Search Results 1-20 of 63

  • 1 / 4
  • On the Design and Implementation of IP-over-P2P Overlay Virtual Private Networks

    SUBRATIE Kensworth , ADITYA Saumitra , DANESHMAND Vahid , ICHIKAWA Kohei , FIGUEIREDO Renato

    … <p>The success and scale of the Internet and its protocol IP has spurred emergent distributed technologies such as fog/edge computing and new application models based on distributed containerized microservices. … The Internet of Things and Connected Communities are poised to build on these technologies and models and to benefit from the ability to communicate in a peer-to-peer (P2P) fashion. …

    IEICE Transactions on Communications E103.B(1), 2-10, 2020


  • Efficient Inner Product Functional Encryption with Full-Hiding Security

    TOMIDA Junichi , ABE Masayuki , OKAMOTO Tatsuaki

    … <p>Inner product functional encryption (IPFE) is a subclass of functional encryption (FE), whose function class is limited to inner product. … We construct an efficient private-key IPFE scheme with full-hiding security, where confidentiality is assured for not only encrypted data but also functions associated with secret keys. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E103.A(1), 33-40, 2020


  • secureTCP: Securing the TCP/IP stack using a Trusted Execution Environment

    Keita Aihara , Pierre-Louis Aublin , Kenji Kono

    コンピュータシステム・シンポジウム論文集 (2019), 9-14, 2019-12-03


  • Authenticated-Encrypted Analog-to-Digital Conversion Based on Non-Linearity and Redundancy Transformation

    GADDE Vinod V. , IKEDA Makoto

    … <p>We have proposed a generic architecture that can integrate the aspects of confidentiality and integrity into the A/D conversion framework. … A conceptual account of the development of the proposed architecture is presented. … Using the principle of this architecture we have presented a CMOS circuit design to facilitate a fully integrated Authenticated-Encrypted ADC (AE-ADC). …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A(12), 1731-1740, 2019


  • Optimizing Online Permutation-Based AE Schemes for Lightweight Applications


    … The lightweight applications demand that AE schemes operate in resource-constrained environments, which raise two issues: 1) implementation costs must be low, and 2) ensuring proper use of a nonce is difficult due to its small size and lack of randomness. … However, regarding the security under nonce misuse, the standard permutation-based duplex construction cannot ensure confidentiality. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A(1), 35-47, 2019


  • Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud

    CHEN Yanli , HU Yuanyuan , ZHU Minhui , YANG Geng

    … The scheme not only realizes the functions of data search and fine-grained access control, but also supports search function sharing. … In addition, we randomly blind the user's private key to the server, which ensures the confidentiality and security of the private key. …

    IEICE Transactions on Communications E101.B(8), 1798-1808, 2018


  • Microdata Access for Official Statistics in Japan::Focusing Mainly on Microdata Access at Onsite Facilities  [in Japanese]

    Nakamura Hideaki

    <p> 平成19年,統計法が60年ぶりに改正され,改正後の統計法(平成19年法律第53号.以下「新統計法」という.)では,統計データの利用促進と秘密の保護に関する諸々の規定が盛り込まれた.政府は,おおむね5年ごとの法定計画である「公的統計の整備に関する基本的な計画」(以下「基本計画」という.)に統計データの有効活用の推進に関する事項を具体的な施策として盛り込み,統計データの二次的利用の …

    Sociological Theory and Methods 32(2), 310-320, 2017


  • Improving Security Level of LTE Access Procedure by Using Short-Life Shared Key

    AHMAD Fawad , PERADILLA Marnel , SAINI Akanksha , JUNG Younchan

    … Third Generation Partnership Project (3GPP) has specified Evolved Packet System Authentication and Key Agreement (EPS AKA) procedure for the mutual authentication of user and the Long Term Evolution (LTE) network. … EPS AKA certainly overcomes most of the vulnerabilities in the Global System for Mobile Communications (GSM) and Universal Mobile Telecommunication System (UMTS) access procedures. …

    IEICE Transactions on Communications E100.B(5), 738-748, 2017


  • Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks

    Hong Liang , Chen Wei , Shetty Sachin , Lo Dan , Cooper Reginald

    … <p>Cooperative MIMO communication is a promising technology which enables realistic solution for improving communication performance with MIMO technique in wireless networks that are composed of size and cost constrained devices. … Cryptography can ensure the confidentiality in the communication and routing between authorized participants, but it usually cannot prevent the attacks from compromised nodes which may corrupt communications by sending garbled signals. …

    International Journal of Networking and Computing 7(1), 50-68, 2017


  • Detection of False Data Injection Attacks in Cyber-Physical Systems  [in Japanese]

    Shinohara T. , Namerikawa T.

