Top | 研究室紹介 | メンバー紹介 | 研究室業績 | 学会関連 | 関連情報 | イベント | English


    教授 宮地 充子(1998-)

    TOP 
    論文  解説論文・招待講演  著書  研究内容  受賞暦 
    国際・国内貢献  国際会議プログラム委員  共著者リスト  楕円暗号の初期研究  講義資料 

    国際論文編集委員

    1. Special Issue on Cloud Computing Security and Privacy: Standards and Regulations. Computer Standards & Interfaces (CSI)
    2. Special Issue on Cryptography in Computer System Security, International Journal of Information and Computer Security (IJICS), 2007
    3. Special Issue on Cryptography in Networks, International Journal of Networks and Security (IJNS), 2006

    国際会議プログラム委員

    1. The 6th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2016)
    2. The 10th International Conference on Provable Security (ProvSec 2016)
    3. The 3rd International Conference on Future Data and Security Engineering (FDSE 2016)
    4. International Conference on Advanced Computing and Applications 2016 (ACOMP 2016)
    5. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016)
    6. The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
    7. The 17th International Conference on Information and Communication Security (ICICS2015)
    8. The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015)
    9. The 2nd International Conference on Research in Security Standardisation (SSR 2015)
    10. The 15th IMA International Conference on Cryptography and Coding (IMACC 2015)
    11. International Conference on Advanced Computing and Applications 2015 (ACOMP 2015)
    12. The 12th International Conference on Security and Cryptography (SECRYPT 2015)
    13. The 13th Annual Conference on Privacy, Security and Trust (PST 2015)
    14. The 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
    15. The 10th China International Conference on Information Security and Cryptology (Inscrypt 2014)
    16. The 17th Annual International Conference on Information Security and Cryptology (ICISC 2014)
    17. The 1st International Conference on Research in Security Standardisation (SSR 2014)
    18. The conference Future Data and Security Engineering (FDSE 2014)
    19. The 14th IEEE International Conference on Computer and Information Technology (CIT 2014)
    20. ProvSec 2014 (8th International Conference on Provable Security)
    21. The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014)
    22. The 19th Australasian Conference on Information Security and Privacy (ACISP2014)
    23. 12th International Conference on Applied Cryptography and Network Security(ACNS 2014)
    24. The 16th Information Security Conference(ISC 2013)
    25. The 9th China International Conference on Information Security and Cryptology (Inscrypt 2013)
    26. The 6th International Conference on Pairing-Based Cryptography (Pairing 2013)
    27. The 15th International Conference on Information and Communications Security (ICICS 13)
    28. The 16th International Conference on Information Security and Cryptology (ICISC 2013)
    29. The 18th Australasian Conference on Information Security and Privacy (ACISP2013)
    30. The 18th European Symposium on Research in Computer Security(ESORICS 2013)
    31. The 2013 Asian Conference on Availability, Reliability and Security(AsiaARES 2013)
    32. The 9th Information Security Practice and Experience Conference (ISPEC 2013)
    33. The 17th Financial Cryptography and Data Security (FC 2013)
    34. The 13th Cryptographers' Track of the RSA Conference 2013 (CT-RSA 2013)
    35. The 15th International Conference on Information Security and Cryptology (ICISC 2012)
    36. The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012)
    37. The 11th International Conference on Cryptology and Network Security (CANS 2012)
    38. The 15th Information Security Conference (ISC 2012)
    39. The 13th International Workshop on Information Security Applications (WISA 2012)
    40. The International Conference on Security and Cryptography (SECRYPT 2012)
    41. The 5th International Conference on Pairing-Based Cryptography (Pairing 2012)
    42. The 17th European Symposium on Research in Computer Security (ESORICS 2012)
    43. The 6th International Conference on Provable Security (ProvSec 2012)
    44. The 17th Australasian Conference on Information Security and Privacy (ACISP 2012)
