Art
J-GLOBAL ID:200902253791200366   Reference number:07A0379981

「情報学を創る」-科研プロジェクトがめざしたもの 情報セキュリティに関する総合的な研究-科研「情報学」プロジェクトのセキュリティ研究を振り返って-

Author (1):
Material:
Volume: 48  Issue:Page: 368-375  Publication year: Apr. 15, 2007 
JST Material Number: G0427A  ISSN: 0447-8053  Document type: Article
Article type: 解説  Country of issue: Japan (JPN)  Language: JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,...
Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=07A0379981&from=J-GLOBAL&jstjournalNo=G0427A") }}
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Code theory 
Reference (6):
  • 安西祐一郎. ITの深化の基盤を拓く情報学研究 研究成果報告書A04情報セキュリティに関する総合的な研究. http://research.nii.ac.jp/kaken-johogaku/
  • 安西祐一郎. 情報学を創る. 2006
  • MATSUMOTO, T. Impact of Artificial "Gummy" Fingers on Fingerprint Systems, Optical Security and Counterfeit Deterrence Techniques IV. Proceedings of SPIE. 2002, 4677, 275-289
  • OHTA, K. A Quantum Algorithm using NMR Computers to Break Secret-Key Cryptosystems. New Generation Computing. 2003, 21, 4, 347-361
  • IWAMOTO, M. Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes. 2004 IEEE International Symposium on Information Theory (ISIT2004). 2004, 16
more...

Return to Previous Page