å¥ê¥Æ¥£Åê»ñ¤Ë´Ø¤¹¤ë¼Â¾ÚʬÀÏ'', ¼Ò²ñ¡¦·ÐºÑ¥·¥¹¥Æ¥à¡Ê¼Ò²ñ¡¦·ÐºÑ¥·¥¹¥Æ¥à³Ø²ñ»ï¡Ë , no. 26 , pp. 97-101, 2005.
Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura: ``Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation'', Lecture Notes in Computer Science (Dengguo Feng, Dongdai Lin, Moti Yung (editors))(Information Security and Cryptology: First SKLOIS Conference: CISC 2005) , vol. 3822 , pp. 395-406 , Beijing, China , Dec. 2005.
ÂçȪ¿¿À¸, Ç븶³Ø, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``BB84Î̻Ҹ°ÇÛÁ÷¥×¥í¥È¥³¥ë¤Î°Ù¤ÎÁÐÂÐÉä¹æ¤ò´Þ¤àLDPCÉä¹æ¹½À®Ë¡'', Proceedings of the 28th Symposium on Information Theory and Its Applications: SITA2005 , vol. ­µ , pp. 411-414 , Okinawa , Nov. 2005.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Towards Security Enhancement with Efficient Reduction for Identity Based Encryption'', Proceedings of the 28th Symposium on Information Theory and Its Applications: SITA2005 , vol. ­µ , pp. 163-166 , Okinawa , Nov. 2005.
Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki: ``CARAVAN: Providing Location Privacy for VANET'', Embedded Security in Cars 2005: ESCAR 2005 , Cologne, Germany , Nov. 2005.
¾¾±º´´ÂÀ: ``ǧ¾Úµ»½Ñ¤ÎÍøÍѤËȼ¤¦¥»¥­¥å¥ê¥Æ¥£ÌäÂê'', 2005ǯÅÙÂè1²óWeb¥µ¡¼¥Ó¥¹¥¤¥Ë¥·¥¢¥Æ¥£¥Ö¡¦¥ï¡¼¥¯¥·¥ç¥Ã¥× , Åìµþ , Oct. 2005.
»³´ßÆƹ°, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¶¼°Ò¤ÎÄê¼°²½¤Ë´Ø¤¹¤ë°ì¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-II , no. 13 , pp. 579-584 , ¾¾»³ , Oct. 2005.
ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤È¼Ò²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼êË¡¤òÅý¹ç¤·¤¿ÌÂÏǥ᡼¥ë¥Õ¥£¥ë¥¿¥ê¥ó¥°'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-I , no. 13 , pp. 325-330 , ¾¾»³ , Oct. 2005.
²«³ÚÊ¿, »³º¬¹°, ¾¾±º´´ÂÀ, À¥ºê·°: ``WLAN¤Î¥È¥é¥Õ¥£¥Ã¥¯ÆÃÀ­¤ò¹Íθ¤·¤¿°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼Êݸî¥â¥Ç¥ë'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-I , no. 13 , pp. 181-186 , ¾¾»³ , Oct. 2005.
ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Bloom¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿¥Ñ¥±¥Ã¥È¥Þ¡¼¥­¥ó¥°Ë¡¤Ë¤è¤ëIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯¤Ç¤ÎÊ£¿ô¥Ñ¥±¥Ã¥ÈÍøÍÑÄÉÀפˤĤ¤¤Æ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-I , no. 13 , pp. 91-96 , ¾¾»³ , Oct. 2005.
Atsuhiro Yamagishi, Kanta Matsuura, Hideki Imai: ``Cryptographic Module Validation Program in Japan'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. ­¶ , pp. 485-489 , St. John's, Canada , Sep. 2005.
Kanta Matsuura: ``University-Industry Collaboration in the Information Security Field: An International Comparison'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. ­µ , pp. 95-98 , St. John's, Canada , Sep. 2005.
Åļ͵»Ò, ±§º¬Àµ»Ö, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``¥Ç¥¸¥¿¥ë½ð̾¤ÎĹ´üÍøÍѤˤĤ¤¤Æ'', ¶âÍ»¸¦µæ , vol. 24 , pp. 121-176 , Jul. 2005.
Kanta Matsuura: ``Activity of Imai and Matsuura Laboratories, and Inter-Sector Collaboration There'', University of Tokyo/Royal Holloway Information Security Workshop , Jul. 2005.
Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai: ``Relations among Notions of Security for Identity Based Encryption Schemes'', ÅŻҾðÊóÄÌ¿®³Ø²ñ¾ðÊ󥻥­¥å¥ê¥Æ¥£¸¦µæ²ñ (ISEC) , vol. 105 , no. 194 , pp. 25-32 , À¹²¬»Ô¡¢´ä¼ê¸© , Jul. 2005.
»³º¬¹°, ²«³ÚÊ¿, ¾¾±º´´ÂÀ, À¥ºê·°: ``QoS¤ò¹Íθ¤·¤¿°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼Êݸî¼êË¡¤Î¸¡Æ¤'', ÅŻҾðÊóÄÌ¿®³Ø²ñ¾ðÊ󥻥­¥å¥ê¥Æ¥£¸¦µæ²ñ (ISEC) , pp. 203-210 , ´ä¼ê , Jul. 2005.
Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Protecting Location Privacy for Wireless Network'', ARO workshop on Localization in Wireless Sensor Networks , Seattle, USA , Jun. 2005.
²¬ËܱɻÊ, ¾¾±º´´ÂÀ, ÉÚ¹âÀ¯¼£, ÃöËóÆØÉ×: ``°Å¹æ¤Ë¤ª¤±¤ëÀȼåÀ­¤Ë¤Ä¤¤¤Æ'', ¾ðÊó½èÍý , vol. 46 , no. 6 , pp. 625-629 , Jun. 2005.
Hideyuki Tanaka, Kanta Matsuura: ``Vulnerability and Effects of Information Security Investment: A Firm Level Empirical Analysis of Japan'', International Forum of Financial Information Systems and Cybersecurity: A Public Policy Perspective , College Park, MD , May. 2005.
Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Towards Modeling Wireless Location Privacy'', Lecture Notes in Computer Science (Workshop on Privacy Enhancing Technologies) , Dubrovnik, Croatia , May. 2005.
Kanta Matsuura: ``Cross-Sector Collaboration in Japanese Information-Security Industry, and the Shock of Personal Information Protection Laws'', Proceedings of the 11th International Conference on Industrial Engineering and Engineering Management , pp. 1178-1181 , Northeastern University, Shenyang, China , Apr. 2005.
¾¾ºê¹§Âç, ¾¾±º´´ÂÀ: ``½ð̾¸°Ï³±ÌÂкö¤Ë¤ª¤±¤ëMAC¤òÉÕÍ¿¤·¤¿ÅŻҽð̾¤Î¼ÂÁõÊý¼°'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð , vol. 2005 , pp. 369-373 , Mar. 2005.
»³º¬¹°, ²«³ÚÊ¿, ¾¾±º´´ÂÀ, À¥ºê·°: ``Quantitative evaluation of privacy protection using silent period'', ÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ , Âçºå , Mar. 2005.
Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki: ``Enhancing Wireless Location Privacy Using Silent Periods'', Proceedings of IEEE Wireless Communications and Networking Conference 2005 , vol. 2 , pp. 1187-1192 , New Orleans , Mar. 2005.
