ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策
|
|
- れれ ふじした
- 5 years ago
- Views:
Transcription
1 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... hidemitsu.izawa@boj.or.jp katsuhisa.hirokawa@boj.or.jp / /
2 1. IC 34 IC EMVCo [2015] 1 IC 2014 IC IC EMV 1 EMV IC IC 1 IC IC 2 IC Bond et al. [2014] Pre-play attack ATM 3 Pre-play attack BBC [2012] IC... 1 EuroPay International Mastercard International Visa International IC 3 2 Message Authentication Code 3 IC IC 54 /
3 IC Pre-play attack IC IC Pre-play attack 2 EMV 3 Pre-play attack 4 5 EMV 2. EMV IC EMV EMVCo [2011a, b, c, d] IC EMV IC IC EMV IC 1 IC IC 1 IC 55
4 PIN 4 PIN ATM CAT 5 EMV IC EMV IC 2 EMV EMV 3 SDA: Static Data Authentication DDA: Dynamic Data Authentication AC CDA: Combined DDA/Application Cryptogram Generation 3 EMV SDA PIN PIN 3 PIN PIN 6 PIN 7 PIN PIN PIN PIN... 4 Personal Identification Number 5 Credit Authorization Terminal POS Point-Of-Sale 6 PIN 7 PIN PIN PIN Try Counter PIN PIN 56 /
5 IC Pre-play attack 3 3 EMV EMV AC AC Application Cryptogram EMV Triple DES AES AC AC MAC key key 8 AC 2 4 AC AC MAC key AC AC AC AC AC AC 2 EMV... 8EMV 57
6 4 EMV EMV EMV AC 4 EMV EMV EMV UN UN UN EMV ATC ARQC ARQC ARQC EMV AC AC Replay attack: 10 AC ATC AC... 9EMV 10 EMV ARQC 58 /
7 IC Pre-play attack AC 3 EMV Step1. Unpredictable Number UN UN Step2 AC Step2. Application Transaction Counter ATC AC AC Authorisation Request Cryptogram ARQC ATC ATC Step3. ARQC ATC Step4. ARQC Authorisation Response Code ARC ARC ARQC Application Response Cryptogram ARPC EMV ARQC ARQC 12 EMV 59
8 Step5. ARPC ARC Step6. ARPC 13 Transaction Certificate TC TC AC ATC ARC Step7. TC TC 4 EMV 3. Pre-play attack EMV IC Bond et al. [2014] Bond et al. [2014] Pre-play attack Pre-play attack Replay attack Replay attack Step2 ARQC ARC ARPC ARPC 60 /
9 IC Pre-play attack Pre-play attack 1 Pre-play attack Bond et al. [2014] 2 Random number attack Defective random number generators poor UN generation Protocol flaw attack 1. IC Bond et al. [2014] 2. PIN Bond et al. [2014] SDA 61
10 5. PIN PIN Random number attack Random number attack UN EMV UN 32 bit UN UN UN ARQC UN ARQC 5 62 /
11 IC Pre-play attack 5 Random number attack Step1. PIN Step2. UN Step1 Step2 UN Step3. PIN Step4. UN ARQC ATC UN Step2 Step5. Step4 UN UN ARQC Step3 Step6. UN ARQC Step7. PIN Step4 Step8. UN 63
12 UN 1 UN1 Step9 Step9. UN1 UN ARQC UN1 ARQC ARQC1 ARQC1 ARQC1 Step10. ARQC1 1 ARPC ARC TC 3 Protocol flaw attack Protocol flaw attack UN ARQC 6 64 /
13 IC Pre-play attack 6 Protocol flaw attack Step1. PIN Step2. UN UN1 1 Step3. 1 ARQC ARQC1 Step4. 1 ARQC1 Step1 Step5. PIN Step6. 2 Step7. Step6 2 Step6 Step8. 2 Step6 Step4 1 ARQC1 ARQC Step5 65
14 Step9. ARPC ARC TC 4. Pre-play attack Pre-play attack 1 Pre-play attack. UN A UN UN ARQC Step9 ARQC ARQC. B EMV EMV EMV EMV 66 /
15 IC Pre-play attack 7 EMV EMV 2 Pre-play attack Pre-play attack A B Bond et al. [2014]. UN A UN EMVCo [2014] UN SHA
16 . ATC ARQC ATC ATC ARQC ATC ATC ARQC ATC ATC ATC. TC TC 3 Step3 ARQC Step7 TC TC 14 TC TC 5 Step10 6 Step9 TC IC TC Step3 ARQC TC TC 68 /
17 IC Pre-play attack Bond et al. [2014]. UN UN A UN 2 UN Step3 UN A UN. ARQC ARQC ARQC EMV ARQC MAC key UN ARQC ARQC hh mm ss MAC key UN ARQC ARQC RFC6238 M Raihi et al. [2011] TOTP: Time-Based One-Time Password Algorithm 1 EMV 69
