¸¦µæȯɽ¥ê¥¹¥È(È´¿è)
¡Ê2006ǯ11·î1Æü¸½ºß¡Ë
English version is here.
- Nuttapong Attrapadung, Hideki Imai: ``Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure'', IEICE Transaction on Fundamentalof Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol.E90-A, No.1, pp.187-203, Jan. 2007.
- Marc P.C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura: ``An Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication'', Proceeding of 7th International Conference on Cryptology in India: Indocrypt'06 , Kalkata, India , Dec. 2006.
- Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: ``Efficient Identity-Based Encryption with Tight Security Reduction'', Lecture Notes in Computer Science (The 5th International Conference on Cryptology and Network Security: CANS 2006) , vol. 4301 , pp. 19-36 , Suzhou, Jiangsu, China , Dec. 2006.
- Nuttapong Attrapadung, Jun Furukawa, Hideki Imai: ``Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys'', Lecture Notes in Computer Science (ASIACRYPT 2006) , vol. 4284 , pp. 161-177 , Shanghai, China , Dec. 2006.
- Thi Lan Anh PHAN, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- ÂçȪ¿¿À¸, ¾¾±º´´ÂÀ: ``BB84Î̻Ҹ°ÇÛÁ÷¥×¥í¥È¥³¥ë¤Î°Ù¤ÎLDPCÉä¹æ¤òÍѤ¤¤¿CSSÉä¹æ¹½À®Ë¡, A Construction Method of CSS Codes Using LDPC Codes for BB84 Quantum Key Distribution'', Âè29²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à: SITA2006 , È¡´Û, Ë̳¤Æ» , Nov. 2006.
- ËÌÅÄÏË, ²Ö²¬¸ç°ìϺ, Nuttapong Attrapadung, Ä¥±Ô, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``BDDH²¾Äê¤ÈSquare BDDH²¾Äê¤Î´Ø·¸¤Î¹Í»¡, Relationship between BDDH Assumption and Square BDDH Assumption'', Âè29²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à: SITA2006 , È¡´Û, Ë̳¤Æ» , Nov. 2006.
- Nuttapong Attrapadung, Jun Furukawa, Kanta Matsuura, Hideki Imai: ``Searchable Public-Key Broadcast Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: ``Asymmetric RFID System Secure against Active Attack'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
- Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: ``Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
- Yang Cui, Kazukuni Kobara, Hideki Imai: ``Efficient Multiple Encryption from OW-PCA Primitives'', Proceeding of International Symposium on Information Theory and its Applications: ISITA2006 , Seoul, Korea , Oct. 2006.
- ¾¾±º´´ÂÀ: ``°Å¹æ²½µ»½Ñ¤ÎÊÑÁ«'', Åŵ¤³Ø²ñ»ï , vol. 126 , no. 10 , pp. 678-681 , Oct. 2006.
- Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption'', International Conference on Cryptology in Vietnam 2006¡§VietCrypt 2006 , Hanoi, Vietnam , Sep. 2006.
- ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤È¼Ò²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼êË¡¤òÅý¹ç¤·¤¿ÌÂÏǥ᡼¥ë¥Õ¥£¥ë¥¿¥ê¥ó¥°¤È¤½¤ÎºÇŬÅý¹çË¡'', ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï , vol. 47 , no. 8 , pp. 2548-2555 , Aug. 2006.
- Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai: ``Relations among Notions of Security for Identity Based Encryption Schemes'', IPSJ Journal , vol. 47 , no. 8 , pp. 2417-2429 , Aug. 2006.
- Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa: ``Tag-KEM from Set Partial Domain One-Way Permutations'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 360-370 , Melbourne, Australia , Jul. 2006.
- Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 348-359 , Melbourne, Australia , Jul. 2006.
- Wei Liu, Hideyuki Tanaka, Kanta Matsuura: ``An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan'', Workshop on the Economics of Information Security 2006¡§WEIS2006 , University of Cambridge, Cambridge, UK , Jun. 2006.
- »³¸ý¹â¹¯, ÀÄÌîÇî, Ëܶ¿ÀáÇ·, ¾¾±º´´ÂÀ: ``ʬÎव¤ì¤¿¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤Ë°Í¸¤¹¤ë¶¼°ÒȯÀ¸Î¨¤òƳÆþ¤·¤¿¥ê¥¹¥¯¥¢¥»¥¹¥á¥ó¥È¥â¥Ç¥ë, Risk Assessment Model Using Threat Probability Depending on Classified Information Security Measures'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð , vol. 2006 , no. 43 , pp. 7-12 , May. 2006.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Silent Cascade: Enhancing Location Privacy without Communication QoS Degradation'', Lecture Notes in Computer Science (Security in Pervasive Computing: Third International Conference: SPC 2006) , vol. 3934 , pp. 165-180 , York, UK , Apr. 2006.
- Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: ``Relations Among Notions of Security for Identity Based Encryption Schemes'', Lecture Notes in Computer Science (Jose R. Correa, Alejandro Hevia, Marcos Kiwi (editors)) (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium) , vol. 3887 , pp. 130-141 , Valdivia, Chile , Mar. 2006.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Applying Fujisaki-Okamoto to Identity-Based Encryption'', Lecture Notes in Computer Science (Marc Fossorier, Hideki Imai, Shu Lin, and Alain Poli (editors)) (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16) , vol. 3857 , pp. 183-192 , Las Vegas, NV, USA , Feb. 2006.
- °ÂÀ¾Í´°ìϺ(ȯ¹Ô), ¾¾ËÜ ÊÙ(ÊÔ): ``¾ðÊ󥻥¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ'', Ê¿À®17ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×¸¦µæÀ®²ÌÊó¹ð½ñ, A04¾ðÊ󥻥¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ , pp. 60-67 , Jan. 2006.
- ËÌÀîδ, ÍÌ˲, ²Ö²¬¸ç°ìϺ, Ä¥±Ô, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Æ£ºê¡¦²¬ËÜÊÑ´¹¤ÈREACT¤ÎID¥Ù¡¼¥¹°Å¹æ¤Ø¤ÎŬÍÑ'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹Åç , Jan. 2006.
- Wei Liu, Hideyuki Tanaka, Kanta Matsuura: ``Information Security Incidents and Countermeasures: An Empirical Analysis Based on an Enterprise Survey in Japan'', Proceedings of the 2006 Symposium on Cryptography and Information Security: SCIS2006 , ¹Åç , Jan. 2006.
- Xiaoyi Yu, Kanta Matsuura: ``Steganography with Hashing'', Proceedings of the 2006 Symposium on Cryptography and Information Security: SCIS2006 , ¹Åç , Jan. 2006.
- »³º¬¹°, ²«³ÚÊ¿, ¾¾±º´´ÂÀ, À¥ºê·°: ``Silent period¤òÍѤ¤¤¿RFID¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·¡¼Êݸî¼êË¡¤ÎÄó°Æ'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹Åç , Jan. 2006.
- ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤Ë¤è¤ëÆüËܸì¤ò´Þ¤à¥á¡¼¥ë¤Î¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ë¤Ä¤¤¤Æ¤Î¹Í»¡'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹Åç , Jan. 2006.
- ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``°Å¹æÍ×Áǵ»½Ñ¤òÍѤ¤¤Ê¤¤·èÄêÏÀŪ¥Ñ¥±¥Ã¥È¥Þ¡¼¥¥ó¥°Ë¡¤Ë¤è¤ëñ°ì¥Ñ¥±¥Ã¥ÈIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯¤Ë¤Ä¤¤¤Æ'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹Åç , Jan. 2006.
- ÂçȪ¿¿À¸, Ç븶³Ø, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``BB84Î̻Ҹ°ÇÛÁ÷¥×¥í¥È¥³¥ë¤Î¤¿¤á¤ÎLDPCÉä¹æ¹½À®Ë¡'', 2006ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2006)ͽ¹Æ½¸(CD-ROM) , ¹Åç , Jan. 2006.
- Kanta Matsuura: ``University-Industry Collaboration in SCIS Compared to the IEEE Symposium on Security and Privacy'', Proceedings of the 2006 Symposium on Cryptography and Information Security: SCIS2006 , ¹Åç , Jan. 2006.
- ÅÄÃ潨¹Ô, ¾¾±º´´ÂÀ: ``¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¡¦¥·¥¹¥Æ¥à¤ÎÀȼåÀ¤È¥»¥¥å¥ê¥Æ¥£Åê»ñ¤Ë´Ø¤¹¤ë¼Â¾ÚʬÀÏ'', ¼Ò²ñ¡¦·ÐºÑ¥·¥¹¥Æ¥à¡Ê¼Ò²ñ¡¦·ÐºÑ¥·¥¹¥Æ¥à³Ø²ñ»ï¡Ë , no. 26 , pp. 97-101, 2005.
- Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura: ``Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation'', Lecture Notes in Computer Science (Dengguo Feng, Dongdai Lin, Moti Yung (editors))(Information Security and Cryptology: First SKLOIS Conference: CISC 2005) , vol. 3822 , pp. 395-406 , Beijing, China , Dec. 2005.
- ÂçȪ¿¿À¸, Ç븶³Ø, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``BB84Î̻Ҹ°ÇÛÁ÷¥×¥í¥È¥³¥ë¤Î°Ù¤ÎÁÐÂÐÉä¹æ¤ò´Þ¤àLDPCÉä¹æ¹½À®Ë¡'', Proceedings of the 28th Symposium on Information Theory and Its Applications: SITA2005 , vol. µ , pp. 411-414 , Okinawa , Nov. 2005.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Towards Security Enhancement with Efficient Reduction for Identity Based Encryption'', Proceedings of the 28th Symposium on Information Theory and Its Applications: SITA2005 , vol. µ , pp. 163-166 , Okinawa , Nov. 2005.
- Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki: ``CARAVAN: Providing Location Privacy for VANET'', Embedded Security in Cars 2005: ESCAR 2005 , Cologne, Germany , Nov. 2005.
- ¾¾±º´´ÂÀ: ``ǧ¾Úµ»½Ñ¤ÎÍøÍѤËȼ¤¦¥»¥¥å¥ê¥Æ¥£ÌäÂê'', 2005ǯÅÙÂè1²óWeb¥µ¡¼¥Ó¥¹¥¤¥Ë¥·¥¢¥Æ¥£¥Ö¡¦¥ï¡¼¥¯¥·¥ç¥Ã¥× , Åìµþ , Oct. 2005.
- »³´ßÆƹ°, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¶¼°Ò¤ÎÄê¼°²½¤Ë´Ø¤¹¤ë°ì¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-II , no. 13 , pp. 579-584 , ¾¾»³ , Oct. 2005.
- ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤È¼Ò²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼êË¡¤òÅý¹ç¤·¤¿ÌÂÏǥ᡼¥ë¥Õ¥£¥ë¥¿¥ê¥ó¥°'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-I , no. 13 , pp. 325-330 , ¾¾»³ , Oct. 2005.
- ²«³ÚÊ¿, »³º¬¹°, ¾¾±º´´ÂÀ, À¥ºê·°: ``WLAN¤Î¥È¥é¥Õ¥£¥Ã¥¯ÆÃÀ¤ò¹Íθ¤·¤¿°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼Êݸî¥â¥Ç¥ë'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-I , no. 13 , pp. 181-186 , ¾¾»³ , Oct. 2005.
- ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Bloom¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿¥Ñ¥±¥Ã¥È¥Þ¡¼¥¥ó¥°Ë¡¤Ë¤è¤ëIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯¤Ç¤ÎÊ£¿ô¥Ñ¥±¥Ã¥ÈÍøÍÑÄÉÀפˤĤ¤¤Æ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2005ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2005-I , no. 13 , pp. 91-96 , ¾¾»³ , Oct. 2005.
- Atsuhiro Yamagishi, Kanta Matsuura, Hideki Imai: ``Cryptographic Module Validation Program in Japan'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. ¶ , pp. 485-489 , St. John's, Canada , Sep. 2005.
- Kanta Matsuura: ``University-Industry Collaboration in the Information Security Field: An International Comparison'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. µ , pp. 95-98 , St. John's, Canada , Sep. 2005.
- Åļ͵»Ò, ±§º¬Àµ»Ö, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``¥Ç¥¸¥¿¥ë½ð̾¤ÎĹ´üÍøÍѤˤĤ¤¤Æ'', ¶âÍ»¸¦µæ , vol. 24 , pp. 121-176 , Jul. 2005.
- Kanta Matsuura: ``Activity of Imai and Matsuura Laboratories, and Inter-Sector Collaboration There'', University of Tokyo/Royal Holloway Information Security Workshop , Jul. 2005.
- Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai: ``Relations among Notions of Security for Identity Based Encryption Schemes'', ÅŻҾðÊóÄÌ¿®³Ø²ñ¾ðÊ󥻥¥å¥ê¥Æ¥£¸¦µæ²ñ (ISEC) , vol. 105 , no. 194 , pp. 25-32 , À¹²¬»Ô¡¢´ä¼ê¸© , Jul. 2005.
- »³º¬¹°, ²«³ÚÊ¿, ¾¾±º´´ÂÀ, À¥ºê·°: ``QoS¤ò¹Íθ¤·¤¿°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼Êݸî¼êË¡¤Î¸¡Æ¤'', ÅŻҾðÊóÄÌ¿®³Ø²ñ¾ðÊ󥻥¥å¥ê¥Æ¥£¸¦µæ²ñ (ISEC) , pp. 203-210 , ´ä¼ê , Jul. 2005.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Protecting Location Privacy for Wireless Network'', ARO workshop on Localization in Wireless Sensor Networks , Seattle, USA , Jun. 2005.
- ²¬ËܱɻÊ, ¾¾±º´´ÂÀ, ÉÚ¹âÀ¯¼£, ÃöËóÆØÉ×: ``°Å¹æ¤Ë¤ª¤±¤ëÀȼåÀ¤Ë¤Ä¤¤¤Æ'', ¾ðÊó½èÍý , vol. 46 , no. 6 , pp. 625-629 , Jun. 2005.
- Hideyuki Tanaka, Kanta Matsuura: ``Vulnerability and Effects of Information Security Investment: A Firm Level Empirical Analysis of Japan'', International Forum of Financial Information Systems and Cybersecurity: A Public Policy Perspective , College Park, MD , May. 2005.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Towards Modeling Wireless Location Privacy'', Lecture Notes in Computer Science (Workshop on Privacy Enhancing Technologies) , Dubrovnik, Croatia , May. 2005.
- Kanta Matsuura: ``Cross-Sector Collaboration in Japanese Information-Security Industry, and the Shock of Personal Information Protection Laws'', Proceedings of the 11th International Conference on Industrial Engineering and Engineering Management , pp. 1178-1181 , Northeastern University, Shenyang, China , Apr. 2005.
- ¾¾ºê¹§Âç, ¾¾±º´´ÂÀ: ``½ð̾¸°Ï³±ÌÂкö¤Ë¤ª¤±¤ëMAC¤òÉÕÍ¿¤·¤¿ÅŻҽð̾¤Î¼ÂÁõÊý¼°'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð , vol. 2005 , pp. 369-373 , Mar. 2005.
- »³º¬¹°, ²«³ÚÊ¿, ¾¾±º´´ÂÀ, À¥ºê·°: ``Quantitative evaluation of privacy protection using silent period'', ÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ , Âçºå , Mar. 2005.
- Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki: ``Enhancing Wireless Location Privacy Using Silent Periods'', Proceedings of IEEE Wireless Communications and Networking Conference 2005 , vol. 2 , pp. 1187-1192 , New Orleans , Mar. 2005.
- °ÂÀ¾Í´°ìϺ(ȯ¹Ô), ¾¾ËÜ ÊÙ(ÊÔ): ``¾ðÊ󥻥¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ'', Ê¿À®16ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×¸¦µæÀ®²ÌÊó¹ð½ñ, A04¾ðÊ󥻥¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ , pp. 40-45 , Jan. 2005.
- ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Bloom¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿¥Ñ¥±¥Ã¥È¥Þ¡¼¥¥ó¥°Ë¡¤Ë¤è¤ëIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯¤Îµ¼ÍÛÀ³ÎΨ¤Ë¤Ä¤¤¤Æ'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. · , pp. 1555-1560 , ¿À¸Í , Jan. 2005.
- Åļ¸¦Êå, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``ÄêÅÀ´Ñ¬¥·¥¹¥Æ¥à¼ý½¸¥Ç¡¼¥¿¤òÍøÍѤ·¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È¶õ´ÖÊä´Ö¼êË¡¤ÎÄó°Æ¤ÈÁá´ü°Û¾ï¸¡ÃΤؤÎŬÍÑ'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. · , pp. 1381-1386 , ¿À¸Í , Jan. 2005.
- ¸Åëδ¹Ô, ¾¾±º´´ÂÀ: ``ưŪ¥µ¥ó¥×¥ê¥ó¥°¤È¾ðÊóÍýÏÀŪʣ»¨ÅÙÊÑÆ°¤òÍøÍѤ·¤¿¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¸¡ÃÎ¥·¥¹¥Æ¥à¤ÎºÇŬ²½'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. · , pp. 1363-1368 , ¿À¸Í , Jan. 2005.
- Jose Luis Lacson, Kanta Matsuura: ``Maximizing Election Security through the Efficient Use of Technology'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. · , pp. 1171-1174 , ¿À¸Í , Jan. 2005.
- ²«¶½²Ú, ¾¾±º´´ÂÀ: ``¥ê¥¢¥ë¥¿¥¤¥à¥Ó¥Ç¥ª¥»¥¥å¥ê¥Æ¥£'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. · , pp. 991-996 , ¿À¸Í , Jan. 2005.