°ÂÀ¾Í´°ìϺ(ȯ¹Ô), ¾¾ËÜ ÊÙ(ÊÔ): ``¾ðÊ󥻥­¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ'', Ê¿À®16ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×¸¦µæÀ®²ÌÊó¹ð½ñ, A04¾ðÊ󥻥­¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ , pp. 40-45 , Jan. 2005.
ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Bloom¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿¥Ñ¥±¥Ã¥È¥Þ¡¼¥­¥ó¥°Ë¡¤Ë¤è¤ëIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯¤Îµ¼ÍÛÀ­³ÎΨ¤Ë¤Ä¤¤¤Æ'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­· , pp. 1555-1560 , ¿À¸Í , Jan. 2005.
Åļ¸¦Êå, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``ÄêÅÀ´Ñ¬¥·¥¹¥Æ¥à¼ý½¸¥Ç¡¼¥¿¤òÍøÍѤ·¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È¶õ´ÖÊä´Ö¼êË¡¤ÎÄó°Æ¤ÈÁá´ü°Û¾ï¸¡ÃΤؤÎŬÍÑ'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­· , pp. 1381-1386 , ¿À¸Í , Jan. 2005.
¸Åëδ¹Ô, ¾¾±º´´ÂÀ: ``ưŪ¥µ¥ó¥×¥ê¥ó¥°¤È¾ðÊóÍýÏÀŪʣ»¨ÅÙÊÑÆ°¤òÍøÍѤ·¤¿¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¸¡ÃÎ¥·¥¹¥Æ¥à¤ÎºÇŬ²½'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­· , pp. 1363-1368 , ¿À¸Í , Jan. 2005.
Jose Luis Lacson, Kanta Matsuura: ``Maximizing Election Security through the Efficient Use of Technology'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­· , pp. 1171-1174 , ¿À¸Í , Jan. 2005.
²«¶½²Ú, ¾¾±º´´ÂÀ: ``¥ê¥¢¥ë¥¿¥¤¥à¥Ó¥Ç¥ª¥»¥­¥å¥ê¥Æ¥£'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­· , pp. 991-996 , ¿À¸Í , Jan. 2005.
²«³ÚÊ¿, ¾¾±º´´ÂÀ, »³º¬¹°, À¥ºê·°: ``̵Àþ´Ä¶­¤Ë¤ª¤±¤ë°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼¤Î¥â¥Ç¥ë¤Ë´Ø¤¹¤ëÄó°Æ'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­µ , pp. 265-270 , ¿À¸Í , Jan. 2005.
ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿ÌÂÏǥ᡼¥ë¥Õ¥£¥ë¥¿¥ê¥ó¥°¤ÎºÇŬ²½'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. ­µ , pp. 199-204 , ¿À¸Í , Jan. 2005.
Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo: ``Vulnerability and Information Security Investment: An Empirical Analysis of E-Local Government in Japan'', The Journal of Accounting and Public Policy , vol. 24 , no. Issue. 1 , pp. 37-59 , Jan. 2005.
Åļ͵»Ò, ±§º¬Àµ»Ö, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``¥Ç¥¸¥¿¥ë½ð̾¤ÎĹ´üÍøÍѤˤĤ¤¤Æ'', ÆüËܶä¹Ô¶âÍ»¸¦µæ½ê IMES Discussion Paper Series , no. 2004-J-27 , Dec. 2004.
Kanta Matsuura: ``Research Direction for Information Security in Academia'', German-Japanese Information Security Workshop --- Progress in Information Security in Japan and Germany , Ministry of Economy, Trade and Industry (METI), Tokyo, Japan , Oct. 2004.
ÅÄÃ潨¹¬¡¤¾¾±º´´ÂÀ: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£Åê»ñ¤Î¥¤¥ó¥»¥ó¥Æ¥£¥Ö¡¦¥á¥«¥Ë¥º¥à¡§ ÅŻҼ«¼£ÂΤμ¾ڸ¦µæ'', ²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡Ö¾ðÊó³Ø¡×ÃìA06¸¦µæ²ñ , Ç®³¤»Ô, ÀŲ¬ , Oct. 2004.
ÅÄÃ潨¹¬, ¾¾±º´´ÂÀ: ``¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¡¦¥·¥¹¥Æ¥à¤ÎÀȼåÀ­¤È¥»¥­¥å¥ê¥Æ¥£Åê»ñ¤Ë´Ø¤¹¤ë¼Â¾ÚʬÀÏ'', ¼Ò²ñ¡¦·ÐºÑ¥·¥¹¥Æ¥à³Ø²ñÂè23²óÂç²ñ¡Ö¥·¥¹¥Æ¥à¤Î¥ê¥¹¥¯¤È°ÂÁ´¤ò¹Í¤¨¤ë¡×Êó¹ðÍ×»Ý , pp. 12-13 , ¿áÅÄ»Ô, ÂçºåÉÜ , Oct. 2004.
²«³ÚÊ¿, ¾¾±º´´ÂÀ, »³º¬¹°, À¥ºê·°: ``̵Àþ´Ä¶­¤Ë¤ª¤±¤ë°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼ÌäÂê¤Îɾ²Á´ð½à¤Ë´Ø¤¹¤ëÄó°Æ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 793-798 , »¥ËÚ , Oct. 2004.
»³´ßÆƹ°, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥¹¥Æ¥àÀ߷פ˴ؤ¹¤ë°ì¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 709-714 , »¥ËÚ , Oct. 2004.
±§º¬Àµ»Ö, Åļ͵»Ò, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``CA¸°Ï³±Ì»þ¤Ë¤ª¤±¤ëETSI TS 101 733¤Ë´ð¤Å¤¯½ð̾¤Î¸¡¾Ú²ÄǽÀ­'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 445-450 , »¥ËÚ , Oct. 2004.
±§º¬Àµ»Ö, Åļ͵»Ò, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``¸ø³«¸°¾ÚÌÀ½ñ¡¦¼º¸ú¾ðÊó·ç»»þ¤Ë¤ª¤±¤ëETSI TS 101 733¤Ë´ð¤Å¤¯½ð̾¤Î¸¡¾Ú²ÄǽÀ­'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 439-444 , »¥ËÚ , Oct. 2004.
¸Åëδ¹Ô, ¾¾±º´´ÂÀ, ¥¢¥ó¥À¡¼¥½¥ó¡¦¥Ê¥·¥á¥ó¥È, º£°æ½¨¼ù: ``¥³¥ë¥â¥´¥í¥Õ¡¦¥³¥ó¥×¥ì¥­¥·¥Æ¥£¤Ë¤è¤ëÊ£¿ô¤Î¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¤Î¸¡ÃÎ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-I , no. 11 , pp. 361-366 , »¥ËÚ , Oct. 2004.
²«¶½²Ú, ¾¾±º´´ÂÀ: ``¥ê¥¢¥ë¥¿¥¤¥à¥Ó¥Ç¥ª¤Ë¤è¤ë¸Ä¿Íǧ¾Ú¥·¥¹¥Æ¥à'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-I , no. 11 , pp. 217-222 , »¥ËÚ , Oct. 2004.
ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Bloom¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿¥Ñ¥±¥Ã¥È¥Þ¡¼¥­¥ó¥°Ë¡¤Ë¤è¤ëIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-I , no. 11 , pp. 181-186 , »¥ËÚ , Oct. 2004.
Hsing-Hua Huang, Kanta Matsuura: ``Real-Time Video Security for Financial Transactions'', The 2004 Workshop on Information Security Research Supported by MEXT Grant-in-Aid Scientific Research on Priority Area Informatics , Fukuoka, Japan , Oct. 2004.