18 . ARQC 15 ARQC ARQC ARQC ARQC ATC MAC key ATC ARQC 16 ARQC RFC4226 M Raihi et al. [2005] HOTP: an HMAC-Based One-Time Password Algorithm UN ARQC 1 1 EMV EMV ATC ATC AAC AC ATC ATC EMV ATC ATC 16 ARQC 1 70 /
19 IC Pre-play attack. ARQC ARQC EMV ATC ATC ARQC ARQC ATC ATC ATC ATC MAC key ATC ATC ATC ATC ARQC ATC ATC ATC ATC EMV Last Online ATC Register ATC EMV ATC Step6 ATC ATC ATC ATC ATC 2 ATC ARQC ATC ATC ATC ATC AAC AC ATC AAC ATC 1 EMV. UN B UN 71
20 UN UN ARQC ARQC EMV UN UN ARQC. 2 8 UN EMV EMV 5. EMV IC Pre-play attack Random number attack Protocol flaw attack 2 IC IC IC IC UN 72 /
21 IC Pre-play attack 8 Pre-play attack EMV EMV EMV EMV Pre-play attack Bond et al. [2014] UN ATC TC UN
22 IC EMV IC Bond et al. [2014] ATM ATM ATM 74 /
23 IC Pre-play attack IC BBC, Chip and pin weakness exposed by Cambridge researchers, BBC News technology, 2012 ( Bond, Mike, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson, Chip and Skim: cloning EMV cards with the pre-play attack, IEEE Symposium on Security and Privacy, 2014, pp EMVCo, Book 1 Application Independent ICC to Terminal Interface Requirements, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011a., Book 2 Security and Key Management, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011b., Book 3 Application Specification, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011c., Book 4 Cardholder, Attendant, and Acquirer Interface Requirements, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011d., SB-144: Terminal Unpredictable Number generation (Spec Change), Specification Bulletin 1st Edition, EMVCo, 2014., Worldwide EMV Chip Card Deployment and Adoption, Worldwide EMV Deployment Statistics, EMVCo, 2015 ( EMV_Deployment_Stats.pdf). M Raihi, David, Mihir Bellare, Frank Hoornaert, David Naccache, and Ohad Ranen, HOTP: An HMAC-Based One-Time Password Algorithm, IETF, RFC 4226, 2005., Salah Machani, Mingliang Pei, and Johan Rydell, TOTP: Time-Based One-Time Password Algorithm, IETF, RFC 6238,
24 EMV EMV IC IC EuroPay International Mastercard International Visa International PIN Personal Identification Number SDA Static Data Authentication AC Application Cryptogram MAC key AC MAC key EMV AC ARQC Authorisation Request Cryptogram AAC Application Authentication Cryptogram TC Transaction Certificate 3 ARQC Authorisation Request Cryptogram AC ATC ARQC=MAC key ATC TC Transaction Certificate AC ATC ARC TC= MAC key ATC ARC 76 /
25 IC Pre-play attack UN ATC ARC ARPC Unpredictable Number 32 bit UN EMV UN AC ATC ATC UN ATC UN Application Transaction Counter 1 ATC UN AC UN ATC Authorisation Response Code Application Response Cryptogram ARQC ARQC ARC XOR Triple DES AES 77
26 78 /
ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策
IC IC EMV EMV ICIC IC IC EMV IC EMV IC... E-mail: masataka.suzuki@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp E-mail: k-kobara@aist.go.jp //2012.7 107 1 IC EMV 1 EMV EMVCo IC 36% 10 IC 65% 1,540 2009
More informationリテール・バンキング・システムのICカード対応に関する現状とその課題
IC IC IC ATM IC IC ATM IC IC IC IC E-mail: yuuko.tamura@boj.or.jp E-mail: hirokawa@imes.boj.or.jp IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC
More informationICカード利用システムにおいて新たに顕現化したPre-play attackとその対策
IMES DISCUSSION PAPER SERIES IC カード利用システムにおいて新たに顕現化した Pre-play attack とその対策 いざわひでみつひろかわかつひさ 廣川勝久 井澤秀益 Discussion Paper No. 2015-J-10 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 日本銀行金融研究所
More informationサイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点