- ²«³ÚÊ¿, ¾¾±º´´ÂÀ, »³º¬¹°, À¥ºê·°: ``̵Àþ´Ä¶¤Ë¤ª¤±¤ë°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼¤Î¥â¥Ç¥ë¤Ë´Ø¤¹¤ëÄó°Æ'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. µ , pp. 265-270 , ¿À¸Í , Jan. 2005.
- ÂçÊ¡ÂÙ¼ù, ¾¾±º´´ÂÀ: ``¥Ù¥¤¥¸¥¢¥ó¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿ÌÂÏǥ᡼¥ë¥Õ¥£¥ë¥¿¥ê¥ó¥°¤ÎºÇŬ²½'', 2005ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2005)ͽ¹Æ½¸ , vol. µ , pp. 199-204 , ¿À¸Í , Jan. 2005.
- Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo: ``Vulnerability and Information Security Investment: An Empirical Analysis of E-Local Government in Japan'', The Journal of Accounting and Public Policy , vol. 24 , no. Issue. 1 , pp. 37-59 , Jan. 2005.
- Åļ͵»Ò, ±§º¬Àµ»Ö, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``¥Ç¥¸¥¿¥ë½ð̾¤ÎĹ´üÍøÍѤˤĤ¤¤Æ'', ÆüËܶä¹Ô¶âÍ»¸¦µæ½ê IMES Discussion Paper Series , no. 2004-J-27 , Dec. 2004.
- Kanta Matsuura: ``Research Direction for Information Security in Academia'', German-Japanese Information Security Workshop --- Progress in Information Security in Japan and Germany , Ministry of Economy, Trade and Industry (METI), Tokyo, Japan , Oct. 2004.
- ÅÄÃ潨¹¬¡¤¾¾±º´´ÂÀ: ``¾ðÊ󥻥¥å¥ê¥Æ¥£Åê»ñ¤Î¥¤¥ó¥»¥ó¥Æ¥£¥Ö¡¦¥á¥«¥Ë¥º¥à¡§ ÅŻҼ«¼£ÂΤμ¾ڸ¦µæ'', ²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡Ö¾ðÊó³Ø¡×ÃìA06¸¦µæ²ñ , Ç®³¤»Ô, ÀŲ¬ , Oct. 2004.
- ÅÄÃ潨¹¬, ¾¾±º´´ÂÀ: ``¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¡¦¥·¥¹¥Æ¥à¤ÎÀȼåÀ¤È¥»¥¥å¥ê¥Æ¥£Åê»ñ¤Ë´Ø¤¹¤ë¼Â¾ÚʬÀÏ'', ¼Ò²ñ¡¦·ÐºÑ¥·¥¹¥Æ¥à³Ø²ñÂè23²óÂç²ñ¡Ö¥·¥¹¥Æ¥à¤Î¥ê¥¹¥¯¤È°ÂÁ´¤ò¹Í¤¨¤ë¡×Êó¹ðÍ×»Ý , pp. 12-13 , ¿áÅÄ»Ô, ÂçºåÉÜ , Oct. 2004.
- ²«³ÚÊ¿, ¾¾±º´´ÂÀ, »³º¬¹°, À¥ºê·°: ``̵Àþ´Ä¶¤Ë¤ª¤±¤ë°ÌÃÖ¾ðÊó¥×¥é¥¤¥Ð¥·¡¼ÌäÂê¤Îɾ²Á´ð½à¤Ë´Ø¤¹¤ëÄó°Æ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 793-798 , »¥ËÚ , Oct. 2004.
- »³´ßÆƹ°, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥¹¥Æ¥àÀ߷פ˴ؤ¹¤ë°ì¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 709-714 , »¥ËÚ , Oct. 2004.
- ±§º¬Àµ»Ö, Åļ͵»Ò, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``CA¸°Ï³±Ì»þ¤Ë¤ª¤±¤ëETSI TS 101 733¤Ë´ð¤Å¤¯½ð̾¤Î¸¡¾Ú²ÄǽÀ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 445-450 , »¥ËÚ , Oct. 2004.
- ±§º¬Àµ»Ö, Åļ͵»Ò, ´ä²¼Ä¾¹Ô, ¾¾ËÜ ÊÙ, ¾¾±º´´ÂÀ, º´¡¹ÌÚÎÉ°ì: ``¸ø³«¸°¾ÚÌÀ½ñ¡¦¼º¸ú¾ðÊó·ç»»þ¤Ë¤ª¤±¤ëETSI TS 101 733¤Ë´ð¤Å¤¯½ð̾¤Î¸¡¾Ú²ÄǽÀ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-II , no. 11 , pp. 439-444 , »¥ËÚ , Oct. 2004.
- ¸Åëδ¹Ô, ¾¾±º´´ÂÀ, ¥¢¥ó¥À¡¼¥½¥ó¡¦¥Ê¥·¥á¥ó¥È, º£°æ½¨¼ù: ``¥³¥ë¥â¥´¥í¥Õ¡¦¥³¥ó¥×¥ì¥¥·¥Æ¥£¤Ë¤è¤ëÊ£¿ô¤Î¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¤Î¸¡ÃÎ'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-I , no. 11 , pp. 361-366 , »¥ËÚ , Oct. 2004.
- ²«¶½²Ú, ¾¾±º´´ÂÀ: ``¥ê¥¢¥ë¥¿¥¤¥à¥Ó¥Ç¥ª¤Ë¤è¤ë¸Ä¿Íǧ¾Ú¥·¥¹¥Æ¥à'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-I , no. 11 , pp. 217-222 , »¥ËÚ , Oct. 2004.
- ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``Bloom¥Õ¥£¥ë¥¿¤òÍѤ¤¤¿¥Ñ¥±¥Ã¥È¥Þ¡¼¥¥ó¥°Ë¡¤Ë¤è¤ëIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2004ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2004-I , no. 11 , pp. 181-186 , »¥ËÚ , Oct. 2004.
- Hsing-Hua Huang, Kanta Matsuura: ``Real-Time Video Security for Financial Transactions'', The 2004 Workshop on Information Security Research Supported by MEXT Grant-in-Aid Scientific Research on Priority Area Informatics , Fukuoka, Japan , Oct. 2004.
- Hideyuki Tanaka, Kanta Matsuura: ``An Incentive Mechanism of Information Security Investment: An Empirical Study of e-Local Government in Japan'', The 2004 Workshop on Information Security Research Supported by MEXT Grant-in-Aid Scientific Research on Priority Area Informatics , Fukuoka, Japan , Oct. 2004.
- Kanta Matsuura, Ken Ebato: ``University-Industry Collaboration Networks in the Information Security Field in Japan: Problems and a Particular Success'', Proceedings of the 2004 IEEE International Engineering Management Conference: IEMC-2004 , vol. 2 , pp. 839-844 , Singapore , Oct. 2004.
- Kanta Matsuura, Hideki Imai: ``Inspection Mechanism For Server-and-Client Protocols With Private-Key Cipher'', The ETHICOMP Journal , vol. 1 , no. 3 , Aug. 2004.
- Jose Luis Lacson, Kanta Matsuura: ``The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas'', Lecture Notes in Computer Science , vol. 3183 , pp. 547-548 , Aug. 2004.
- ¾¾±º´´ÂÀ: ``¹âÀººÙÅŻһþ¹ï°õ¤Î¤¿¤á¤ÎÅŻҸøɽ¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë¸¦µæ'', Âè16²ó¸¦µæ½õÀ®À®²Ì³µÍ×½¸, ÂçÀî¾ðÊóÄÌ¿®´ð¶â , pp. 15 , Jul. 2004.
- ²«³ÚÊ¿, »³º¬¹°, ¾¾±º´´ÂÀ, À¥ºê·°: ``An Assessment of Wireless Location Privacy Risks in High Precision Positioning System'', ÅŻҾðÊóÄÌ¿®³Ø²ñ¾ðÊ󥻥¥å¥ê¥Æ¥£¸¦µæ²ñ (ISEC) , ÆÁÅç , Jul. 2004.
- Kanta Matsuura, Jose Luis Lacson, Terdoro Locsin, Jr.: ``Public Acceptance Issues Surrounding the Implementation of New Election Technology for the Philippines'', Twenty-sixth International Congress of Administrative Sciences , Seoul , Jul. 2004.
- Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo: ``Vulnerability and Information Security Investment: An Empirical Analysis of E-Local Government of Japan'', The Forum on Financial Systems and Cybersecurity: A Public Policy Perspective , College Park, MD , May. 2004.
- ¸Åëδ¹Ô, ¾¾±º´´ÂÀ, Anderson Nascimento, º£°æ½¨¼ù: ``¥³¥ë¥â¥°¥í¥Õ¡¦¥³¥ó¥×¥ì¥¥·¥Æ¥£¤ÎÊ£¿ô¤Î¶á»÷»»½ÐË¡¤È¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¸¡ÃΥѥե©¡¼¥Þ¥ó¥¹'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð , vol. 2004 , no. 22 , pp. 127-132 , Mar. 2004.