Hideyuki Tanaka, Kanta Matsuura: ``An Incentive Mechanism of Information Security Investment: An Empirical Study of e-Local Government in Japan'', The 2004 Workshop on Information Security Research Supported by MEXT Grant-in-Aid Scientific Research on Priority Area Informatics , Fukuoka, Japan , Oct. 2004.
Kanta Matsuura, Ken Ebato: ``University-Industry Collaboration Networks in the Information Security Field in Japan: Problems and a Particular Success'', Proceedings of the 2004 IEEE International Engineering Management Conference: IEMC-2004 , vol. 2 , pp. 839-844 , Singapore , Oct. 2004.
Kanta Matsuura, Hideki Imai: ``Inspection Mechanism For Server-and-Client Protocols With Private-Key Cipher'', The ETHICOMP Journal , vol. 1 , no. 3 , Aug. 2004.
Jose Luis Lacson, Kanta Matsuura: ``The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas'', Lecture Notes in Computer Science , vol. 3183 , pp. 547-548 , Aug. 2004.
¾¾±º´´ÂÀ: ``¹âÀººÙÅŻһþ¹ï°õ¤Î¤¿¤á¤ÎÅŻҸøɽ¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë¸¦µæ'', Âè16²ó¸¦µæ½õÀ®À®²Ì³µÍ×½¸, ÂçÀî¾ðÊóÄÌ¿®´ð¶â , pp. 15 , Jul. 2004.
²«³ÚÊ¿, »³º¬¹°, ¾¾±º´´ÂÀ, À¥ºê·°: ``An Assessment of Wireless Location Privacy Risks in High Precision Positioning System'', ÅŻҾðÊóÄÌ¿®³Ø²ñ¾ðÊ󥻥­¥å¥ê¥Æ¥£¸¦µæ²ñ (ISEC) , ÆÁÅç , Jul. 2004.
Kanta Matsuura, Jose Luis Lacson, Terdoro Locsin, Jr.: ``Public Acceptance Issues Surrounding the Implementation of New Election Technology for the Philippines'', Twenty-sixth International Congress of Administrative Sciences , Seoul , Jul. 2004.
Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo: ``Vulnerability and Information Security Investment: An Empirical Analysis of E-Local Government of Japan'', The Forum on Financial Systems and Cybersecurity: A Public Policy Perspective , College Park, MD , May. 2004.
¸Åëδ¹Ô, ¾¾±º´´ÂÀ, Anderson Nascimento, º£°æ½¨¼ù: ``¥³¥ë¥â¥°¥í¥Õ¡¦¥³¥ó¥×¥ì¥­¥·¥Æ¥£¤ÎÊ£¿ô¤Î¶á»÷»»½ÐË¡¤È¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¸¡ÃΥѥե©¡¼¥Þ¥ó¥¹'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð , vol. 2004 , no. 22 , pp. 127-132 , Mar. 2004.
Kanta Matsuura: ``Robustness of Entrusted Data-Analysis in E-Science Research Collaboration'', Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE04 , pp. 373-378 , Mar. 2004.
Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo: ``An Analysis of Detailed Electronic Time-Stamping Using Digital TV'', Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE04 , pp. 277-284 , Mar. 2004.
º£°æ½¨¼ù, ¾¾±º´´ÂÀ: ``¿Í´Ö¡¦¼Ò²ñ¤ÈĴϤ·¤¿¥Ç¥£¥Ú¥ó¥À¥Ö¥ë¾ðÊ󥻥­¥å¥ê¥Æ¥£µ»½Ñ'', 21À¤µªCOE¡Ö¾ðÊó²Ê³Øµ»½ÑÀïά¥³¥¢¡×Âç°è¥Ç¥£¥Ú¥ó¥À¥Ö¥ë¾ðÊó´ðÈ×¥·¥ó¥Ý¥¸¥¦¥à»ñÎÁ½¸ , pp. 108-128 , Feb. 2004.
°ÂÀ¾Í´°ìϺ(ȯ¹Ô), ¾¾ËÜ ÊÙ(ÊÔ): ``¾ðÊ󥻥­¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ'', Ê¿À®15ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø ¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×¸¦µæÀ®²ÌÊó¹ð½ñ, A04¾ðÊ󥻥­¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ , pp. 48-53 , Jan. 2004.
ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``IP¥Ç¡¼¥¿¥°¥é¥à¤¬Àµµ¬¤ËÊÑ´¹¤µ¤ì¤ë¾ì¹ç¤ÎIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯µ»½Ñ¤Ë¤Ä¤¤¤Æ'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ­¶ , pp. 1369-1373 , ÀçÂæ , Jan. 2004.
Åļ¸¦Êå, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``¥Ç¡¼¥¿¥Þ¥¤¥Ë¥ó¥°¤òÍѤ¤¤¿IDS¥í¥°Ê¬ÀÏ·ë²Ì¤Î³èÍÑ'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ­¶ , pp. 1155-1160 , ÀçÂæ , Jan. 2004.
¸Åëδ¹Ô, ¾¾±º´´ÂÀ, Anderson Nascimento, º£°æ½¨¼ù: ``Kolmogorov Complexity¤Ë¤è¤ë¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¤Î¸¡ÃÎ¥·¥¹¥Æ¥à'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£ ¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ­¶ , pp. 1145-1150 , ÀçÂæ , Jan. 2004.
¥Û¥»¡¦¥ë¥¤¥¹¡¦¥é¥¯¥½¥ó, ¾¾±º´´ÂÀ: ``¥Õ¥£¥ê¥Ô¥ó¤Îºß³°Åêɼ¼ÔÅÐÏ¿À©Å٤ˤª¤±¤ë¼ÂÍÑŪ¡¢µ»½ÑŪ¤ÊÌäÂê'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ­¶ , pp. 943-948 , ÀçÂæ , Jan. 2004.
¿¹³ÀÅØ, ¾¾±º´´ÂÀ, ¿ÜÆ£½¤: ``Digital TV¤òÍøÍѤ·¤¿¹âÀººÙ¥¿¥¤¥à¥¹¥¿¥ó¥×¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë°ÂÁ´À­É¾²Á'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ­µ , pp. 597-602 , ÀçÂæ , Jan. 2004.
¹¾Çȸ͸¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£Ê¬Ìî¤Ë¤ª¤±¤ë»º³ØÏ¢·È¸¦µæ'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ­µ , pp. 13-18 , ÀçÂæ , Jan. 2004.
¸Åëδ¹Ô, ¾¾±º´´ÂÀ, Anderson Nascimento, º£°æ½¨¼ù: ``Kolmogorov Complexity¤Ë´ð¤Å¤¯¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¤Î¸¡ÃμêË¡'', Âè26²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥àͽ¹Æ½¸ , vol. ­¶ , pp. 621-624 , ʼ¸Ë , Dec. 2003.
Ken Ebato, Kenneth Pechter, Kanta Matsuura: ``University-Industry Research Collaboration in the Information Security Field in Japan'', Proceedings of the 2003 IEEE International Engineering Management Conference: IEMC-2003 , Albany, New York , Nov. 2003.
Kanta Matsuura: ``Digital Security Tokens and Their Derivatives'', Netnomics , vol. 5 , no. 2 , pp. 161-179 , Nov. 2003.