    45. The 10th International Conference on Applied Cryptography and Network Security (ANCS 2012)
    46. The 8th Information Security Practice and Experience - 8th International Conference (ISPEC 2012)
    47. The 7th China International Conference on Information Security and Cryptology (Inscrypt 2011)
    48. The 14th International Conference on Information Security and Cryptology (ICISC 2011)
    49. The 12th workshop of InformationSecurity Applications (WISA2011)
    50. The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011)
    51. The 10th International Conference on Cryptology and Network Security (CANS 2011)
    52. The 14th Information Security Conference (ISC 2011)
    53. The 16th Australasian Conference on Information Security and Privacy (ACISP 2011)
    54. The 2011 Workshop on RFID Security (RFIDsec'11 Asia)
    55. The 7th Information Security Practice and Experience Conference (ISPEC 2011)
    56. The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
    57. The 13th International Conference on Information Security and Cryptology (ICISC 2010)
    58. The 11th International Workshop on Information Security Applications (WISA 2010)
    59. The 4th International Conference on Trusted Cloud Infrastructure (ICTCI 2010)
    60. The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
    61. The 15th Australasian Conference on Information Security and Privacy (ACISP 2010)
    62. The 6th Information Security Practice and Experience Conference (ISPEC2010)
    63. The 8th International Conference on Applied Cryptography and Network Security (ACNS2010)
    64. The 4th International Conference on Pervasive Computing and Applications (ICPCA2009)
    65. The 12th International Conference on Information Security and Cryptology (ICISC 2009)
    66. The 10th International Workshop on Information Security Applications (WISA2009)
    67. International Conference on Security and Cryptography 2009 (SECRYPT 2009)
    68. The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair
    69. International Workshop on Security 2009 (IWSEC 2009)
    70. The 4th International Conference on Pervasive Computing and Applications(ICPCA09)
    71. The 2009 International Workshop on Computer Graphics, Multimedia andSecurity (CGMS-09)
    72. The 14th Australasian Conference on Information Security and Privacy (ACISP 2009)
    73. The 5th Information Security Practice and Experience Conference (ISPEC 2009)
    74. The 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS'09)
    75. The 11th International Conference on Information Security and Cryptology (ICISC) 2008
    76. International Conference on Security and Cryptography (SECRYPT) 2008
    77. 11th International Security Conference 2008 (ISC08)
    78. International Workshop on Security 2008 (IWSEC2008)
    79. Africacrypt 2008
    80. The 4th Information Security Practice and Experience Conference (ISPEC 2008)
    81. EUROCRYPT 2008
    82. The 2007 International Conference on Intelligent Pervasive Computing (IPC-07)
    83. ICISC 2007
    84. IASTED International Conference on Communication, Network, and Information Security (CNIS 2007)
    85. International Conference on Security and Cryptography (SECRYPT) 2007
    86. Information Security Conference (ISC'07)
    87. International Workshop on Security 2007 (IWSEC 2007), Co-Program chair
    88. International Conference on Provable Security 2007 (ProvSec 2007)
    89. Pairing-based Cryptography 2007
    90. Security and Cryptography for Networks (SCN) 2006
    91. IASTED International Conference on CNIS 2006
    92. International Conference on CRYPTOLOGY AND NETWORK SECURITY (CANS '06)
    93. IFIP International Conference on EUC'2006
    94. International Workshop on Security 2006 (IWSEC 2006), Award chair
    95. EUROCRYPT 2006
    96. ACISP 2006
    97. ICISC 2006
    98. International Conference on Security and Cryptography (SECRYPT 2006)
    99. ACNS 2005
    100. WISA 2005
    101. IASTED CCN 2005
    102. ICISC 2005
    103. ASIACRYPT 2004
    104. ISITA 2004
    105. ISITA 2000 秘書
    106. IASTED 2003
    107. ACNS 2003
    108. ICISC 2002
    109. ACISP 2002
    110. ICISC 2001