ホーム > 西出 隆志/ Nishide, Takashi
西出 隆志
Nishide, Takashi
システム情報系 , 准教授 Faculty of Engineering, Information and Systems , Associate Professor
関連記事はまだありません。
オープンアクセス版の論文は「つくばリポジトリ」で読むことができます。
-
41.
Batching Multiple Protocols to Improve Efficiency of Multi-party Computation
Naoto Kiribuchi; Ryo Kato; Takashi Nishide; Hiroshi Yoshiura
7th International Conference on Information Security and Cryptology (Inscrypt’11) LNCS 7537, Springer,: 289 - 308 (2012)
-
42.
Differential Fault Analysis of Full LBlock
Liang Zhao; Takashi Nishide; Kouichi Sakurai
3rd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE’12) LNCS 7275, Springer,: 135 - 150 (2012)
-
43.
WEAKNESS OF PROVABLY SECURE SEARCHABLE ENCRYPTION AGAINST FREQUENCY ANALYSIS
Takanori Suga; Takashi Nishide; Kouichi Sakurai
2012 MOSHARAKA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, COMPUTERS AND APPLICATIONS (MIC-CCA) ISSN: 2227-331X: 142 - 147 (2012)
-
44.
Secure Keyword Search Using Bloom Filter with Specified Character Positions
Takanori Suga; Takashi Nishide; Kouichi Sakurai
6th International Conference on Provable Security (ProvSec) LNCS 7496, Springer,: 235 - 252 (2012)
-
45.
Efficient implementation of evaluating multivariate quadratic system with GPUs
Satoshi Tanaka; Takashi Nishide; Kouichi Sakurai
Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 660 - 664 (2012) Semantic Scholar
-
46.
Elliptic curve ELGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs
Na Ruan; Takashi Nishide; Yoshiaki Hori
Journal of Information Processing 20: 846 - 853 (2012) Semantic Scholar
-
47.
Reducing communication complexity of random number bitwise-sharing for efficient multi-party computation
Naoto Kiribuchi; Ryo Kato; Takashi Nishide; Tsukasa EndoHiroshi Yoshiura
Journal of Information Processing 20: 861 - 870 (2012) Semantic Scholar
-
48.
A method for embedding secret key information in RSA public key and its application
Motoki Kitahara; Takashi Nishide; Kouichi Sakurai
Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 665 - 670 (2012) Semantic Scholar
-
49.
Security Analysis of Offline E-Cash Systems with Malicious Insider
Takashi Nishide; Shingo Miyazaki; Kouichi Sakurai
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA) 3: 55 - 71 (2012)
-
50.
ElGamal-based Key Management Scheme for Distributed RSUs in VANET
Ruan Na; Takashi Nishide; Yoshiaki Hori
IEEE International Conference on Selected Topics in Mobile and Wireless Networking (iCOST) 128 - 133 (2011)
-
51.
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems
Fangming Zhao; Takashi Nishide; Kouichi Sakurai
INFORMATION SECURITY PRACTICE AND EXPERIENCE 6672: 83 - 97 (2011)
-
52.
Anonymous Encryption with Partial-Order Subset Delegation Functionality
Mingwu Zhang; Takashi Nishide; Bo Yang; Tsuyoshi Takagi
5th International Conference on Provable Security (ProvSec) LNCS 6980, Springer,: 154 - 169 (2011)
-
53.
New Multiple Encryption for Making Double Encryption Secure against Meet-in-the-Middle and Related-Key Attacks
Takashi Nishide; Shinichi Yoshinaga; Rishiraj Bhattacharyya; Mridul Nandi (+1 著者) Kouichi Sakurai
12th International Workshop on Information Security Applications (WISA’11) (short paper track, 6pages) (2011)
-
54.
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
Chul Sur; Youngho Park; Takashi Nishide; Kouichi SakuraiKyung Hyune Rhee
International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11) LNCS 6908, Springer,: 271 - 285 (2011)
-
55.
Design and Implementation of a Forced Encryption Kernel Module
Jun Furukawa; Akihiro Sakai; Takashi Nishide; Yoshiaki HoriKouichi Sakurai
5th International Workshop on Advances in Information Security (WAIS) 663 - 667 (2011)
-
56.
Integrity for the In-flight Web Page Based on A Fragile Watermarking Chain Scheme
Peng Gao; Takashi Nishide; Yoshiaki Hori; Kouichi Sakurai
5th International Conference on Ubiquitous Information Management and Communication (ICUIMC) ACM,: (2011)
-
57.
Distributed Paillier Cryptosystem without Trusted Dealer
Takashi Nishide; Kouichi Sakurai
INFORMATION SECURITY APPLICATIONS 6513: 44 - 60 (2011)
-
58.
Realizing Proxy Re-encryption in the Symmetric World
Amril Syalim; Takashi Nishide; Kouichi Sakurai
INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I 251: 259 - 274 (2011)
-
59.
Towards Countermeasure Against Insider Threat on Network Security
Yoshiaki Hori; Takashi Nishide; Kouichi Sakurai
3rd International Workshop on Managing Insider Security Threats (MIST) IEEE Computer Society,: 634 - 636 (2011)
-
60.
Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited
Takashi Nishide; Kouichi Sakurai
3rd International Workshop on Managing Insider Security Threats (MIST) IEEE Computer Society,: 656 - 661 (2011)
-
1.
暗号と情報セキュリティ (リスク工学シリーズ8巻)
岡本栄司; 西出隆志
(担当:共著)
コロナ社 2016年4月
講演・口頭発表情報はまだありません。
-
1. 特願2001-184009: 端末のデータ消去管理方法及びプログラム
熊谷仁志; 西出隆志; 原田建樹 -
2. 特願2005-283182: 監査ログの出力及び管理方法並びにシステム
南城勝将; 西出隆志 -
3. 特願2005-189012: 情報漏洩防止方法及びシステム
佐々木茂; 西出隆志 -
4. 特願2006-260458: 共有暗号ファイルの暗号化・復号処理方法及びプログラム
西出隆志; 小川智之 -
5. 特願2007-263878: セキュリティシステム
西出隆志; 伊藤秀晃; 押田勇三 -
6. 特願2008-035820: データ持出し制御システム
西出隆志 -
7. : 監査用ログ記録制御方法および情報漏洩監視プログラム
西出隆志; 橋本浩昌; 南城勝将 -
8. 特願2006-209400: クライアントサーバシステム
西出隆志; 松下耕三 -
9. 特願2006-220613: 秘密分散情報処理システム
西出隆志; 太田和夫
739 total views