ÅÄÃ潨¹¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥Þ¥Í¥¸¥á¥ó¥È¤ÎÀ©ÅÙÀß·×'', Ê¿À®15ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×ÃìA04¡Ö¾ðÊ󥻥­¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ¡×¥ï¡¼¥¯¥·¥ç¥Ã¥× , Ê¡²¬ , Nov. 2003.
¾¾±º´´ÂÀ: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ ---3¤Ä¤Î¥¢¥×¥í¡¼¥Á¤È³µÍ×---'', Ê¿À®15ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡× ÃìA04¡Ö¾ðÊ󥻥­¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ¡×¥ï¡¼¥¯¥·¥ç¥Ã¥× , Ê¡²¬ , Oct. 2003.
ÅÄÃ潨¹¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥Þ¥Í¥¸¥á¥ó¥È¤ÎÀ©ÅÙÀß·×'', Network Security Forum 2003 , Oct. 2003.
¹¾Çȸ͸¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥­¥å¥ê¥Æ¥£Ê¬Ìî¤Ë¤ª¤±¤ë»º³ØÏ¢·È¤Î¾õ¶·'', Network Security Forum 2003 , Oct. 2003.
¿¹³ÀÅØ, ¾¾±º´´ÂÀ, ¿ÜÆ£½¤: ``Digital TV¤òÍøÍѤ·¤¿Ä¶¹âÀººÙÅŻһþ¹ï°õ¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2003ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2003 , no. 15 , pp. 539-544 , Ê¡²¬ , Oct. 2003.
K. Matsuura: ``Information Security and Economics in Computer Networks: An Interdisciplinary Survey and a Proposal of Integrated Optimization of Investment'', The 9th International Conference of Computing in Economics and Finance (CEF 2003), Seattle, July 2003. (PDF file)
M. Ando, K. Matsuura, M. Kudo, and A. Baba: ``An Architecture of a Secure Database for Networked Collaborative Activities'', Proc. of 5th International Conference on Enterprise Information Systems (ICEIS 2003), ICEIS Press, Vol.I, pp.3-10, Angers, France, April 2003. (PDF file)
¾®¿¹ °°, ²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``½ð̾¸°Ï³±ÌÌäÂê¤Ë¤ª¤±¤ëÅŻҾڵòÀ¸À®µ»½Ñ¤Ë¤Ä¤¤¤Æ'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.II, pp.983-988, Jan. 2003. (PDF file)
¹¾ÇÈ¸Í ¸¬, ¥±¥Í¥¹¡¦¥Ú¥¯¥¿¡¼, ¾¾±º´´ÂÀ. ``SCIS¤Ë¤ª¤±¤ë»º³ØÏ¢·È¤Î¾õ¶·'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.I, pp.569-574, Jan. 2003. (PDF file)
°ÂÅì ³Ø, ¾¾±º´´ÂÀ, ÇÏ¾ì ¾Ï. ``ÆâÉôÉÔÀµ¼Ô¤ò¹Íθ¤·¤¿¥°¥ë¡¼¥×¸°¶¦Í­Êý¼°¤Ë´Ø¤¹¤ë¹Í»¡'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.I, pp.125-130, Jan. 2003. (PDF file)
¾¾±º´´ÂÀ. ``¾ðÊ󥻥­¥å¥ê¥Æ¥£¤È·ÐºÑ³Ø'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.I, pp.475-480, Jan. 2003. (PDF file)
°ÂÅì ³Ø, ¾¾±º´´ÂÀ, ÇÏ¾ì ¾Ï. ``ʬ»¶´Ä¶­¤ÇÊݸ¤µ¤ì¤ë¥í¥°¥Õ¥¡¥¤¥ë¤Ë¤ª¤±¤ë³Æ¥í¥°¥¨¥ó¥È¥ê¡¼´Ö¤Î½ç½ø´Ø·¸ÊݾÚÊýË¡¤Ë´Ø¤¹¤ë¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2002ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º, Vol.2002, No.16, pp.1-6, Oct. 2002. (PDF file)
R. Zhang, M. Kudo, K. Matsuura and H. Imai: ``A Model for Signature Revocation'', Proc. of 2002 International Symposium on Information Theory and Its Applications (ISITA 2002), pp.455-458, Xi'an, PRC, Oct. 2002. (PDF file)
¾¾±º´´ÂÀ. ``ÅŻҥ»¥­¥å¥ê¥Æ¥£¥È¡¼¥¯¥ó¤È¤½¤ÎÇÉÀ¸¾¦ÉÊ'', ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, vol.43, no.8, pp.2372-2380, August 2002.
K. Matsuura. ``Virtual Private Laboratories: Concept and Two Building Blocks'', Proceedings of the 2002 IEEE International Engineering Management Conference (IEMC 2002), vol.II, pp.876-881, August 2002. (PDF file)
K. Matsuura. ``Digital Security Tokens in Network Commerce: Modeling and Derivative Application'', 8th International Conference of the Society for Computational Economics --- Computing in Economics and Finance (CEF 2002), Aix-en-Provence, France, June 2002. (PDF file)
K. Matsuura and H. Imai. ``Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal'', Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002), Volume 2, ICEIS Press, pp.962-967, April, 2002. (PDF file)
¾¾±º´´ÂÀ. ``ÅŻҥ»¥­¥å¥ê¥Æ¥£¥È¡¼¥¯¥ó¤Î¥â¥Ç¥ë²½¤È±þÍÑ'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.I, pp.73-78, Jan. 2002. (PDF file)
Åļ ¿Î, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¿³ººÇ½ÎϤˤĤ¤¤Æ¹Íθ¤·¤¿Â¿¼¡¸µ¥È¥é¥¹¥È¥á¥È¥ê¥Ã¥¯¤Ë´Ø¤¹¤ë¹Í»¡'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.I, pp.103-108, Jan. 2002. (PDF file)
ÉûÅç ¿¸, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``ÅŻҸ¢ÍøήÄÌÊý¼°ÂФ˴ؤ¹¤ëÆÃÀ­Ê¬ÀÏ'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.I, pp.223-228, Jan. 2002. (PDF file)
¾®¿¹ °°, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``ÅŻҾ¦¼è°ú¤Ë¤ª¤±¤ëʶÁè²ò·è¤Î¤¿¤á¤ÎÅŻҾڵòʪ¤Ë´Ø¤¹¤ëʬÀÏ'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.II, pp.627-632, Jan. 2002. (PDF file)
»³Ã濸¼¤, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¿¯Æþ¸¡ÃεڤÓÆâÉô¹¶·â¼Ô¸¡ÃΤȥҥ塼¥Þ¥ó¥¯¥ê¥×¥È'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.II, pp.979-984, Jan. 2002. (PDF file)
°ÂÅì ³Ø, ¾¾±º´´ÂÀ, ¹©Æ£Æ»¼£, ÇÏ¾ì ¾Ï. ``¿µ¡Ç½¥»¥­¥å¥¢¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î¥¢¥¯¥»¥¹À©¸æ¥Ý¥ê¥·¡¼ÀßÄêÌäÂê'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.II, pp.991-996, Jan. 2002. (PDF file)
R. Zhang, M. Kudoh, K. Matsuura and H. Imai. ``Instance Revocation of Digital Signature and Its Applications'', Proc. of the 2002 Symposium on Cryptography and Information Security (SCIS2002), Vol.II, pp.1143-1148, Jan. 2002. (PDF file)
¾®¿¹ °°, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``·ÀÌó»þ¤Ëź¤¨¤ëÉÕ²ÃŪ¤ÊMAC¤Ë´Ø¤¹¤ëÁí¹çŪʬÀÏ'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, CSEC-15, pp.31-36, Dec. 2001. (PDF file)
K. Matsuura. ``A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce''. Proc. of Third International Conference on Information and Communications Security (ICICS'01), Lecture Notes in Computer Science 2229, Springer-Verlag, pp. 90-94, Nov. 2001. (PDF file)
°ÂÅì ³Ø, ¾¾±º´´ÂÀ, ÇÏ¾ì ¾Ï. ``¿Íͤʥ»¥­¥å¥ê¥Æ¥£Áàºî¤ò¹Íθ¤·¤¿¥ª¥Ö¥¸¥§¥¯¥È»Ø¸þ¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î¹½Â¤'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2001ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º, Vol.2001, No.15, pp.19-24, Oct. 2001. (PDF file)
¾®¿¹ °°, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``PKI¤Ë´ð¤Å¤¯C/S·¿¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î°ÂÁ´À­Ê¬ÀϤȾڵòÀ­É¾²Á'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2001ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º, Vol.2001, No.15, pp.319-324, Oct. 2001. (PDF file)
