ホーム > 西出 隆志/ Nishide, Takashi
西出 隆志
Nishide, Takashi
システム情報系 , 准教授 Faculty of Engineering, Information and Systems , Associate Professor
関連記事はまだありません。
オープンアクセス版の論文は「つくばリポジトリ」で読むことができます。
-
21.
Software Implementation of a Pairing Function for Public Key Cryptosystems
Yusuke Kanbara; Tadanori Teruya; Naoki Kanayama; Takashi NishideEiji Okamoto
International Conference on IT Convergence and Security (ICITCS) IEEE: 1 - 5 (2015)
-
22.
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability
Keisuke Hasegawa; Naoki Kanayama; Takashi Nishide; Eiji Okamoto
International Conference on IT Convergence and Security (ICITCS) IEEE: 1 - 4 (2015)
-
23.
Secure Multi-Party Computation Using Polarizing Cards
Kazumasa Shinagawa; Takaaki Mizuki; Jacob Schuldt; Koji Nuida (+3 著者) Eiji Okamoto
International Workshop on Security (IWSEC) LNCS 9241, Springer,: 281 - 297 (2015)
-
24.
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Yukou Kobayashi; Naoto Yanai; Kazuki Yoneyama; Takashi Nishide (+2 著者) Eiji Okamoto
International Conference on Security and Cryptography (SECRYPT) SciTePress: 39 - 52 (2015)
-
25.
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards
Kazumasa Shinagawa; Takaaki Mizuki; Jacob C. N. Schuldt; Koji Nuida (+3 著者) Eiji Okamoto
PROVABLE SECURITY, PROVSEC 2015 9451: 127 - 146 (2015) Semantic Scholar
-
26.
Secure (M+1) st-Price Auction with Automatic Tie-Break
Takashi Nishide; Mitsugu Iwamoto; Atsushi Iwasaki; Kazuo Ohta
TRUSTED SYSTEMS, INTRUST 2014 9473: 422 - 437 (2015) Semantic Scholar
-
27.
Constructions of Fail-Stop Signatures for Multi-Signer Setting
Nobuaki Kitajima; Naoto Yanai; Takashi Nishide; Goichiro HanaokaEiji Okamoto
2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) IEEE: 112 - 123 (2015) Semantic Scholar
-
28.
部分的に小さな法を用いたマルチパーティ計算のビット演算効率化
加藤遼; 西出隆志; 吉浦裕
55: 1971 - 1991 (2014)
-
29.
Anonymous encryption with partial-order subset delegation and its application in privacy email systems
Mingwu Zhang; Takashi Nishide; Bo Yang; Tsuyoshi Takagi
IET INFORMATION SECURITY 8: 240 - 249 (2014) Semantic Scholar
-
30.
A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
Sanami Nakagawa; Keita Emura; Goichiro Hanaoka; Akihisa Kodate (+2 著者) Yusuke Sakai
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) IEEE: 565 - 574 (2014) Semantic Scholar
-
31.
A Short Fail-Stop Signature Scheme from Factoring
Takashi Yamakawa; Nobuaki Kitajima; Takashi Nishide; Goichiro HanaokaEiji Okamoto
PROVABLE SECURITY, PROVSEC 2014 8782: 309 - 316 (2014)
-
32.
Fine-grained access control aware multi-user data sharing with secure keyword search
Fangming Zhao; Takashi Nishide; Kouichi Sakurai
IEICE Transactions on Information and Systems E97-D: 1790 - 1803 (2014) Semantic Scholar
-
33.
Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus
Motoki Kitahara; Takanori Yasuda; Takashi Nishide; Kouichi Sakurai
Asia Public-Key Cryptography (AsiaPKC) ACM: 33 - 38 (2013)
-
34.
Efficient Implementation for QUAD Stream Cipher with GPUs
Satoshi Tanaka; Takashi Nishide; Kouichi Sakurai
COMPUTER SCIENCE AND INFORMATION SYSTEMS 10: 897 - 911 (2013) Semantic Scholar
-
35.
Supporting Secure Provenance Update by Keeping Provenance of the Provenance
Amril Syalim; Takashi Nishide; Kouichi Sakurai
Information and Communicatiaon Technology - International Conference (ICT-EurAsia) LNCS 7804, Springer: 363 - 372 (2013)
-
36.
Analysis of Methods for Detecting Compromised Nodes and Its Countermeasures
Fangming Zhao; Takashi Nishide; Yoshiaki Hori; Kouichi Sakurai
International Conference on IT Convergence and Security (ICITCS’12) LNEE 215, Springer: 53 - 60 (2013)
-
37.
Batch Logical Protocols for Efficient Multi-Party Computation
Naoto Kiribuchi; Ryo Kato; Tsukasa Endo; Takashi NishideHiroshi Yoshiura
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E95A: 1718 - 1728 (2012) Semantic Scholar
-
38.
Securing Provenance of Distributed Processes in an Untrusted Environment
Amril Syalim; Takashi Nishide; Kouichi Sakurai
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E95D: 1894 - 1907 (2012) Semantic Scholar
-
39.
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control
Fangming Zhao; Takashi Nishide; Kouichi Sakurai
14th Annual International Conference on Information Security and Cryptology (ICISC’11) LNCS 7259, Springer,: 406 - 418 (2012)
-
40.
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao; Takashi Nishide; Avishek Adhikari; Kyung-Hyune RheeKouichi Sakurai
7th International Conference on Information Security and Cryptology (Inscrypt’11) LNCS 7537, Springer,: 341 - 362 (2012)
-
1.
暗号と情報セキュリティ (リスク工学シリーズ8巻)
岡本栄司; 西出隆志
(担当:共著)
コロナ社 2016年4月
講演・口頭発表情報はまだありません。
-
1. 特願2001-184009: 端末のデータ消去管理方法及びプログラム
熊谷仁志; 西出隆志; 原田建樹 -
2. 特願2005-283182: 監査ログの出力及び管理方法並びにシステム
南城勝将; 西出隆志 -
3. 特願2005-189012: 情報漏洩防止方法及びシステム
佐々木茂; 西出隆志 -
4. 特願2006-260458: 共有暗号ファイルの暗号化・復号処理方法及びプログラム
西出隆志; 小川智之 -
5. 特願2007-263878: セキュリティシステム
西出隆志; 伊藤秀晃; 押田勇三 -
6. 特願2008-035820: データ持出し制御システム
西出隆志 -
7. : 監査用ログ記録制御方法および情報漏洩監視プログラム
西出隆志; 橋本浩昌; 南城勝将 -
8. 特願2006-209400: クライアントサーバシステム
西出隆志; 松下耕三 -
9. 特願2006-220613: 秘密分散情報処理システム
西出隆志; 太田和夫
738 total views