EMV IC IC 20 IC EMV IC EMV IC EMV... E-mail: masataka.suzuki@boj.or.jp E-mail: Sugawara.Takeshi@bp.MitsubishiElectric.co.jp E-mail: Suzuki.Daisuke@bx.MitsubishiElectric.co.jp / /2015.10 107 1. IC 2011
More informationNo.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit
No.7,321-332 (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit Cash Card Standard Specifications (Second Edition)
More informationICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に
IC IC IC ICIC EMVEMV IC EMVIC EMV ICEMVRSAkey TDES TDES-MAC E-mail: masataka.suzuki@boj.or.jp NTTE-mail: kanda.masayuki@lab.ntt.co.jp IC IC IC IC EMV JCCA ICJCCA ICEMV EMVIC EMV EMV EMVEMVCo EMV EMV EMVICIC
More information1.0 15 2 10
1.0 15 2 10 1... 3 2... 4 3 DSRC... 5 3.1... 5 3.2... 6 3.2.1 EMV 2 EMV 1... 6 3.2.2... 6 3.2.3 PIN... 6 3.2.4... 6 3.2.5 I/F... 6 3.2.6 ICCR/W... 6 3.2.7 HMI... 6 3.3 DSRC... 7 3.4... 8 3.4.1... 8 3.4.2...
More information4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5
No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet
More information電子マネーと通信産業の戦略
No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More informationPowerPoint プレゼンテーション
第 14 回 情 報 セキュリティ シンポジウム 多 様 化 するリテール 取 引 の 安 全 性 モバイル 化 を 支 える 情 報 セキュリティ 技 術 を 中 心 に - 講 演 1- リテール 取 引 システムにおける ICキャッシュカード 機 能 の 活 用 と 将 来 の 発 展 2012-12-20 日 本 銀 行 金 融 研 究 所 情 報 技 術 研 究 センター テクニカル アドバイザー
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationIPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs
IPSEC VPN IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE 1 2 2 IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPsec SA IKE Initiator Responder IPsec-VPN ISAKMP
More information中田真佐男 323‐352/323‐352
IT FinTech Finance Technology e SNS (AI) (2013) (2015) ATM IC EMV VISA MasterJCB VISA Master (Union Pay) VISA Master JCB J-Debit J-Debit VISA IC Alipay QR POS nanaco WAON EdyJR Suica PASMO au Master au
More information完成卒論.PDF
LAN 4 9920449 2 0 LAN Bluetooth LAN 1 LAN LAN LAN LAN 2 LAN Bluetooth LAN Bluetooth 3 Bluetooth 4 Bluetooth 5 Bluetooth Bluetooth 6 LAN Bluetooth LAN LocalAreaNetwork 1 LAN LAN LAN LAN Ethernet Ethernet
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More information電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて
1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008
More informationはじめに
19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30
More information/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More informationVRSP Japanese PDF.indd
1 2 1. 1 2 1.2 3 1.3 Visa 3 1.4 Visa 4 2 5 2. 1 5 2.2 PCI DSS 6 2.3 PIN 7 2.4 3-D(ACS) 7 3 8 3. 1 8 3.2 9 3.3 10 4 1 1 4.1 1 1 4.2 12 5 13 14 1 1.1 Visa Visa www.visa-asia.com/spregistry Visa Visa 2 1.2
More informationモバイルプリペイド決済の実現モデルの調査研究
ECOM 2005 Gift 1...1 2...4 2.1... 4 2.2... 5 2.2.1... 5 2.2.2... 7 2.2.3... 8 2.2.4... 9 2.3... 10 2.3.1... 10 2.3.2... 12 2.3.3... 14 3... 16 3.1... 17 3.1.2... 18 3.1.3... 20 3.1.4... 21 3.1.5... 23
More informationIBM Presentations: Smart Planet Template
PCI DSS PCI DSS ITS IAS. PCI QSA PCI DSS PCI DSS PCI DSS 2 PCI DSS VISA AIS MasterCard SDP AMEX DSOP DISCOVER DISC JCB DSP PCI SSC (Payment Card Industry Security Standards Council) PCI URL https://www.pcisecuritystandards.org/index.shtml
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More information技術的条件集別表 26.2 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv4 トンネル方式 -10GBASE LR インタフェース )