K. Matsuura. ``Effects of Data Hiding on Remote Data Analysis''. IPSJ Journal, Vol.42, No.10, pp.2526-2532, Oct. 2001.
K. Matsuura. ``Echo Back in Implementation of Passphrase Authentication''. Proc. of the 2001 International Workshop on Cryptology and Network Security, pp.238-245, September 2001. (PDF file)
K. Matsuura. ``Security Token and Its Derivative in Discrete-Time Models''. Proc. of 5th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, FL, July 2001. (PDF file)
K. Matsuura. ``Digital Security Tokens and Their Derivatives''. 7th International Conference of the Society for Computational Economics (SCE'01), New Haven, CT. June 2001.
¾¾±º´´ÂÀ. ``¥Ç¥£¥¸¥¿¥ë¡¦¥È¡¼¥¯¥ó¤ÎÉÔ³ÎÄêÀ­¤ÈÆó¹à¥â¥Ç¥ë¤Ë¤è¤ë¥ê¥¹¥¯¥Ø¥Ã¥¸É¾²Á''. ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, CSEC-13, pp.31-36, May 2001. (PDF file)
S. Hirose and K. Matsuura. ``Key Agreement Protocols Resistant to a Denial-of-Service Attack''. IEICE Transactions on Information and Systems, Vol.E84-D, No.4, pp.477-484, April 2001.
K. Matsuura. ``Security Tokens and Their Derivatives''. Technical Reports 29, Centre for Communications Systems Research, University of Cambridge, Feb. 2001. (PDF file)
K. Matsuura and H. Imai. ``Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks''. IEICE Transactions on Information and Systems, Vol.E83-D, No.5, pp.972-979, May 2000.
K. Matsuura and H. Imai. ``Generation, Verification, and Renewal of Digital Time-Stamps''. Imai Laboratory Research Monograph Series, No.2000-1, pp.44-53, March 2000.
K. Matsuura and H. Imai. ``Modification of Internet Key Exchange Resistant against Denial-of-Service''. Pre-Proc. of Internet Workshop 2000 (IWS2000), pp.167-174, Feb. 2000. (gzipped PS file)
K. Matsuura. ``Evaluation of DoS Resistance in Relation to Performance Dynamics''. The 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan. Jan. 2000. (gzipped PS file)
¾¾±º´´ÂÀ. ``¥¿¥¤¥à¥¹¥¿¥ó¥Ô¥ó¥°¥·¥¹¥Æ¥à¤Î¸½¾õ¤È¾­Íè''. ¼¡¡¹À¤Âåǧ¾Úµ»½Ñ¤ª¤è¤Ó¥»¥­¥å¥ê¥Æ¥£¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¤Ë´Ø¤¹¤ë¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, December 1999.
º£°æ½¨¼ù, ¾¾±º´´ÂÀ. ``¾ðÊ󥻥­¥å¥ê¥Æ¥£µ»½Ñ¤Î´ðÁäȱþÍÑ ---ÌÀ¤ë¤¤¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤òÃÛ¤¯¸°---''. Ê¿À®11ǯÅÙÀ¸¸¦¥»¥ß¥Ê¡¼, Åìµþ, December 1999.
¶âëÆÆϺ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``ÉÔÀµ¥ê¥¯¥¨¥¹¥È¤ËÂФ¹¤ëºÆÁ÷À©¸æ¥á¥«¥Ë¥º¥à¤Ë´Ø¤¹¤ë°ì¸¡Æ¤''. Âè22²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥àͽ¹Æ½¸, pp.781-784, December 1999.
¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¸°¶¦Í­¥×¥í¥È¥³¥ë¤È¥Ñ¥±¥Ã¥ÈÀ©¸æ¤Ë´Ø¤¹¤ë°ì¹Í»¡''. Âè22²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥àͽ¹Æ½¸, pp.777-780, December 1999 (gzipped PS file).
S. Hirose and K. Matsuura. ``Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack''. In V. Varadharajan and Y. Mu (eds.), Lecture Notes in Computer Science 1726, Springer-Verlag, Berlin, pp.169-182, November 1999.
¾¾±º´´ÂÀ. ``¥Ç¥¸¥¿¥ë¥¿¥¤¥à¥¹¥¿¥ó¥×µ»½Ñ¤Î¸½¾õ¤È²ÝÂê''. Âè2²ó¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, November 1999.
¾¾±º´´ÂÀ. ``°Å¹æ¡¦Ç§¾Úµ»½Ñ¤È¥¤¥ó¥¿¡¼¥Í¥Ã¥È±þÍÑ''. ¥Æ¥¯¥Î¥·¥¹¥Æ¥à¹Ö½¬²ñ¡Ö¥Í¥Ã¥È¥ï¡¼¥¯¤Î¥»¥­¥å¥ê¥Æ¥£¤È°Å¹æ¡¦Ç§¾Ú¤ÎºÇ¿·Æ°¸þ¡×»ñÎÁ, pp.1-30, Oct. 1999.
K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Cientifica, Vol.2, No.11, pp.15-19, 1999. (gzipped PS file)
±§º¬Àµ»Ö, ¾¾±º´´ÂÀ, ÅÄÁÒ ¾¼. ``¥Ç¥¸¥¿¥ë¥¿¥¤¥à¥¹¥¿¥ó¥×µ»½Ñ¤Î¸½¾õ¤È²ÝÂê''. ÆüËܶä¹Ô¶âÍ»¸¦µæ½ê IMES Discussion Paper Series, No.99-J-36. Oct. 1999. (Available at IMES's page)
K. Matsuura. ``Effects of Data Hiding on Remote Data Analysis''. Proceedings of Computer Security Symposium'99 (CSS'99), pp.81-86, Oct. 1999. (gzipped PS file)
K. Matsuura and H. Imai. ``Toward Research-Promotion Infrastructure for Multi-Modal Imaging''. In T. Yoshimoto et. al. (eds.) Recent Advances in Biomagnetism, pp.911-914, Tohoku University Press, Sendai, 1999. (gzipped PS file)
K. Matsuura and H. Imai. ``Activity Report of IIS E-Commerce and Digital-Cash Committee''. The 5th International Conference on Ethical Issues of Information Technology, Rome, Oct. 1999.