- Kanta Matsuura: ``Robustness of Entrusted Data-Analysis in E-Science Research Collaboration'', Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE04 , pp. 373-378 , Mar. 2004.
- Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo: ``An Analysis of Detailed Electronic Time-Stamping Using Digital TV'', Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE04 , pp. 277-284 , Mar. 2004.
- º£°æ½¨¼ù, ¾¾±º´´ÂÀ: ``¿Í´Ö¡¦¼Ò²ñ¤ÈĴϤ·¤¿¥Ç¥£¥Ú¥ó¥À¥Ö¥ë¾ðÊ󥻥¥å¥ê¥Æ¥£µ»½Ñ'', 21À¤µªCOE¡Ö¾ðÊó²Ê³Øµ»½ÑÀïά¥³¥¢¡×Âç°è¥Ç¥£¥Ú¥ó¥À¥Ö¥ë¾ðÊó´ðÈ×¥·¥ó¥Ý¥¸¥¦¥à»ñÎÁ½¸ , pp. 108-128 , Feb. 2004.
- °ÂÀ¾Í´°ìϺ(ȯ¹Ô), ¾¾ËÜ ÊÙ(ÊÔ): ``¾ðÊ󥻥¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ'', Ê¿À®15ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø ¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×¸¦µæÀ®²ÌÊó¹ð½ñ, A04¾ðÊ󥻥¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ , pp. 48-53 , Jan. 2004.
- ºÙ°æÂöϯ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``IP¥Ç¡¼¥¿¥°¥é¥à¤¬Àµµ¬¤ËÊÑ´¹¤µ¤ì¤ë¾ì¹ç¤ÎIP¥È¥ì¡¼¥¹¥Ð¥Ã¥¯µ»½Ñ¤Ë¤Ä¤¤¤Æ'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ¶ , pp. 1369-1373 , ÀçÂæ , Jan. 2004.
- Åļ¸¦Êå, ¾¾±º´´ÂÀ, º£°æ½¨¼ù: ``¥Ç¡¼¥¿¥Þ¥¤¥Ë¥ó¥°¤òÍѤ¤¤¿IDS¥í¥°Ê¬ÀÏ·ë²Ì¤Î³èÍÑ'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ¶ , pp. 1155-1160 , ÀçÂæ , Jan. 2004.
- ¸Åëδ¹Ô, ¾¾±º´´ÂÀ, Anderson Nascimento, º£°æ½¨¼ù: ``Kolmogorov Complexity¤Ë¤è¤ë¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¤Î¸¡ÃÎ¥·¥¹¥Æ¥à'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£ ¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ¶ , pp. 1145-1150 , ÀçÂæ , Jan. 2004.
- ¥Û¥»¡¦¥ë¥¤¥¹¡¦¥é¥¯¥½¥ó, ¾¾±º´´ÂÀ: ``¥Õ¥£¥ê¥Ô¥ó¤Îºß³°Åêɼ¼ÔÅÐÏ¿À©Å٤ˤª¤±¤ë¼ÂÍÑŪ¡¢µ»½ÑŪ¤ÊÌäÂê'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. ¶ , pp. 943-948 , ÀçÂæ , Jan. 2004.
- ¿¹³ÀÅØ, ¾¾±º´´ÂÀ, ¿ÜÆ£½¤: ``Digital TV¤òÍøÍѤ·¤¿¹âÀººÙ¥¿¥¤¥à¥¹¥¿¥ó¥×¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë°ÂÁ´Àɾ²Á'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. µ , pp. 597-602 , ÀçÂæ , Jan. 2004.
- ¹¾Çȸ͸¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥¥å¥ê¥Æ¥£Ê¬Ìî¤Ë¤ª¤±¤ë»º³ØÏ¢·È¸¦µæ'', 2004ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2004)ͽ¹Æ½¸ , vol. µ , pp. 13-18 , ÀçÂæ , Jan. 2004.
- ¸Åëδ¹Ô, ¾¾±º´´ÂÀ, Anderson Nascimento, º£°æ½¨¼ù: ``Kolmogorov Complexity¤Ë´ð¤Å¤¯¥µ¡¼¥Ó¥¹Ë¸³²¹¶·â¤Î¸¡ÃμêË¡'', Âè26²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥àͽ¹Æ½¸ , vol. ¶ , pp. 621-624 , ʼ¸Ë , Dec. 2003.
- Ken Ebato, Kenneth Pechter, Kanta Matsuura: ``University-Industry Research Collaboration in the Information Security Field in Japan'', Proceedings of the 2003 IEEE International Engineering Management Conference: IEMC-2003 , Albany, New York , Nov. 2003.
- Kanta Matsuura: ``Digital Security Tokens and Their Derivatives'', Netnomics , vol. 5 , no. 2 , pp. 161-179 , Nov. 2003.
- ÅÄÃ潨¹¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥Þ¥Í¥¸¥á¥ó¥È¤ÎÀ©ÅÙÀß·×'', Ê¿À®15ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡×ÃìA04¡Ö¾ðÊ󥻥¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ¡×¥ï¡¼¥¯¥·¥ç¥Ã¥× , Ê¡²¬ , Nov. 2003.
- ¾¾±º´´ÂÀ: ``¾ðÊ󥻥¥å¥ê¥Æ¥£´ðÈפ˵¯°ø¤¹¤ë¥ê¥¹¥¯¤ò´ÉÍý¤¹¤ë¤¿¤á¤Î¾ðÊó·ÐºÑ¹©³ØŪ¸¦µæ ---3¤Ä¤Î¥¢¥×¥í¡¼¥Á¤È³µÍ×---'', Ê¿À®15ǯÅÙʸÉô²Ê³Ø¾Ê²Ê³Ø¸¦µæÈñÊä½õ¶âÆÃÄêÎΰ踦µæ¡ÖIT¤Î¿¼²½¤Î´ðÈפòÂ󤯾ðÊó³Ø¸¦µæ¡× ÃìA04¡Ö¾ðÊ󥻥¥å¥ê¥Æ¥£¤Ë´Ø¤¹¤ëÁí¹çŪ¤Ê¸¦µæ¡×¥ï¡¼¥¯¥·¥ç¥Ã¥× , Ê¡²¬ , Oct. 2003.
- ÅÄÃ潨¹¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥Þ¥Í¥¸¥á¥ó¥È¤ÎÀ©ÅÙÀß·×'', Network Security Forum 2003 , Oct. 2003.
- ¹¾Çȸ͸¬, ¾¾±º´´ÂÀ: ``¾ðÊ󥻥¥å¥ê¥Æ¥£Ê¬Ìî¤Ë¤ª¤±¤ë»º³ØÏ¢·È¤Î¾õ¶·'', Network Security Forum 2003 , Oct. 2003.
- ¿¹³ÀÅØ, ¾¾±º´´ÂÀ, ¿ÜÆ£½¤: ``Digital TV¤òÍøÍѤ·¤¿Ä¶¹âÀººÙÅŻһþ¹ï°õ¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2003ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º , vol. 2003 , no. 15 , pp. 539-544 , Ê¡²¬ , Oct. 2003.
- K. Matsuura: ``Information Security and Economics in Computer Networks: An Interdisciplinary Survey and a Proposal of Integrated Optimization of Investment'', The 9th International Conference of Computing in Economics and Finance (CEF 2003), Seattle, July 2003. (PDF file)
- M. Ando, K. Matsuura, M. Kudo, and A. Baba: ``An Architecture of a Secure Database for Networked Collaborative Activities'', Proc. of 5th International Conference on Enterprise Information Systems (ICEIS 2003), ICEIS Press, Vol.I, pp.3-10, Angers, France, April 2003. (PDF file)
- ¾®¿¹ °°, ²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``½ð̾¸°Ï³±ÌÌäÂê¤Ë¤ª¤±¤ëÅŻҾڵòÀ¸À®µ»½Ñ¤Ë¤Ä¤¤¤Æ'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.II, pp.983-988, Jan. 2003. (PDF file)
- ¹¾ÇÈ¸Í ¸¬, ¥±¥Í¥¹¡¦¥Ú¥¯¥¿¡¼, ¾¾±º´´ÂÀ. ``SCIS¤Ë¤ª¤±¤ë»º³ØÏ¢·È¤Î¾õ¶·'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.I, pp.569-574, Jan. 2003. (PDF file)
- °ÂÅì ³Ø, ¾¾±º´´ÂÀ, ÇÏ¾ì ¾Ï. ``ÆâÉôÉÔÀµ¼Ô¤ò¹Íθ¤·¤¿¥°¥ë¡¼¥×¸°¶¦ÍÊý¼°¤Ë´Ø¤¹¤ë¹Í»¡'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.I, pp.125-130, Jan. 2003. (PDF file)
- ¾¾±º´´ÂÀ. ``¾ðÊ󥻥¥å¥ê¥Æ¥£¤È·ÐºÑ³Ø'', 2003ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2003)ͽ¹Æ½¸, Vol.I, pp.475-480, Jan. 2003. (PDF file)
- °ÂÅì ³Ø, ¾¾±º´´ÂÀ, ÇÏ¾ì ¾Ï. ``ʬ»¶´Ä¶¤ÇÊݸ¤µ¤ì¤ë¥í¥°¥Õ¥¡¥¤¥ë¤Ë¤ª¤±¤ë³Æ¥í¥°¥¨¥ó¥È¥ê¡¼´Ö¤Î½ç½ø´Ø·¸ÊݾÚÊýË¡¤Ë´Ø¤¹¤ë¹Í»¡'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2002ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º, Vol.2002, No.16, pp.1-6, Oct. 2002. (PDF file)
- R. Zhang, M. Kudo, K. Matsuura and H. Imai: ``A Model for Signature Revocation'', Proc. of 2002 International Symposium on Information Theory and Its Applications (ISITA 2002), pp.455-458, Xi'an, PRC, Oct. 2002. (PDF file)
- ¾¾±º´´ÂÀ. ``ÅŻҥ»¥¥å¥ê¥Æ¥£¥È¡¼¥¯¥ó¤È¤½¤ÎÇÉÀ¸¾¦ÉÊ'', ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, vol.43, no.8, pp.2372-2380, August 2002.