技術的条件集別表 26.2 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv4 トンネル方式 -10GBASE LR インタフェース ) [ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ 1998.5.20) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) IETF RFC791(Internet Protocol 1981.9)
More information生体認証システムにおける情報漏洩対策技術の研究動向
ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
More informationP.1P.3 P.4P.7 P.8P.12 P.13P.25 P.26P.32 P.33
: : P.1P.3 P.4P.7 P.8P.12 P.13P.25 P.26P.32 P.33 27 26 10 26 10 25 10 0.7% 331 % 26 10 25 10 287,018 280,446 6,572 30,236 32,708 2,472 317,254 313,154 4,100 172,724 168,173 4,551 6,420 6,579 159 179,144
More information技術的条件集別表 26.3 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv6 トンネル方式 )
技術的条件集別表 26.3 ISP 接続用ルータ接続インタフェース仕様 (IPv6 トンネル方式 ) [ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ 1998.5.20) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) IETF RFC791(Internet Protocol 1981.9) IETF RFC792(Internet Control
More informationWin XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /
SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices
More informationスライド 1
IPA 2010 3 25 1 1 / / 2 (DRBG) DRBG NIST SP800-90 2 1 3 JCMVP 2009 1 JCATT AES 15 4 5 OK/NG OK ( ) ( ) 6 JCMVP JCATT JCATT http://www.ipa.go.jp/security/jcmvp/open_documents.html 7 332 (DES, Triple-DES,
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More informationMacintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi
3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.
More informationIC API
IC API Handa-F@mail.dnp.co.jp 2004 8 26 Copyright (c) 2004 NPO Page 2 IC API PKI IC PKCS#11 CSP (Cryptographic Service Provider) PKCS#11 CSP PKCS#15 GSC-IS Copyright (c) 2004 NPO Page 3 (identity token)
More information橡sirahasi.PDF
Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,
More informationJP1/Integrated Management - Service Support 操作ガイド
JP1 Version 9 JP1/Integrated Management - Service Support 3020-3-R92-10 P-242C-8F94 JP1/Integrated Management - Service Support 09-50 OS Windows Server 2008 Windows Server 2003 OS JP1/Integrated Management
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More information[ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ ) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) JIS C6832 ( 石英系マルチモード光ファイバ素線 1995) IETF RFC791(Internet Protocol
技術的条件集別表 26.1 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 ( IPv4 PPPoE 方式 -IPv6 機能部 ) 注 : 本別表については NTT 西日本のみの適用です [ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ 1998.5.20) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) JIS C6832 ( 石英系マルチモード光ファイバ素線
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More informationDec , IS p. 1/60
Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60
More information22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener
22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Generator PF-Web for Constructing Web Applications. Tomohiro
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More information昭和恐慌期における長野県下農業・農村と産業組合の展開過程
No. 3, 96-107 (2002) Electronic Money and Strategy of Telecommunication Industry Oshima Kazuchika Nihon University, Graduate School of Social and Cultural Studies Information technology innovation came
More information2008
2008 1 1 2 2 2.1 NIST Fingerprint Image Software 2.............. 2 2.2 Reference Vector........................ 2 2.2.1.................. 2 2.2.2.................. 4 3 5 3.1............................