¾¾±º´´ÂÀ. ``IKE¤Ë¤ª¤±¤ëǧ¾Ú¥â¡¼¥É¤È¥µ¡¼¥Ó¥¹Ë¸³²¹¶·âÂÑÀ­¤Î²òÀÏ''. ¾ðÊó½èÍý³Ø²ñÂè59²ó(Ê¿À®11ǯ¸å´ü)Á´¹ñÂç²ñ ÆÃÊÌ¥»¥Ã¥·¥ç¥ó(3)¹Ö±éÏÀʸ½¸, pp.43-50, Sep. 1999.
¾¾±º´´ÂÀ. ``AES¤Î»ÅÍͤÈÁªÄê¾õ¶·¤Ë¤Ä¤¤¤Æ''. Âè8²óÁá°ðÅÄÂç³ØÅŻҾ¦¼è°ú¸¦µæ²ñ, July 1999.
K. Matsuura and H. Imai. ``Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack''. Proc. of Internet Workshop'99 (IWS'99), IEEE Press, pp.17-24, 1999. (gzipped PS file)
¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``ȯ¿®¥Õ¥£¥ë¥¿¥ê¥ó¥°´Ä¶­²¼¤Î¸°¶¦Í­¥×¥í¥È¥³¥ë¤Ë¤ª¤±¤ëÊĺÉΨɾ²Á''. 1999ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'99)ͽ¹Æ½¸, Vol. II, pp. 893-898, Jan. 1999. (gzipped PS file)
K. Matsuura. ``Protection of Three-Pass Key-Agreement Protocols against a Denial-of-Service Attack''. Bell Labs Crypto/Security Seminar, NJ, March 1999.
S. Hirose and K. Matsuura. ``Enhancing the resistance of a secure key agreement protocol to a denial-of-service attack''. Proc. of the 1999 Symposium on Cryptography and Information Security (SCIS'99), Vol. II, pp. 899-904, Jan. 1999.
¾¾±º´´ÂÀ. ``¼Ò²ñ²Ê³Ø¼Ô¤«¤é¸«¤¿¥×¥é¥¤¥Ð¥·¡¼´ØÏ¢ÌäÂê''. Âè21²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à, ´ôÉì, Dec. 1998.
¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¸°¶¦Í­¥×¥í¥È¥³¥ë¤Î¥µ¡¼¥Ó¥¹Ë¸³²¹¶·âÂкö''. Âè21²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à, ´ôÉì, Dec. 1998.
¾¾±º´´ÂÀ, ``Âè4²ó¾ðÊ󵻽ѤÎÎÑÍýÌäÂê¹ñºÝ²ñµÄ(ETHICOMP98)»²²ÃÊó¹ð''. ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, Vol. 98, No. 391, FACE98-19, pp. 37-42, Nov. 1998.
¾¾±º´´ÂÀ. ``°Å¹æ¡¦Ç§¾Úµ»½Ñ¤È¥Í¥Ã¥È¥ï¡¼¥¯''. Ê¿À®£±£°Ç¯ÅٳؽѾðÊ󥻥󥿡¼¥·¥ó¥Ý¥¸¥¦¥à»ñÎÁ, pp. 16-23, Nov. 1998.
K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 466-470, Oct. 1998. (gzipped PS file)
×¢À¥¾¡°ì, ¾¾±º´´ÂÀ. ``¥µ¡¼¥Ó¥¹µñÈݹ¶·â¤ËÂФ·¤ÆÂÑÀ­¤Î¤¢¤ë¸°¶¦Í­¥×¥í¥È¥³¥ë''. ÅŻҾðÊóÄÌ¿®³Ø²ñ1998ǯ´ðÁᦶ­³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ, »³Íü, Oct. 1998.
²Ö²¬¸ç°ìϺ, À¾²¬ µ£, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``Advanced KPS¤Ë¤ª¤±¤ëProvider´Ö¤Î¸°¤ÎÉÔÀµÆ³½Ð¤È¤½¤ÎÂбþ¤Ë´Ø¤¹¤ë°ì¸¡Æ¤''. ÅŻҾðÊóÄÌ¿®³Ø²ñ1998ǯ´ðÁᦶ­³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ, »³Íü, Oct. 1998.
G. Hanaoka, T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``On Advanced KPS: An Optimized KPS against Collusion Attacks''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 247-250, Oct. 1998.
K. Matsuura. ``One-Time Rental of Membership for Server-and-Client Protocol with Private-Key Cipher''. ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, Vol. 98, No. 83, 98-MBL-6-8, pp. 53-60, Sep. 1998.
K. Matsuura and H. Imai. ``Toward Research-Promotion Infrastructure for Multi-Modal Imaging''. 11th International Conference on Biomagnetism (BIOMAG98), Sendai, Aug. 1998.
¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``Åý¹ç¸¦µæÂ¥¿Ê¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¡¼¤Ë¸þ¤±¤Æ''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 11, No. 1, pp. 100-101, May 1998.
K. Matsuura, Y. Zheng, and H. Imai. ``Compact and Flexible Resolution of CBT Multicast Key-Distribution''. Proc. of Worldwide Computing and Its Applications '98 (WWCA'98), Lecture Notes in Computer Science 1368, Springer-Verlag, pp. 190-205, Mar. 1998. (gzipped PS file)
K. Matsuura and H. Imai. ``Inspection Mechanism for Server-and-Client Protocols with Private-Key Cipher''. The 4th International Conference on Ethical Issues of Information Technology, Rotterdam, Mar. 1998. (PDF file)
²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤Ë¤ª¤±¤ë¸úΨŪ¤ÊÅŻҷèºÑÊý¼°¤Ë¸þ¤±¤Æ''. ÅŻҾðÊóÄÌ¿®³Ø²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤È¥é¥¤¥Õ¥¹¥¿¥¤¥ë¸¦µæ²ñÂ裲²ó¥ï¡¼¥¯¥·¥ç¥Ã¥×, Åìµþ, Mar. 1998.
²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``Secure Electronic Transaction (SET) ¤Î¹â®²½¤Ë´Ø¤¹¤ë°ì¼êË¡''. 1998ǯÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ, Ê¿ÄÍ, Mar. 1998.
²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``ÂÐÌÌÈÎÇä¤Ë¤ª¤±¤ë¥¯¥ì¥¸¥Ã¥È·èºÑ¤Î¹â®²½¤Ë´Ø¤¹¤ë°ì¸¡Æ¤''. 1998ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'98), É;¾, Jan. 1998.
¾¾±º´´ÂÀ, ÂÀÅÄÏÂÉ×. ``1997 Korea-Japan Joint Workshop on Information Seurity and Cryptology¡¤1997ǯ10·î26Æü¡Á28Æü''. 1998ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'98), É;¾, Jan. 1998.
¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``¥°¥ë¡¼¥×¸°ÇÛÁ÷¤òȼ¤Ã¤¿¥³¥ó¥Ñ¥¯¥È¤ÊCBT²ÃÆþ¥á¥Ã¥»¡¼¥¸¤È»ö¸å¥×¥í¥»¥¹¥á¥Ã¥»¡¼¥¸''. 1998ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'98), É;¾, Jan. 1998.
²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``LITESET ---¸úΨŪÅŻҷèºÑ¤Ë¸þ¤±¤Æ---''. ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¹âÅÙ¾ðÊóÄÌ¿®¥·¥¹¥Æ¥à¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, Jan. 1998.
