今井 秀樹 IMAI Hideki

ID:1000070017987

中央大学理工学部 Faculty of Science and Engineering, Chuo University (2013年 CiNii収録論文より)

Search authors sharing the same name

Articles:  1-20 of 388

  • 量子誤り訂正符号を用いた量子推定問題の解法とその応用 (函数解析学による一般化エントロピーの新展開 : RIMS研究集会報告集)  [in Japanese]

    YOSHIDA Masakazu , MIYADERA Takayuki , KIMURA Gen , IMAI Hideki

    RIMS Kokyuroku (1852), 217-224, 2013-09

    IR 

  • Analysis of interdependency of information security in Japan  [in Japanese]

    HISHIKI Ryouta , JENJARRUSSAKUL Bongkot , TANAKA Hideyuki , MATSUURA Kanta , IMAI Hideki

    現代の経済活動において,インターネットによる取引や他社との情報共有など情報分野における活動はどの産業分野でも必須である.そのため,インターネット上のトラブルや攻撃を防ぐ,または損害を減少させるための情報セキュリティ対策の実施も同様にあらゆる産業分野で欠かせない活動となっている.また,一企業内での情報漏洩などのトラブルは,その企業が関わっていた他企業にも不利益を被らせるため,このような被害の伝播に関 …

    Technical report of IEICE. ISEC 111(455), 23-29, 2012-02-23

    References (4)

  • Object Verification System from Artifact-Metrics Based on Printed Ink Spread  [in Japanese]

    KOBAYASHI Takanori , NAKAMURA Takuya , SATO Hiroki , ATTRAPADUNG Nuttapong , IMAI Hideki

    Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thing was used. There are many which need special apparatus for a measurement device …

    Technical report of IEICE. ISEC 111(455), 9-13, 2012-02-23

    References (5)

  • Analysis of interdependency of information security in Japan  [in Japanese]

    HISHIKI Ryouta , JENJARRUSSAKUL Bongkot , TANAKA Hideyuki , MATSUURA Kanta , IMAI Hideki

    現代の経済活動において,インターネットによる取引や他社との情報共有など情報分野における活動はどの産業分野でも必須である.そのため,インターネット上のトラブルや攻撃を防ぐ,または損害を減少させるための情報セキュリティ対策の実施も同様にあらゆる産業分野で欠かせない活動となっている.また,一企業内での情報漏洩などのトラブルは,その企業が関わっていた他企業にも不利益を被らせるため,このような被害の伝播に関 …

    IEICE technical report. Information theory 111(454), 23-29, 2012-02-23

    References (4)

  • Object Verification System from Artifact-Metrics Based on Printed Ink Spread  [in Japanese]

    KOBAYASHI Takanori , NAKAMURA Takuya , SATO Hiroki , ATTRAPADUNG Nuttapong , IMAI Hideki

    Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thing was used. There are many which need special apparatus for a measurement device …

    IEICE technical report. Information theory 111(454), 9-13, 2012-02-23

    References (5)

  • Analysis of interdependency of information security in Japan  [in Japanese]

    HISHIKI Ryouta , JENJARRUSSAKUL Bongkot , TANAKA Hideyuki , MATSUURA Kanta , IMAI Hideki

    現代の経済活動において,インターネットによる取引や他社との情報共有など情報分野における活動はどの産業分野でも必須である.そのため,インターネット上のトラブルや攻撃を防ぐ,または損害を減少させるための情報セキュリティ対策の実施も同様にあらゆる産業分野で欠かせない活動となっている.また,一企業内での情報漏洩などのトラブルは,その企業が関わっていた他企業にも不利益を被らせるため,このような被害の伝播に関 …

    IEICE technical report. WBS, Wideband System 111(456), 23-29, 2012-02-23

    References (4)

  • Object Verification System from Artifact-Metrics Based on Printed Ink Spread  [in Japanese]

    KOBAYASHI Takanori , NAKAMURA Takuya , SATO Hiroki , ATTRAPADUNG Nuttapong , IMAI Hideki

    Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thing was used. There are many which need special apparatus for a measurement device …

    IEICE technical report. WBS, Wideband System 111(456), 9-13, 2012-02-23

    References (5)

  • Cryptographies for IT Infrastructure and the Government's Information Security Policy in Japan  [in Japanese]

    KOBARA Kazukuni , IMAI Hideki

    暗号技術は,通信路や保存データの秘匿にとどまらず,データの改ざん検出,データ生成者や通信相手の認証など様々な用途に利用されている.電子マネー,電子商取引,著作権保護,入退室管理,リモートアクセス,利用者認証,電子投票など,様々なシステムに暗号技術が組み込まれており,現代社会を支える重要な基盤の一つになっている.一方,現在利用されている多くの暗号技術はその安全性を計算量的な複雑さに依存しており,安全 …

    The Journal of the Institute of Electronics, Information, and Communication Engineers 94(11), 932-937, 2011-11-01

    References (32)

  • 電子政府推奨暗号と暗号モジュール認証制度  [in Japanese]

    今井秀樹 , 山岸篤弘

    2000年から始まった我が国電子政府システム向けの暗号技術評価プロジェクトであるCRYPTRECの活動概要,CRYPTRECの成果を活用するための暗号モジュール試験及び認証制度を概説し,これらの活動と標準化活動との関連について述べる.