- K. Matsuura. ``Virtual Private Laboratories: Concept and Two Building Blocks'', Proceedings of the 2002 IEEE International Engineering Management Conference (IEMC 2002), vol.II, pp.876-881, August 2002. (PDF file)
- K. Matsuura. ``Digital Security Tokens in Network Commerce: Modeling and Derivative Application'', 8th International Conference of the Society for Computational Economics --- Computing in Economics and Finance (CEF 2002), Aix-en-Provence, France, June 2002. (PDF file)
- K. Matsuura and H. Imai. ``Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal'', Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002), Volume 2, ICEIS Press, pp.962-967, April, 2002. (PDF file)
- ¾¾±º´´ÂÀ. ``ÅŻҥ»¥¥å¥ê¥Æ¥£¥È¡¼¥¯¥ó¤Î¥â¥Ç¥ë²½¤È±þÍÑ'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.I, pp.73-78, Jan. 2002. (PDF file)
- Åļ ¿Î, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¿³ººÇ½ÎϤˤĤ¤¤Æ¹Íθ¤·¤¿Â¿¼¡¸µ¥È¥é¥¹¥È¥á¥È¥ê¥Ã¥¯¤Ë´Ø¤¹¤ë¹Í»¡'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.I, pp.103-108, Jan. 2002. (PDF file)
- ÉûÅç ¿¸, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``ÅŻҸ¢ÍøήÄÌÊý¼°ÂФ˴ؤ¹¤ëÆÃÀʬÀÏ'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.I, pp.223-228, Jan. 2002. (PDF file)
- ¾®¿¹ °°, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``ÅŻҾ¦¼è°ú¤Ë¤ª¤±¤ëʶÁè²ò·è¤Î¤¿¤á¤ÎÅŻҾڵòʪ¤Ë´Ø¤¹¤ëʬÀÏ'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.II, pp.627-632, Jan. 2002. (PDF file)
- »³Ã濸¼¤, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¿¯Æþ¸¡ÃεڤÓÆâÉô¹¶·â¼Ô¸¡ÃΤȥҥ塼¥Þ¥ó¥¯¥ê¥×¥È'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.II, pp.979-984, Jan. 2002. (PDF file)
- °ÂÅì ³Ø, ¾¾±º´´ÂÀ, ¹©Æ£Æ»¼£, ÇÏ¾ì ¾Ï. ``¿µ¡Ç½¥»¥¥å¥¢¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î¥¢¥¯¥»¥¹À©¸æ¥Ý¥ê¥·¡¼ÀßÄêÌäÂê'', 2002ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS2002)ͽ¹Æ½¸, Vol.II, pp.991-996, Jan. 2002. (PDF file)
- R. Zhang, M. Kudoh, K. Matsuura and H. Imai. ``Instance Revocation of Digital Signature and Its Applications'', Proc. of the 2002 Symposium on Cryptography and Information Security (SCIS2002), Vol.II, pp.1143-1148, Jan. 2002. (PDF file)
- ¾®¿¹ °°, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``·ÀÌó»þ¤Ëź¤¨¤ëÉÕ²ÃŪ¤ÊMAC¤Ë´Ø¤¹¤ëÁí¹çŪʬÀÏ'', ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, CSEC-15, pp.31-36, Dec. 2001. (PDF file)
- K. Matsuura. ``A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce''. Proc. of Third International Conference on Information and Communications Security (ICICS'01), Lecture Notes in Computer Science 2229, Springer-Verlag, pp. 90-94, Nov. 2001. (PDF file)
- °ÂÅì ³Ø, ¾¾±º´´ÂÀ, ÇÏ¾ì ¾Ï. ``¿Íͤʥ»¥¥å¥ê¥Æ¥£Áàºî¤ò¹Íθ¤·¤¿¥ª¥Ö¥¸¥§¥¯¥È»Ø¸þ¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î¹½Â¤'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2001ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º, Vol.2001, No.15, pp.19-24, Oct. 2001. (PDF file)
- ¾®¿¹ °°, ¾¾±º´´ÂÀ, ¿ÜÆ£ ½¤. ``PKI¤Ë´ð¤Å¤¯C/S·¿¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î°ÂÁ´ÀʬÀϤȾڵòÀɾ²Á'', ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à(CSS)2001ÏÀʸ½¸, ¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º, Vol.2001, No.15, pp.319-324, Oct. 2001. (PDF file)
- K. Matsuura. ``Effects of Data Hiding on Remote Data Analysis''. IPSJ Journal, Vol.42, No.10, pp.2526-2532, Oct. 2001.
- K. Matsuura. ``Echo Back in Implementation of Passphrase Authentication''. Proc. of the 2001 International Workshop on Cryptology and Network Security, pp.238-245, September 2001. (PDF file)
- K. Matsuura. ``Security Token and Its Derivative in Discrete-Time Models''. Proc. of 5th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, FL, July 2001. (PDF file)
- K. Matsuura. ``Digital Security Tokens and Their Derivatives''. 7th International Conference of the Society for Computational Economics (SCE'01), New Haven, CT. June 2001.
- ¾¾±º´´ÂÀ. ``¥Ç¥£¥¸¥¿¥ë¡¦¥È¡¼¥¯¥ó¤ÎÉÔ³ÎÄêÀ¤ÈÆó¹à¥â¥Ç¥ë¤Ë¤è¤ë¥ê¥¹¥¯¥Ø¥Ã¥¸É¾²Á''. ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, CSEC-13, pp.31-36, May 2001. (PDF file)
- S. Hirose and K. Matsuura. ``Key Agreement Protocols Resistant to a Denial-of-Service Attack''. IEICE Transactions on Information and Systems, Vol.E84-D, No.4, pp.477-484, April 2001.
- K. Matsuura. ``Security Tokens and Their Derivatives''. Technical Reports 29, Centre for Communications Systems Research, University of Cambridge, Feb. 2001. (PDF file)
- K. Matsuura and H. Imai. ``Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks''. IEICE Transactions on Information and Systems, Vol.E83-D, No.5, pp.972-979, May 2000.
- K. Matsuura and H. Imai. ``Generation, Verification, and Renewal of Digital Time-Stamps''. Imai Laboratory Research Monograph Series, No.2000-1, pp.44-53, March 2000.
- K. Matsuura and H. Imai. ``Modification of Internet Key Exchange Resistant against Denial-of-Service''. Pre-Proc. of Internet Workshop 2000 (IWS2000), pp.167-174, Feb. 2000. (gzipped PS file)
- K. Matsuura. ``Evaluation of DoS Resistance in Relation to Performance Dynamics''. The 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan. Jan. 2000. (gzipped PS file)
- ¾¾±º´´ÂÀ. ``¥¿¥¤¥à¥¹¥¿¥ó¥Ô¥ó¥°¥·¥¹¥Æ¥à¤Î¸½¾õ¤È¾Íè''. ¼¡¡¹À¤Âåǧ¾Úµ»½Ñ¤ª¤è¤Ó¥»¥¥å¥ê¥Æ¥£¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¤Ë´Ø¤¹¤ë¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, December 1999.
- º£°æ½¨¼ù, ¾¾±º´´ÂÀ. ``¾ðÊ󥻥¥å¥ê¥Æ¥£µ»½Ñ¤Î´ðÁäȱþÍÑ ---ÌÀ¤ë¤¤¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤òÃÛ¤¯¸°---''. Ê¿À®11ǯÅÙÀ¸¸¦¥»¥ß¥Ê¡¼, Åìµþ, December 1999.