K. Matsuura, Y. Zheng, and H. Imai. ``Electronic Safe-Deposit Box''. Âè20²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à(SITA97)ͽ¹Æ½¸, pp. 385-388, Dec. 1997.
¾¾±º´´ÂÀ. ``¥«¡¼¥É¥»¥­¥å¥ê¥Æ¥£¤È¾ðÊóÊÝ´É''. Âè1²ó¥¤¥ó¥¿¡¼¥Ê¥·¥ç¥Ê¥ë¡¦¥«¡¼¥É¡¦¥»¥­¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, Nov. 1997.
K. Matsuura, Y. Zheng, and H. Imai. ``Compact, Secure, and Unforgeable Key Agreement on Internet''. Rump Session of International Conference on Information and Communications Security '97, Beijing, Nov. 1997.
¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``CBT¥ë¡¼¥Æ¥£¥ó¥°¤òÍøÍѤ·¤¿¥Þ¥ë¥Á¥­¥ã¥¹¥È¸°ÇÛÁ÷¤Îɾ²Á¤È¸úΨ²½''. ÅŻҾðÊóÄÌ¿®³Ø²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¸¦µæ²ñÂè°ì²ó¥ï¡¼¥¯¥·¥ç¥Ã¥×»ñÎÁ, pp. 53-60, Oct. 1997.
T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``A Proposal for Authenticated Key Recovery System''. Proceedings of JW-ISC'97 (1997 Korea-Japan Joint Workshop on Information Security and Cryptology), Seoul, pp. 189-196, Oct. 1997.
¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``Signcryption¤Ë¤è¤ë¸úΨŪ¤ÊIPng¸°¾ðÊóÇÛÁ÷''. ÅŻҾðÊóÄÌ¿®³Ø²ñ1997ǯ´ðÁᦶ­³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ¹Ö±éÏÀʸ½¸, A-7-19, p. 144, Sep. 1997.
¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``¥»¥­¥å¥ê¥Æ¥£µ¡Ç½¤òÈ÷¤¨¤¿¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤Ë¤ª¤±¤ë¥æ¡¼¥¶Ééô''. ÅŻҾðÊóÄÌ¿®³Ø²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤È¥é¥¤¥Õ¥¹¥¿¥¤¥ë¸¦µæ²ñ»ñÎÁ(Âè1²ó), No. 1, pp. 36-41, Aug. 1997.
K. Matsuura and Y. Okabe. ``A Robust Reconstruction of Sparse Biomagnetic Sources''. IEEE Trans. Biomed. Eng., Vol. 44, No. 8, pp. 720-726, 1997.
K. Matsuura, N. Shimizu, and Y. Okabe. ``Reconstruction of Sparse Dipole Source by a Modified SMN Method''. In: I. Hashimoto, Y. C. Okada, and S. Ogawa, editors, Visualization of Information Processing in the Human Brain: Recent Advances in MEG and Functional MRI (EEG Suppl. 47), pp. 421-429. Elsevier, Amsterdam, 1996.
K. Matsuura and Y. Okabe. ``L_p-Normalized Minimum-L1-Norm Solution of the Biomagnetic Inverse Problem''. In: 18th Annual Int. Conf. of the IEEE Engineering in Medicine and Biology Society, Paper Number 115, Amsterdam, 1996.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``À¸Âμ§¾ì¸»¿äÄê¤Ë¤ª¤±¤ë¥ê¡¼¥É¥Õ¥£¡¼¥ë¥É¹ÔÎó¤ÎÀµµ¬²½''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 9, No. 1, pp. 54-57, 1996.
¾¾±º´´ÂÀ, »³Ê·û»Ê, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ë¿´Â¡¼§³¦²òÀϤȤ½¤Î°ÂÄêÀ­''. Ê¿À®£¸Ç¯Åŵ¤³Ø²ñÁ´¹ñÂç²ñ, Åìµþ, 1996.
À¶¿å¿®Ï¯, ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ë¼Â·Á¾õ¥Õ¥¡¥ó¥È¥à¥Ç¡¼¥¿¤Î²òÀÏ''. Ê¿À®£¸Ç¯Åŵ¤³Ø²ñÁ´¹ñÂç²ñ, Åìµþ, 1996.
K. Matsuura and Y. Okabe. ``Multiple Current-Dipole Distribution Reconstructed by Modified Selective Minimum-Norm Method''. In: 10th Int. Conf. on Biomagnetism, Santa Fe, 1996.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``¶Éºß¤·¤¿À¸Âμ§¾ì¸»Ê¬Éۤκƹ½À®''. Åŵ¤³Ø²ñÏÀʸ»ïC, Vol. 116-C, No. 2, pp. 223-229, 1996.
K. Matsuura and Y. Okabe. ``Multi-Dipole Estimation by Selective-Minimum-Norm Method''. In: C. Baumgartner, L. Deecke, G. Stroink, and S. J. Williamson, editors, Biomagnetism: Fundamental Research and Clinical Applications, pp. 381-384. Elsevier, Amsterdam, 1995.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì, »³Ê·û»Ê. ``À¸Âμ§¾ì¤ÎµÕÌäÂê''. ÅìµþÂç³ØÀèü²Ê³Øµ»½Ñ¸¦µæ¥»¥ó¥¿¡¼ Àèü¸¦µªÍ×, Vol. 8, p. 83, 1995.
¾¾±º´´ÂÀ, »³Ê·û»Ê, ²¬ÉôÍΰì. ``SMNË¡¤Ë¤è¤ë¿´Â¡¼§³¦È¯À¸¸»¤ÎÄÉÀ×''. Åŵ¤³Ø²ñ¥Þ¥°¥Í¥Æ¥£¥Ã¥¯¥¹¸¦µæ²ñ, MAG-95-143, 1995.
K. Matsuura, N. Shimizu, and Y. Okabe. ``Reconstruction of Sparse Dipole Source by Modified SMN Method''. In: 10th Tokyo Institute of Psychiatry Int. Symposium, 1995.
K. Matsuura and Y. Okabe. ``A Parametric Simplex Algorithm for Multi-Dipole Estimation''. Human Brain Mapping, Suppl. 1, p. 104, 1995.
¾¾±º´´ÂÀ, »³Ê·û»Ê, ²¬ÉôÍΰì. ``SMNË¡¤Ë¤è¤ë¿´Â¡¼§³¦¥Ç¡¼¥¿¤Î¥Þ¥ë¥Á¡¦¥À¥¤¥Ý¡¼¥ë²òÀÏ''. Åŵ¤³Ø²ñ¥Þ¥°¥Í¥Æ¥£¥Ã¥¯¥¹¸¦µæ²ñ, MAG-95-67, 1995.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Î»¨²»´¶ÅÙ''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 8, No. 1, pp. 142-145, 1995.
»³Ê·û»Ê, ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ëMCG²òÀÏ''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 8, No. 1, pp. 288-289, 1995.
K. Matsuura and Y. Okabe. ``Selective Minimum-Norm Solution of the Biomagnetic Inverse Problem''. IEEE Trans. Biomed. Eng., Vol. 42, No. 6, pp. 608-615, 1995.
²¬ÉôÍΰì, ¾¾±º´´ÂÀ, ËÙ°æ¿®ÃË. ``À¸Âμ§¾ì¤ÎµÕÌäÂê²òÀÏ''. ÅìµþÂç³ØÀèü²Ê³Øµ»½Ñ¸¦µæ¥»¥ó¥¿¡¼ Àèü¸¦µªÍ×, Vol. 7, p. 87, 1994.
