ホーム > 西出 隆志/ Nishide, Takashi
西出 隆志
Nishide, Takashi
システム情報系 , 准教授 Faculty of Engineering, Information and Systems , Associate Professor
関連記事はまだありません。
オープンアクセス版の論文は「つくばリポジトリ」で読むことができます。
-
1.
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption
Hikaru Tsuchida; Takashi Nishide; Eiji Okamoto
ProvSec Workshop, Journal of Internet Services and Information Security (JISIS) 8: 37 - 56 (2018)
-
2.
Outsourced Private Function Evaluation with Privacy Policy Enforcement
Noboru Kunihiro; Wen-jie Lu; Takashi Nishide; Jun Sakuma
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE: 412 - 423 (2018)
-
3.
Identity-Based Key-Insulated Aggregate Signatures, Revisited
Nobuaki Kitajima; Naoto Yanai; Takashi Nishide
Inscrypt LNCS 10726, Springer,: 141 - 156 (2017)
-
4.
秘密計算を用いた時系列情報の安全な集計方法
奈良成泰; 天田拓磨; 西出隆志; 土井洋吉浦裕
58: 1464 - 1482 (2017)
-
5.
Card-based protocols using regular polygon cards
Kazumasa Shinagawa; Takaaki Mizuki; Jacob C. N. Schuldt; Koji Nuida (+3 著者) Eiji Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100A: 1900 - 1909 (2017) Semantic Scholar
-
6.
Network Intrusion Detection based on Semi-Supervised Variational Auto-Encoder
Genki Osada; Kazumasa Omote; Takashi Nishide
ESORICS LNCS 10493, Springer,: 344 - 361 (2017)
-
7.
Improved proxy re-encryption scheme for symmetric key cryptography
Kouichi Sakurai; Takashi Nishide; Syalim Amril
International Workshop on Big Data and Information Security (IWBIS) IEEE: 105 - 111 (2017)
-
8.
One-time Programs with Cloud Storage and Its Application to Electronic Money
Takuya Kitamura; Kazumasa Shinagawa; Takashi Nishide; Eiji Okamoto
ASIA Public-Key Cryptography (APKC) ACM: 25 - 30 (2017)
-
9.
APAT: BGPSEC におけるアグリゲート署名の導入
田中和磨; 矢内直人; 岡田雅之; 西出隆志岡本栄司
58: 544 - 556 (2017)
-
10.
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures
Sanami Nakagawa; Takashi Nishide; Eiji Okamoto; Keita Emura (+2 著者) Akihisa Kodate
International Journal of Applied Cryptography 3: 394 - 406 (2017)
-
11.
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
Yukou Kobayashi; Naoto Yanai; Kazuki Yoneyama; Takashi Nishide (+2 著者) Eiji Okamoto
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A: 2991 - 3006 (2017) Semantic Scholar
-
12.
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs
Naoto Yanai; Masahiro Mambo; Kazuma Tanaka; Takashi NishideEiji Okamoto
International Conference on Trustworthy Systems (Intrust) LNCS 9565, Springer: 32 - 48 (2016)
-
13.
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices
Takanori Suga; Takashi Nishide; Kouichi Sakurai
SECURITY AND COMMUNICATION NETWORKS 9: 1717 - 1725 (2016) Semantic Scholar
-
14.
Secure Computation Protocols Using Polarizing Cards
Kazumasa Shinagawa; Takaaki Mizuki; Jacob C. N. Schuldt; Koji Nuida (+3 著者) Eiji Okamoto
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E99A: 1122 - 1131 (2016) Semantic Scholar
-
15.
Fail-stop signatures for multiple-signers: Definitions, constructions, and their extensions
Nobuaki Kitajima; Naoto Yanai; Takashi Nishide; Goichiro HanaokaEiji Okamoto
Journal of Information Processing 24: 275 - 291 (2016) Semantic Scholar
-
16.
Software library for ciphertext/key-policy functional encryption with simple usability
Keisuke Hasegawa; Naoki Kanayama; Takashi Nishide; Eiji Okamoto
Journal of Information Processing 24: 764 - 771 (2016) Semantic Scholar
-
17.
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
Fangming Zhao; Takashi Nishide
NETWORK AND SYSTEM SECURITY, (NSS 2016) 9955: 266 - 282 (2016) Semantic Scholar
-
18.
Committed AND Protocol Using Three Cards with More Handy Shuffle
Kazumasa Shinagawa; Koji Nuida; Takashi Nishide; Goichiro HanaokaEiji Okamoko
PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016) IEEE: 700 - 702 (2016)
-
19.
Revocable Decentralized Multi-Authority Functional Encryption
Hikaru Tsuchida; Takashi Nishide; Eiji Okamoto; Kwangjo Kim
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016 10095: 248 - 265 (2016) Semantic Scholar
-
20.
Size-Hiding Computation for Multiple Parties
Kazumasa Shinagawa; Koji Nuida; Takashi Nishide; Goichiro HanaokaEiji Okamoto
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II 10032: 937 - 966 (2016) Semantic Scholar
-
1.
暗号と情報セキュリティ (リスク工学シリーズ8巻)
岡本栄司; 西出隆志
(担当:共著)
コロナ社 2016年4月
講演・口頭発表情報はまだありません。
-
1. 特願2001-184009: 端末のデータ消去管理方法及びプログラム
熊谷仁志; 西出隆志; 原田建樹 -
2. 特願2005-283182: 監査ログの出力及び管理方法並びにシステム
南城勝将; 西出隆志 -
3. 特願2005-189012: 情報漏洩防止方法及びシステム
佐々木茂; 西出隆志 -
4. 特願2006-260458: 共有暗号ファイルの暗号化・復号処理方法及びプログラム
西出隆志; 小川智之 -
5. 特願2007-263878: セキュリティシステム
西出隆志; 伊藤秀晃; 押田勇三 -
6. 特願2008-035820: データ持出し制御システム
西出隆志 -
7. : 監査用ログ記録制御方法および情報漏洩監視プログラム
西出隆志; 橋本浩昌; 南城勝将 -
8. 特願2006-209400: クライアントサーバシステム
西出隆志; 松下耕三 -
9. 特願2006-220613: 秘密分散情報処理システム
西出隆志; 太田和夫
737 total views