- ¶âëÆÆϺ, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``ÉÔÀµ¥ê¥¯¥¨¥¹¥È¤ËÂФ¹¤ëºÆÁ÷À©¸æ¥á¥«¥Ë¥º¥à¤Ë´Ø¤¹¤ë°ì¸¡Æ¤''. Âè22²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥àͽ¹Æ½¸, pp.781-784, December 1999.
- ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¸°¶¦Í¥×¥í¥È¥³¥ë¤È¥Ñ¥±¥Ã¥ÈÀ©¸æ¤Ë´Ø¤¹¤ë°ì¹Í»¡''. Âè22²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥àͽ¹Æ½¸, pp.777-780, December 1999 (gzipped PS file).
- S. Hirose and K. Matsuura. ``Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack''. In V. Varadharajan and Y. Mu (eds.), Lecture Notes in Computer Science 1726, Springer-Verlag, Berlin, pp.169-182, November 1999.
- ¾¾±º´´ÂÀ. ``¥Ç¥¸¥¿¥ë¥¿¥¤¥à¥¹¥¿¥ó¥×µ»½Ñ¤Î¸½¾õ¤È²ÝÂê''. Âè2²ó¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, November 1999.
- ¾¾±º´´ÂÀ. ``°Å¹æ¡¦Ç§¾Úµ»½Ñ¤È¥¤¥ó¥¿¡¼¥Í¥Ã¥È±þÍÑ''. ¥Æ¥¯¥Î¥·¥¹¥Æ¥à¹Ö½¬²ñ¡Ö¥Í¥Ã¥È¥ï¡¼¥¯¤Î¥»¥¥å¥ê¥Æ¥£¤È°Å¹æ¡¦Ç§¾Ú¤ÎºÇ¿·Æ°¸þ¡×»ñÎÁ, pp.1-30, Oct. 1999.
- K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Cientifica, Vol.2, No.11, pp.15-19, 1999. (gzipped PS file)
- ±§º¬Àµ»Ö, ¾¾±º´´ÂÀ, ÅÄÁÒ ¾¼. ``¥Ç¥¸¥¿¥ë¥¿¥¤¥à¥¹¥¿¥ó¥×µ»½Ñ¤Î¸½¾õ¤È²ÝÂê''. ÆüËܶä¹Ô¶âÍ»¸¦µæ½ê IMES Discussion Paper Series, No.99-J-36. Oct. 1999. (Available at IMES's page)
- K. Matsuura. ``Effects of Data Hiding on Remote Data Analysis''. Proceedings of Computer Security Symposium'99 (CSS'99), pp.81-86, Oct. 1999. (gzipped PS file)
- K. Matsuura and H. Imai. ``Toward Research-Promotion Infrastructure for Multi-Modal Imaging''. In T. Yoshimoto et. al. (eds.) Recent Advances in Biomagnetism, pp.911-914, Tohoku University Press, Sendai, 1999. (gzipped PS file)
- K. Matsuura and H. Imai. ``Activity Report of IIS E-Commerce and Digital-Cash Committee''. The 5th International Conference on Ethical Issues of Information Technology, Rome, Oct. 1999.
- ¾¾±º´´ÂÀ. ``IKE¤Ë¤ª¤±¤ëǧ¾Ú¥â¡¼¥É¤È¥µ¡¼¥Ó¥¹Ë¸³²¹¶·âÂÑÀ¤Î²òÀÏ''. ¾ðÊó½èÍý³Ø²ñÂè59²ó(Ê¿À®11ǯ¸å´ü)Á´¹ñÂç²ñ ÆÃÊÌ¥»¥Ã¥·¥ç¥ó(3)¹Ö±éÏÀʸ½¸, pp.43-50, Sep. 1999.
- ¾¾±º´´ÂÀ. ``AES¤Î»ÅÍͤÈÁªÄê¾õ¶·¤Ë¤Ä¤¤¤Æ''. Âè8²óÁá°ðÅÄÂç³ØÅŻҾ¦¼è°ú¸¦µæ²ñ, July 1999.
- K. Matsuura and H. Imai. ``Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack''. Proc. of Internet Workshop'99 (IWS'99), IEEE Press, pp.17-24, 1999. (gzipped PS file)
- ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``ȯ¿®¥Õ¥£¥ë¥¿¥ê¥ó¥°´Ä¶²¼¤Î¸°¶¦Í¥×¥í¥È¥³¥ë¤Ë¤ª¤±¤ëÊĺÉΨɾ²Á''. 1999ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'99)ͽ¹Æ½¸, Vol. II, pp. 893-898, Jan. 1999. (gzipped PS file)
- K. Matsuura. ``Protection of Three-Pass Key-Agreement Protocols against a Denial-of-Service Attack''. Bell Labs Crypto/Security Seminar, NJ, March 1999.
- S. Hirose and K. Matsuura. ``Enhancing the resistance of a secure key agreement protocol to a denial-of-service attack''. Proc. of the 1999 Symposium on Cryptography and Information Security (SCIS'99), Vol. II, pp. 899-904, Jan. 1999.
- ¾¾±º´´ÂÀ. ``¼Ò²ñ²Ê³Ø¼Ô¤«¤é¸«¤¿¥×¥é¥¤¥Ð¥·¡¼´ØÏ¢ÌäÂê''. Âè21²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à, ´ôÉì, Dec. 1998.
- ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``¸°¶¦Í¥×¥í¥È¥³¥ë¤Î¥µ¡¼¥Ó¥¹Ë¸³²¹¶·âÂкö''. Âè21²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à, ´ôÉì, Dec. 1998.
- ¾¾±º´´ÂÀ, ``Âè4²ó¾ðÊ󵻽ѤÎÎÑÍýÌäÂê¹ñºÝ²ñµÄ(ETHICOMP98)»²²ÃÊó¹ð''. ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, Vol. 98, No. 391, FACE98-19, pp. 37-42, Nov. 1998.
- ¾¾±º´´ÂÀ. ``°Å¹æ¡¦Ç§¾Úµ»½Ñ¤È¥Í¥Ã¥È¥ï¡¼¥¯''. Ê¿À®£±£°Ç¯ÅٳؽѾðÊ󥻥󥿡¼¥·¥ó¥Ý¥¸¥¦¥à»ñÎÁ, pp. 16-23, Nov. 1998.
- K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 466-470, Oct. 1998. (gzipped PS file)
- ×¢À¥¾¡°ì, ¾¾±º´´ÂÀ. ``¥µ¡¼¥Ó¥¹µñÈݹ¶·â¤ËÂФ·¤ÆÂÑÀ¤Î¤¢¤ë¸°¶¦Í¥×¥í¥È¥³¥ë''. ÅŻҾðÊóÄÌ¿®³Ø²ñ1998ǯ´ðÁᦶ³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ, »³Íü, Oct. 1998.
- ²Ö²¬¸ç°ìϺ, À¾²¬ µ£, ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``Advanced KPS¤Ë¤ª¤±¤ëProvider´Ö¤Î¸°¤ÎÉÔÀµÆ³½Ð¤È¤½¤ÎÂбþ¤Ë´Ø¤¹¤ë°ì¸¡Æ¤''. ÅŻҾðÊóÄÌ¿®³Ø²ñ1998ǯ´ðÁᦶ³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ, »³Íü, Oct. 1998.
- G. Hanaoka, T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``On Advanced KPS: An Optimized KPS against Collusion Attacks''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 247-250, Oct. 1998.
- K. Matsuura. ``One-Time Rental of Membership for Server-and-Client Protocol with Private-Key Cipher''. ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, Vol. 98, No. 83, 98-MBL-6-8, pp. 53-60, Sep. 1998.
- K. Matsuura and H. Imai. ``Toward Research-Promotion Infrastructure for Multi-Modal Imaging''. 11th International Conference on Biomagnetism (BIOMAG98), Sendai, Aug. 1998.
- ¾¾±º´´ÂÀ, º£°æ½¨¼ù. ``Åý¹ç¸¦µæÂ¥¿Ê¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¡¼¤Ë¸þ¤±¤Æ''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 11, No. 1, pp. 100-101, May 1998.
- K. Matsuura, Y. Zheng, and H. Imai. ``Compact and Flexible Resolution of CBT Multicast Key-Distribution''. Proc. of Worldwide Computing and Its Applications '98 (WWCA'98), Lecture Notes in Computer Science 1368, Springer-Verlag, pp. 190-205, Mar. 1998. (gzipped PS file)
- K. Matsuura and H. Imai. ``Inspection Mechanism for Server-and-Client Protocols with Private-Key Cipher''. The 4th International Conference on Ethical Issues of Information Technology, Rotterdam, Mar. 1998. (PDF file)
- ²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤Ë¤ª¤±¤ë¸úΨŪ¤ÊÅŻҷèºÑÊý¼°¤Ë¸þ¤±¤Æ''. ÅŻҾðÊóÄÌ¿®³Ø²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤È¥é¥¤¥Õ¥¹¥¿¥¤¥ë¸¦µæ²ñÂ裲²ó¥ï¡¼¥¯¥·¥ç¥Ã¥×, Åìµþ, Mar. 1998.