¾¾±º´´ÂÀ. ``À¸Âμ§¾ìµÕÌäÂê¤ÎÁªÂòŪºÇ¾®¥Î¥ë¥à²ò''. ÅìµþÂç³Ø¹©³ØÉô Åŵ¤¹©³Ø¡¦ÅŻҾðÊ󹩳ء¦ÅŻҹ©³Ø×ÃÊó, No. 43, p. 143, 1994.
¾¾±º´´ÂÀ. ``À¸Âμ§¾ìµÕÌäÂê¤ÎÁªÂòŪºÇ¾®¥Î¥ë¥à²ò''. ÅìµþÂç³Ø½¤»ÎÏÀʸ, 1994.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÀ¸Âμ§¾ìµÕÌäÂê¤Î¶Éºß²ò''. Åŵ¤³Ø²ñ¥Þ¥°¥Í¥Æ¥£¥Ã¥¯¥¹¸¦µæ²ñ, MAG-94-174, 1994.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``³ÑÅÙÊÑ¿ô¤òƳÆþ¤·¤¿Àþ·Á·×²èË¡¤Ë¤è¤ë¥Þ¥ë¥Á¡¦¥À¥¤¥Ý¡¼¥ë¿äÄê''. Ê¿À®£¶Ç¯Åŵ¤³Ø²ñÅŻҡ¦¾ðÊ󡦥·¥¹¥Æ¥àÉôÌçÂç²ñ, Ê¡²¬, 1994.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÉÔÅù¼°À©Ìó¤òÍѤ¤¤¿²òÁж˻ҥΥë¥àºÇ¾®²½''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 7, No. 1, pp. 146-149, 1994.
²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ëǾ¼§³¦µÕÌäÂê''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 7, No. 1, pp. 20-23, 1994.
²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``À¸Âμ§¾ìµÕÌäÂê¤ÎÁªÂòŪºÇ¾®¥Î¥ë¥à²ò''. Åŵ¤³Ø²ñÄ´ººÀìÌç°Ñ°÷²ñ¡ÊÀ¸Â짵¤¡Ë, Åìµþ, 1994.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``SMNË¡¤Ë¤è¤ëÀ¸Â짵¤¤ÎµÕÌäÂê''. ÆüËܳؽѿ¶¶½²ñÂè146°Ñ°÷²ñ¹âÀ­Ç½SQUID¥·¥¹¥Æ¥àʬ²Ê²ñÂè21²ó¸¦µæ²ñ, Åìµþ, 1994.
²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``À¸Â짳¦µÕÌäÂê''. ÆüËܳؽѿ¶¶½²ñĶÅÁƳ¥¨¥ì¥¯¥È¥í¥Ë¥¯¥¹Âè146°Ñ°÷²ñÂè46²ó¸¦µæ²ñ, 1994.
ËÙ°æ¿®ÃË, ¾¾±º´´ÂÀ, Ã滳ÌÀ˧, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÁж˻ҿäÄê¤Îɾ²Á''. 1994ǯÅŻҾðÊóÄÌ¿®³Ø²ñ½Õµ¨Âç²ñ, ¿ÀÆàÀî, 1994.
ËÙ°æ¿®ÃË, ¾¾±º´´ÂÀ, Ã滳ÌÀ˧, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÁж˻ҿäÄê¤Îɾ²Á''. Ê¿À®£µÇ¯ÅÙÅŻҾðÊóÄÌ¿®³Ø²ñ³ØÀ¸²ñ¸¦µæȯɽ²ñ, ÀéÍÕ, 1994.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÁж˻ҿäÄê''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 6, No. 1, pp. 82-85, 1993.
K. Matsuura and Y. Okabe. ``Multi-Dipole Estimation by Selective-Minimum-Norm Method''. 9th Int. Conf. on Biomagnetism, Vienna, 1993.
²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``SQUID-CT¤ÎÀ¸Âμ§¾ìµÕÌäÂê''. ÅìµþÂç³ØÀèü²Ê³Øµ»½Ñ¸¦µæ¥»¥ó¥¿¡¼ Àèü¸¦µªÍ×, Vol. 6, pp. 85-86, 1993.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``²ò¥Ù¥¯¥È¥ëºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ëµÕÌäÂê¤Î²òË¡''. ÆüËܳؽѿ¶¶½²ñÂè146°Ñ°÷²ñ¹âÀ­Ç½SQUID¥·¥¹¥Æ¥àʬ²Ê²ñÂè14²ó¸¦µæ²ñ, Åìµþ, 1992.
¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``¥Þ¥ë¥Á¡¦¥À¥¤¥Ý¡¼¥ë¤ÎµÕ¿äÄê''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 5, No. 1, pp. 212-213, 1992.
¾¾±º´´ÂÀ. ``SQUID-CT¤ÎµÕÌäÂê''. ÅìµþÂç³Ø´¶ÈÏÀʸ, 1992.

Ãø½ñ

³Ø½Ñ¾ðÊ󥻥󥿡¼(ÊÔ). ÀõÌîÀµ°ìϺ, ¾¾±º´´ÂÀ, Æ£ÌǷ, ¾Â¿¬ ¹§, ÀÐÀîÀ齩(¶¦Ãø). ``¥Í¥Ã¥È¥ï¡¼¥¯¥»¥­¥å¥ê¥Æ¥£ ---³Ø½Ñ¾ðÊó¤Îȯ¿®¤ÈÊݸî---'', ´ÝÁ±, 1999.
º£°æ½¨¼ù, ¾¾±º´´ÂÀ(¶¦Ãø). ``¾ðÊ󥻥­¥å¥ê¥Æ¥£³µÏÀ'', ¾¼¹¸Æ². ¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ê¡¼¥ºÂ裶´¬, 1999.
¸¶ ¹¨¡¦·ª¾ë¿¿Ìé(¶¦ÊÔ). ``Ǿ¼§µ¤²Ê³Ø'', ¥ª¡¼¥à¼Ò. 1997.

¤½¤Î¾

K. Matsuura and H. Imai. ``A revised signature mode for the Internet Key Exchange''. Internet Draft, Matsuura_sign_mode_02.txt (current version), Sep. 1999.
K. Matsuura and H. Imai. ``A revised signature mode for the Internet Key Exchange''. Internet Draft, Matsuura_sign_mode_01.txt (previous version), Mar. 1999.
²¬ÉôÍΰì Ãø. ``³¨¤Ç¤ï¤«¤ëȾƳÂΤÈIC''. ÆüËܼ¶ȽÐÈǼÒ, Åìµþ, June 1994. (¼¹É®¶¨ÎÏ)
ÅìÂçÀèü¸¦¥°¥ë¡¼¥×¡ÊÊÔÃø¡Ë: ``ºÇÀèüµ»½Ñ¤Î¤¹¤Ù¤Æ»öŵ''. ÆüËܼ¶ȽÐÈǼÒ, Åìµþ, 1993. (¼¹É®¶¨ÎÏ)

Ìá¤ë


¾¾±º ¸¦µæ¼¼/ 153-8505 ÅìµþÅÔÌܹõ¶è¶ð¾ì4-6-1/ÅìµþÂç³ØÀ¸»ºµ»½Ñ¸¦µæ½ê ¾ðÊ󡦥¨¥ì¥¯¥È¥í¥Ë¥¯¥¹ÉôÌç(Âè3Éô)