    <p>本稿ではサイバーフィジカルシステムにおけるFalse Data Injection Attack (FDIA)の検出問題を扱う.従来のシステムでは検出できないFDIAを定式化し,この攻撃に対して時変の認証行列をシステムに加える事で検出ができることを理論的に示す.最後に数値シミュレーションによって,提案手法により実際にFDIAが検出できることを確認する.</p>

    Proceedings of the Japan Joint Automatic Control Conference 59(0), 383-388, 2016


  • Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data

    WATANABE Dai , YOSHINO Masayuki

    … Cryptography is now popularized and is widely used anywhere for many aims such as data confidentiality and integrity. … For example, the National Institute of Standards and Technology published SP800-57 in order to provide cryptographic key management guidance, and it strictly limits the lifetime of the cryptographic key and the lifetime of encrypted data. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98.A(1), 162-170, 2015


  • SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud Storage

    THAO Tran Phuong , KHO Lee Chin , LIM Azman Osman

    … Cloud Computing is a service by which clients can outsource their data to reduce the burdens of data storage and maintenance. … However, cloud providers are untrustworthy, which therefore introduce several security challenges: data integrity, data availability and data confidentiality. … Since integrity and availability are prerequisite conditions for the existence of a system, researchers focus on these before confidentiality. …

    2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing, and IEEE 11th Intl Conf on and Autonomic and Trusted Computing, and IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom), 464-472, 2014-12


  • Possibility of Access to the Information on Web Services of the Deceased by Bereaved Family  [in Japanese]

    吉井 和明

    情報ネットワーク・ローレビュー 13(2), 73-89, 2014-10

  • Considerations Regarding System Configuration and Necessary Conditions for Radio Signal Hiding in Wireless Communications  [in Japanese]

    Sasaoka Hideichi

    最近、物理層セキュリティが無線通信において注目されており、主要技術に秘密鍵共有や秘密情報伝送がある。他に、スタガノグラフィの概念を無線通信に適用した無線信号秘匿が提案され、無線ステガノグラフィと呼ばれている。しかし、従来研究において、無線信号秘匿のシステム構成と所要条件に対する系統的な検討が不十分であった。本論文では、無線信号秘匿の概念を示す共に、無線通信へのステゴノグラフィの適用の課題を明らかに …

    The science and engineering review of Doshisha University 55(2), 122-133, 2014-07

    IR  DOI 

  • Non-malleable Multiple Public-Key Encryption

    FUJIOKA Atsushi , FUJISAKI Eiichiro , XAGAWA Keita

    … We study non-malleability of multiple public-key encryption (ME) schemes. … The main difference of ME from the threshold public-key encryption schemes is that there is no dealer to share a secret among users; … and a sender can encrypt a message under ad-hoc multiple public keys of his choice. … In this paper we tackle non-malleability of ME. … We note that the prior works only consider <i>confidentiality</i> …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A(6), 1318-1334, 2014


  • Methods for Restricting Message Space in Public-Key Encryption

    SAKAI Yusuke , EMURA Keita , HANAOKA Goichiro , KAWAI Yutaka , OMOTE Kazumasa

    of public-key encryption, by allowing a third party to verify whether a given ciphertext does not encrypt some message which is previously specified as a “bad” … Public-key encryption schemes are normally designed not to leak even partial information of encrypted plaintexts, but it would be problematic in some circumstances. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 96(6), 1156-1168, 2013-06-01

    J-STAGE  References (27)

  • Beamforming for Impulse-Radio UWB Communication Systems Based on Complex-Valued Spatio-Temporal Neural Networks

    Hayato Yoshida , Akira Hirose

    IEICE Proceeding Series (30), 848-851, 2013


  • 1 / 4
Page Top