To search, Click below search items.
All Published Papers Search Service
Title
Design of an Efficient Security Protocol Analyzer
Author
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka
Vol. 7 No. 6 pp. 74-87
Keywords
Security Protocol, Automatic Verification, Provable Security
Security Vulnerabilities and Solutions in Mobile WiMAX
Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka
Vol. 7 No. 11 pp. 7-15
IEEE 802.16e security, multi- and broadcast service, shared key vulnerability, hash chaining solution
Security Verification for Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Vol. 9 No. 3 pp. 1-11
Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment
Security Analysis of Access Linux Platform
Andreas Sj?str?m, Kazuhide Fukushima, Shinsaku Kiyomoto, Wook Shin, Toshiaki Tanaka
Vol. 10 No. 5 pp. 12-18
Access Linux, Security, Open Platform, Mobile, Vulnerability