    デジタルプラクティス 2(4), 274-281, 2011-10-15

    IPSJ 

  • 電子政府推奨暗号と暗号モジュール認証制度 (事業に活きる我が国発の標準化)  [in Japanese]

    今井 秀樹 , 山岸 篤弘

    Journal of digital practices 2(4), 274-281, 2011-08

  • Quantum Error Correction with Non-Binary LDPC Codes

    KASAI Kenta , HAGIWARA Manabu , IMAI Hideki , SAKANIWA Koichi

    Quantum error correction is used in quantum computing and quantum communications to protect quantum information from quantum noise. Quantum LDPC codes are efficiently decodable quantum error correctin …

    IEICE technical report 110(265), 135-145, 2010-10-28

    References (18)

  • Study on the performance of the entanglement distillation protocol using the quantum error correcting code  [in Japanese]

    YOSHIDA Masakazu , HAGIWARA Manabu , MIYADERA Takayuki , IMAI Hideki

    Entangled states play crucial roles in the quantum communication. The entanglement distillation protocol enables us to share entangled states in the noisy channel. We focus the error detection of the …

    IEICE technical report. Information theory 110(205), 51-56, 2010-09-14

    References (11)

  • Efficient Augmented PAK Protocols

    SHIN SeongHan , KOBARA Kazukuni , IMAI Hideki

    Password-authenticated key exchange (PAKE) is the problem about how to share a strong secret securely in the presence of an adversary between the parties, who share a weak secret only. In the literatu …

    IEICE technical report 110(115), 167-171, 2010-06-24

    References (22)

  • Efficient Augmented PAK Protocols

    SHIN SeongHan , KOBARA Kazukuni , IMAI Hideki

    Password-authenticated key exchange (PAKE) is the problem about how to share a strong secret securely in the presence of an adversary between the parties, who share a weak secret only. In the literatu …

    IEICE technical report 110(114), 167-171, 2010-06-24

    References (22)

  • Efficient Augmented PAK Protocols

    SHIN SeongHan , KOBARA Kazukuni , IMAI Hideki

    Password-authenticated key exchange (PAKE) is the problem about how to share a strong secret securely in the presence of an adversary between the parties, who share a weak secret only. In the literatu …

    IEICE technical report 110(113), 167-172, 2010-06-24

    References (21)

  • Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information  [in Japanese]

    NAKAGAWA Takuya , KANG Hyunho , YONEZAWA Shoko , INUMA Manabu , OTSUKA Akira , IMAI Hideki

    Although the evaluation of biometric systems is often focusing on the high performance matching approaches, it is not always be having a high security level. In this paper we will assume that the degr …

    IEICE technical report 109(445), 261-268, 2010-02-25

    References (12)

  • Traitor Tracing system with Constant-Size Public-key and Ciphertext using q-ary fingerprint codes  [in Japanese]

    ZHANG Ying , KITAGAWA Takashi , ATTRAPADUNG Nuttapong , IMAI Hideki

    A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. In 2008, Boneh and Naor proposed a traitor tracing system where cipherte …

    IEICE technical report 109(445), 255-260, 2010-02-25

    References (13)

  • A Reader Only Attack on a MIFARE Classic  [in Japanese]

    IMAMURA Satoru , KITAGAWA Takashi , IMAI Hideki

    MIFARE Classic card is a contactless smart card which is one of the most popular on the market. For example, it is used for payment systems for public transport or access control system of buildings, …

    IEICE technical report 109(445), 241-246, 2010-02-25

    References (7)

  • About Security of Threshold Anonymous Password-Authenticated Key Exchange

    SHIN SeongHan , KOBARA Kazukuni , IMAI Hideki

    An anonymous password-authenticated key exchange protocol is designed to provide both password-only authentication and client anonymity against a semi-honest server, who honestly follows the protocol. …

    IEICE technical report 109(445), 23-30, 2010-02-25

    References (24)

  • Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information  [in Japanese]

    NAKAGAWA Takuya , KANG Hyunho , YONEZAWA Shoko , INUMA Manabu , OTSUKA Akira , IMAI Hideki

    Although the evaluation of biometric systems is often focusing on the high performance matching approaches, it is not always be having a high security level. In this paper we will assume that the degr …

    IEICE technical report 109(444), 261-268, 2010-02-25

    References (12)

Page Top