- ²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``Secure Electronic Transaction (SET) ¤Î¹â®²½¤Ë´Ø¤¹¤ë°ì¼êË¡''. 1998ǯÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ, Ê¿ÄÍ, Mar. 1998.
- ²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``ÂÐÌÌÈÎÇä¤Ë¤ª¤±¤ë¥¯¥ì¥¸¥Ã¥È·èºÑ¤Î¹â®²½¤Ë´Ø¤¹¤ë°ì¸¡Æ¤''. 1998ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'98), É;¾, Jan. 1998.
- ¾¾±º´´ÂÀ, ÂÀÅÄÏÂÉ×. ``1997 Korea-Japan Joint Workshop on Information Seurity and Cryptology¡¤1997ǯ10·î26Æü¡Á28Æü''. 1998ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'98), É;¾, Jan. 1998.
- ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``¥°¥ë¡¼¥×¸°ÇÛÁ÷¤òȼ¤Ã¤¿¥³¥ó¥Ñ¥¯¥È¤ÊCBT²ÃÆþ¥á¥Ã¥»¡¼¥¸¤È»ö¸å¥×¥í¥»¥¹¥á¥Ã¥»¡¼¥¸''. 1998ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à(SCIS'98), É;¾, Jan. 1998.
- ²Ö²¬¸ç°ìϺ, ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``LITESET ---¸úΨŪÅŻҷèºÑ¤Ë¸þ¤±¤Æ---''. ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¹âÅÙ¾ðÊóÄÌ¿®¥·¥¹¥Æ¥à¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, Jan. 1998.
- K. Matsuura, Y. Zheng, and H. Imai. ``Electronic Safe-Deposit Box''. Âè20²ó¾ðÊóÍýÏÀ¤È¤½¤Î±þÍÑ¥·¥ó¥Ý¥¸¥¦¥à(SITA97)ͽ¹Æ½¸, pp. 385-388, Dec. 1997.
- ¾¾±º´´ÂÀ. ``¥«¡¼¥É¥»¥¥å¥ê¥Æ¥£¤È¾ðÊóÊÝ´É''. Âè1²ó¥¤¥ó¥¿¡¼¥Ê¥·¥ç¥Ê¥ë¡¦¥«¡¼¥É¡¦¥»¥¥å¥ê¥Æ¥£¡¦¥·¥ó¥Ý¥¸¥¦¥à, Åìµþ, Nov. 1997.
- K. Matsuura, Y. Zheng, and H. Imai. ``Compact, Secure, and Unforgeable Key Agreement on Internet''. Rump Session of International Conference on Information and Communications Security '97, Beijing, Nov. 1997.
- ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``CBT¥ë¡¼¥Æ¥£¥ó¥°¤òÍøÍѤ·¤¿¥Þ¥ë¥Á¥¥ã¥¹¥È¸°ÇÛÁ÷¤Îɾ²Á¤È¸úΨ²½''. ÅŻҾðÊóÄÌ¿®³Ø²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¸¦µæ²ñÂè°ì²ó¥ï¡¼¥¯¥·¥ç¥Ã¥×»ñÎÁ, pp. 53-60, Oct. 1997.
- T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``A Proposal for Authenticated Key Recovery System''. Proceedings of JW-ISC'97 (1997 Korea-Japan Joint Workshop on Information Security and Cryptology), Seoul, pp. 189-196, Oct. 1997.
- ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``Signcryption¤Ë¤è¤ë¸úΨŪ¤ÊIPng¸°¾ðÊóÇÛÁ÷''. ÅŻҾðÊóÄÌ¿®³Ø²ñ1997ǯ´ðÁᦶ³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ¹Ö±éÏÀʸ½¸, A-7-19, p. 144, Sep. 1997.
- ¾¾±º´´ÂÀ, Å¢ ¶ÌÎÉ, º£°æ½¨¼ù. ``¥»¥¥å¥ê¥Æ¥£µ¡Ç½¤òÈ÷¤¨¤¿¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤Ë¤ª¤±¤ë¥æ¡¼¥¶Ééô''. ÅŻҾðÊóÄÌ¿®³Ø²ñ¥Í¥Ã¥È¥ï¡¼¥¯¼Ò²ñ¤È¥é¥¤¥Õ¥¹¥¿¥¤¥ë¸¦µæ²ñ»ñÎÁ(Âè1²ó), No. 1, pp. 36-41, Aug. 1997.
- K. Matsuura and Y. Okabe. ``A Robust Reconstruction of Sparse Biomagnetic Sources''. IEEE Trans. Biomed. Eng., Vol. 44, No. 8, pp. 720-726, 1997.
- K. Matsuura, N. Shimizu, and Y. Okabe. ``Reconstruction of Sparse Dipole Source by a Modified SMN Method''. In: I. Hashimoto, Y. C. Okada, and S. Ogawa, editors, Visualization of Information Processing in the Human Brain: Recent Advances in MEG and Functional MRI (EEG Suppl. 47), pp. 421-429. Elsevier, Amsterdam, 1996.
- K. Matsuura and Y. Okabe. ``L_p-Normalized Minimum-L1-Norm Solution of the Biomagnetic Inverse Problem''. In: 18th Annual Int. Conf. of the IEEE Engineering in Medicine and Biology Society, Paper Number 115, Amsterdam, 1996.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``À¸Âμ§¾ì¸»¿äÄê¤Ë¤ª¤±¤ë¥ê¡¼¥É¥Õ¥£¡¼¥ë¥É¹ÔÎó¤ÎÀµµ¬²½''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 9, No. 1, pp. 54-57, 1996.
- ¾¾±º´´ÂÀ, »³Ê·û»Ê, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ë¿´Â¡¼§³¦²òÀϤȤ½¤Î°ÂÄêÀ''. Ê¿À®£¸Ç¯Åŵ¤³Ø²ñÁ´¹ñÂç²ñ, Åìµþ, 1996.
- À¶¿å¿®Ï¯, ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ë¼Â·Á¾õ¥Õ¥¡¥ó¥È¥à¥Ç¡¼¥¿¤Î²òÀÏ''. Ê¿À®£¸Ç¯Åŵ¤³Ø²ñÁ´¹ñÂç²ñ, Åìµþ, 1996.
- K. Matsuura and Y. Okabe. ``Multiple Current-Dipole Distribution Reconstructed by Modified Selective Minimum-Norm Method''. In: 10th Int. Conf. on Biomagnetism, Santa Fe, 1996.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``¶Éºß¤·¤¿À¸Âμ§¾ì¸»Ê¬Éۤκƹ½À®''. Åŵ¤³Ø²ñÏÀʸ»ïC, Vol. 116-C, No. 2, pp. 223-229, 1996.
- K. Matsuura and Y. Okabe. ``Multi-Dipole Estimation by Selective-Minimum-Norm Method''. In: C. Baumgartner, L. Deecke, G. Stroink, and S. J. Williamson, editors, Biomagnetism: Fundamental Research and Clinical Applications, pp. 381-384. Elsevier, Amsterdam, 1995.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì, »³Ê·û»Ê. ``À¸Âμ§¾ì¤ÎµÕÌäÂê''. ÅìµþÂç³ØÀèü²Ê³Øµ»½Ñ¸¦µæ¥»¥ó¥¿¡¼ Àèü¸¦µªÍ×, Vol. 8, p. 83, 1995.
- ¾¾±º´´ÂÀ, »³Ê·û»Ê, ²¬ÉôÍΰì. ``SMNË¡¤Ë¤è¤ë¿´Â¡¼§³¦È¯À¸¸»¤ÎÄÉÀ×''. Åŵ¤³Ø²ñ¥Þ¥°¥Í¥Æ¥£¥Ã¥¯¥¹¸¦µæ²ñ, MAG-95-143, 1995.
- K. Matsuura, N. Shimizu, and Y. Okabe. ``Reconstruction of Sparse Dipole Source by Modified SMN Method''. In: 10th Tokyo Institute of Psychiatry Int. Symposium, 1995.
- K. Matsuura and Y. Okabe. ``A Parametric Simplex Algorithm for Multi-Dipole Estimation''. Human Brain Mapping, Suppl. 1, p. 104, 1995.
- ¾¾±º´´ÂÀ, »³Ê·û»Ê, ²¬ÉôÍΰì. ``SMNË¡¤Ë¤è¤ë¿´Â¡¼§³¦¥Ç¡¼¥¿¤Î¥Þ¥ë¥Á¡¦¥À¥¤¥Ý¡¼¥ë²òÀÏ''. Åŵ¤³Ø²ñ¥Þ¥°¥Í¥Æ¥£¥Ã¥¯¥¹¸¦µæ²ñ, MAG-95-67, 1995.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Î»¨²»´¶ÅÙ''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 8, No. 1, pp. 142-145, 1995.
- »³Ê·û»Ê, ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ëMCG²òÀÏ''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 8, No. 1, pp. 288-289, 1995.
- K. Matsuura and Y. Okabe. ``Selective Minimum-Norm Solution of the Biomagnetic Inverse Problem''. IEEE Trans. Biomed. Eng., Vol. 42, No. 6, pp. 608-615, 1995.
- ²¬ÉôÍΰì, ¾¾±º´´ÂÀ, ËÙ°æ¿®ÃË. ``À¸Âμ§¾ì¤ÎµÕÌäÂê²òÀÏ''. ÅìµþÂç³ØÀèü²Ê³Øµ»½Ñ¸¦µæ¥»¥ó¥¿¡¼ Àèü¸¦µªÍ×, Vol. 7, p. 87, 1994.
- ¾¾±º´´ÂÀ. ``À¸Âμ§¾ìµÕÌäÂê¤ÎÁªÂòŪºÇ¾®¥Î¥ë¥à²ò''. ÅìµþÂç³Ø¹©³ØÉô Åŵ¤¹©³Ø¡¦ÅŻҾðÊ󹩳ء¦ÅŻҹ©³Ø×ÃÊó, No. 43, p. 143, 1994.
- ¾¾±º´´ÂÀ. ``À¸Âμ§¾ìµÕÌäÂê¤ÎÁªÂòŪºÇ¾®¥Î¥ë¥à²ò''. ÅìµþÂç³Ø½¤»ÎÏÀʸ, 1994.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÀ¸Âμ§¾ìµÕÌäÂê¤Î¶Éºß²ò''. Åŵ¤³Ø²ñ¥Þ¥°¥Í¥Æ¥£¥Ã¥¯¥¹¸¦µæ²ñ, MAG-94-174, 1994.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``³ÑÅÙÊÑ¿ô¤òƳÆþ¤·¤¿Àþ·Á·×²èË¡¤Ë¤è¤ë¥Þ¥ë¥Á¡¦¥À¥¤¥Ý¡¼¥ë¿äÄê''. Ê¿À®£¶Ç¯Åŵ¤³Ø²ñÅŻҡ¦¾ðÊ󡦥·¥¹¥Æ¥àÉôÌçÂç²ñ, Ê¡²¬, 1994.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÉÔÅù¼°À©Ìó¤òÍѤ¤¤¿²òÁж˻ҥΥë¥àºÇ¾®²½''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 7, No. 1, pp. 146-149, 1994.
- ²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``ÁªÂòŪºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ëǾ¼§³¦µÕÌäÂê''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 7, No. 1, pp. 20-23, 1994.
- ²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``À¸Âμ§¾ìµÕÌäÂê¤ÎÁªÂòŪºÇ¾®¥Î¥ë¥à²ò''. Åŵ¤³Ø²ñÄ´ººÀìÌç°Ñ°÷²ñ¡ÊÀ¸Â짵¤¡Ë, Åìµþ, 1994.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``SMNË¡¤Ë¤è¤ëÀ¸Â짵¤¤ÎµÕÌäÂê''. ÆüËܳؽѿ¶¶½²ñÂè146°Ñ°÷²ñ¹âÀǽSQUID¥·¥¹¥Æ¥àʬ²Ê²ñÂè21²ó¸¦µæ²ñ, Åìµþ, 1994.
- ²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``À¸Â짳¦µÕÌäÂê''. ÆüËܳؽѿ¶¶½²ñĶÅÁƳ¥¨¥ì¥¯¥È¥í¥Ë¥¯¥¹Âè146°Ñ°÷²ñÂè46²ó¸¦µæ²ñ, 1994.
- ËÙ°æ¿®ÃË, ¾¾±º´´ÂÀ, Ã滳ÌÀ˧, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÁж˻ҿäÄê¤Îɾ²Á''. 1994ǯÅŻҾðÊóÄÌ¿®³Ø²ñ½Õµ¨Âç²ñ, ¿ÀÆàÀî, 1994.
- ËÙ°æ¿®ÃË, ¾¾±º´´ÂÀ, Ã滳ÌÀ˧, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÁж˻ҿäÄê¤Îɾ²Á''. Ê¿À®£µÇ¯ÅÙÅŻҾðÊóÄÌ¿®³Ø²ñ³ØÀ¸²ñ¸¦µæȯɽ²ñ, ÀéÍÕ, 1994.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``ÁªÂòŪ²ò¥Î¥ë¥àºÇ¾®²½¤Ë¤è¤ëÁж˻ҿäÄê''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 6, No. 1, pp. 82-85, 1993.
- K. Matsuura and Y. Okabe. ``Multi-Dipole Estimation by Selective-Minimum-Norm Method''. 9th Int. Conf. on Biomagnetism, Vienna, 1993.
- ²¬ÉôÍΰì, ¾¾±º´´ÂÀ. ``SQUID-CT¤ÎÀ¸Âμ§¾ìµÕÌäÂê''. ÅìµþÂç³ØÀèü²Ê³Øµ»½Ñ¸¦µæ¥»¥ó¥¿¡¼ Àèü¸¦µªÍ×, Vol. 6, pp. 85-86, 1993.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``²ò¥Ù¥¯¥È¥ëºÇ¾®¥Î¥ë¥àË¡¤Ë¤è¤ëµÕÌäÂê¤Î²òË¡''. ÆüËܳؽѿ¶¶½²ñÂè146°Ñ°÷²ñ¹âÀǽSQUID¥·¥¹¥Æ¥àʬ²Ê²ñÂè14²ó¸¦µæ²ñ, Åìµþ, 1992.
- ¾¾±º´´ÂÀ, ²¬ÉôÍΰì. ``¥Þ¥ë¥Á¡¦¥À¥¤¥Ý¡¼¥ë¤ÎµÕ¿äÄê''. ÆüËÜÀ¸Â짵¤³Ø²ñ»ï, Vol. 5, No. 1, pp. 212-213, 1992.
- ¾¾±º´´ÂÀ. ``SQUID-CT¤ÎµÕÌäÂê''. ÅìµþÂç³Ø´¶ÈÏÀʸ, 1992.
- Ãø½ñ
- ³Ø½Ñ¾ðÊ󥻥󥿡¼(ÊÔ). ÀõÌîÀµ°ìϺ, ¾¾±º´´ÂÀ, Æ£ÌǷ, ¾Â¿¬ ¹§, ÀÐÀîÀ齩(¶¦Ãø). ``¥Í¥Ã¥È¥ï¡¼¥¯¥»¥¥å¥ê¥Æ¥£ ---³Ø½Ñ¾ðÊó¤Îȯ¿®¤ÈÊݸî---'', ´ÝÁ±, 1999.
- º£°æ½¨¼ù, ¾¾±º´´ÂÀ(¶¦Ãø). ``¾ðÊ󥻥¥å¥ê¥Æ¥£³µÏÀ'', ¾¼¹¸Æ². ¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ê¡¼¥ºÂ裶´¬, 1999.
- ¸¶ ¹¨¡¦·ª¾ë¿¿Ìé(¶¦ÊÔ). ``Ǿ¼§µ¤²Ê³Ø'', ¥ª¡¼¥à¼Ò. 1997.
- ¤½¤Î¾
- K. Matsuura and H. Imai. ``A revised signature mode for the Internet Key Exchange''. Internet Draft, Matsuura_sign_mode_02.txt (current version), Sep. 1999.
- K. Matsuura and H. Imai. ``A revised signature mode for the Internet Key Exchange''. Internet Draft, Matsuura_sign_mode_01.txt (previous version), Mar. 1999.
- ²¬ÉôÍΰì Ãø. ``³¨¤Ç¤ï¤«¤ëȾƳÂΤÈIC''. ÆüËܼ¶ȽÐÈǼÒ, Åìµþ, June 1994. (¼¹É®¶¨ÎÏ)
- ÅìÂçÀèü¸¦¥°¥ë¡¼¥×¡ÊÊÔÃø¡Ë: ``ºÇÀèüµ»½Ñ¤Î¤¹¤Ù¤Æ»öŵ''. ÆüËܼ¶ȽÐÈǼÒ, Åìµþ, 1993. (¼¹É®¶¨ÎÏ)
Ìá¤ë
¾¾±º ¸¦µæ¼¼/
153-8505 ÅìµþÅÔÌܹõ¶è¶ð¾ì4-6-1/ÅìµþÂç³ØÀ¸»ºµ»½Ñ¸¦µæ½ê ¾ðÊ󡦥¨¥ì¥¯¥È¥í¥Ë¥¯¥¹ÉôÌç(Âè3Éô)