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More information12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1
12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 Biometrics Biometrics 01.9.11 2003/3/6 Copy ight (C) NEC Corporation 2 AFIS Internet ID(PID) 2003/3/6 Copy ight (C) NEC Corporation 3 2003/3/6 Copy ight
More informationFlow Control Information Network 1 /
(2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Flow Control Information Network 1 / 2012 2 Flow Control DLL : Automatic Repeat Request (ARQ) Stop-and-wait
More information<B54CB5684E31A4E9C0CBA4E5AA6BC160BEE3B27AA544A5552E706466>
N1 2 3 1 16 17 18 19 20 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 4 2 38 39 40 41 42 44 45 46 47 48 50 51 52 53 54 55 56 57 58 59 60 61 5 3 62 63 64 65 66 68 69 70 70 72 74 75 76 77 78 80 81 82 83
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More informationSi-R180 ご利用にあたって
P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14
More information1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush
PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v
More informationCisco Aironet 1130AG アクセス ポイント クイック スタート ガイド
CONTENTS 1 IP 2 3 6 7 9 12 15 17 18 IP 20 CLI IP 21 Telnet CLI 23 24 28 802.11G 802.11A 34 38 Express Security 40 Express Security 41 SSID 42 47 LED 48 50 SSID50 WEP 50 51 52 MODE 52 Web 53 55 1 56 IP
More informationFEEL Prod Grap PH_Artwork_P0AVS QSG JP A4_ _Rev.11.indd
EUROPORT MPA40BT-PRO/MPA40BT All-in-One Portable 40-Watt PA System with Bluetooth Connectivity, Battery Operation and Transport Handle 2 EUROPORT MPA40BT-PRO/MPA40BT 3 ¼" TS 1. 2. 3. 4. 5. 6. 7. 8. 9.
More information暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std e 使用したツール :S
暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std 802.16e-2005 http://standards.ieee.org/getieee802/download/802.16e-2005.pdf 3. 使用したツール :Scyther 4. 評価の概要 :Scyther による評価では weak agreement への攻撃の可能性が指摘されているが
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationtotal-all-nt.dvi
XI W I D E P R O J E C T 1 WIDE Reliable Multicast 1.1 TV 1 1 TCP WIDE JGN/JB SOI (DV) Reliable Multicast (RM) US Reliable Multicast IETF RMT-WG PGM Digital Fountain FEC Tornado Code Ruby Code 1.2 WIDE
More informationEncryption Security
200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML
More information2/ PPPoE AC(Access Concentrator) PPPoE PPPoE Ping FTP PP
PPPoE HATS LAN 2/31... 4... 4... 5... 6... 6... 7... 8... 8... 9... 10 PPPoE... 10 AC(Access Concentrator)... 10...11 PPPoE... 11 PPPoE... 13 Ping... 13 FTP... 14 PPPoE... 14... 15... 15 3/31... 17 PPPoE...
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More informationDynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.
SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationRFID RFID + ) (RFID IC transponder) RFID Tag Antenna wired-line Reader Ethernet/ RS232c Antenna RFID Tag Reader id command id interrogation id radio s
RFID 1 RFID 2 RFID 3. RFID 4. RFID E-mail: ichiro@nii.ac.jp RFID RFID RFID (Radio Frequency IDentification system) c.f. IC E-mail: ichiro@nii.ac.jp RFID 2006 6,000 RFID RFID + ) (RFID IC transponder) RFID
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More informationA book
Hitachi Multi Payment Network communications server 3000-3-493-40 P-1B43-6111 Hitachi Multi Payment Network communications server Base 01-03( OS HP-UX 11.0 HP-UX 11i) P-1B43-6311 Hitachi Multi Payment
More informationPX-105
NPD4717-00 ...4... 4... 4...5 /...6...8... 8... 9...10...10...11...11...11...12...12...14...16...17...17...17...18...20...20...21...22...24...25 /...25 /...26...26 2 ...26 USB...27...28...29...31...31...32...32
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More informationDocuCentre-III C3300 / C2200
C3300 / C2200 2 3 50 45 35 35 35 35 G4 G3 Management Ecology Scan Fax Print Copy C3300 / C2200 Product Summary 4 5 SCAN 6 7 COPY 8 9 PRINT 10 FAX 11 SECURITY 12 12 13 13 MANAGEMENT IC Card Gate IC Card
More information1 2 3 1 34060120 1,00040 2,000 1 5 10 50 2014B 305,000140 285 5 6 9 1,838 50 922 78 5025 50 10 1 2
0120-563-506 / 9001800 9001700 123113 0120-860-777 163-8626 6-13-1 Tel.03-6742-3111 http://www.himawari-life.co.jp 1 2 3 1 34060120 1,00040 2,000 1 5 10 50 2014B 305,000140 285 5 6 9 1,838 50 922 78 5025
More information2.1...3 2.2...3 2.3...4 2.3.1...4 2.3.2...6 2.3.3...9 2.3.4...16 2.4...18 2.4.1...18 2.4.2...22 3.1...27 3.2...28 3.3...32 3.3.1 Public Key Infrastruc
2.1...3 2.2...3 2.3...4 2.3.1...4 2.3.2...6 2.3.3...9 2.3.4...16 2.4...18 2.4.1...18 2.4.2...22 3.1...27 3.2...28 3.3...32 3.3.1 Public Key Infrastructure Card Consortium...32 3.3.2 BuySmart Web for i-mode...33
More informationThe Institute for Economic Studies Seijo University 6 1 20, Seijo, Setagaya Tokyo 157-8511, Japan The Institute for Economic Studies Green Paper No. 59 Consumers Decision on the Choice of Small Payment
More information3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre
3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More information00.目次_ope
816XL ii iii iv iv User Entry 1 3 v vi vii viii 1 1 C: >VTTERM 1- 1 1-3 1 1-4 1 1-5 1 1-6 1 1-7 1 1-8 1 1-9 1 1-10 C: >VTN 1 Host Name: 1-11 1 01 1-1 0.0.0.0 1 1-13 1 1-14 - -3 Port status and configuration
More information0-表紙
openehr EHR openehr openehr CEN/ISO 13606 HL7 CDA Health Record An extract of an EHR Extract of EHR Multi document message Folder Composition (versions) Folder Composition (+/- versions) Document (Version
More informationMicrosoft Word - Œ{Ł¶.doc
17 59.0% 41.0% 60.8% 76.0%71.9% 65.3% 17 2.6% 3.5% 25.9% 57.3% 16.7% 28.1% 52.2% 11.1% 2.6% =270 18 2 (=199) 1 17 71.0% 76.0% 44.2% 71.9% 36.2% 18.1% 65.3% 16.7% 34.1% 16.3% 47.1% 14.9% 13.8% 5.0% 3.6%
More informationby CASIO W61CA For Those Requiring an English/Chinese Instruction
by CASIO W61CA http://www.au.kddi.com/torisetsu/index.html http://www.au.kddi.com/manual/index.html For Those Requiring an English/Chinese Instruction Manual English/Chinese Simple Manual can be read on
More information100 7 ( ) ( ) ( )
(1) 100 1 102 2 ( 1) 111 100 7 ( ) ( ) ( ) (1) 101 1 ( ) 2 ( 1) 3 ( ) 102 7 4 4 ( ) 5 ( 2) 1 2 ( 1) 1 1 ( ) 1 ( ) ( ) (1) 103 ( 318 ) 2 ( ) 104 7 2 ( ) ( 247 ) ( 248 ) ( ) (1) ( 189 2 ) ( 191 1 ) ( 193
More informationTCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More information3: OFF WEB 4 4: 30 (3) Radio Frequency Identification RFID RFID RFID IC Suica ICOCA PASMO PiTaPa Edy id 1 RFID RFID RFID 1 1mm 2.3 ON/OFF 3 3 (1) (2)
RC-009 Multifunctional Outlet With Method Of Cutting Standby Power By Scheduler Hiroshi Akeyama Takao Kawamura Kazunori Sugahara Takeshi Saitoh Ryosuke Konishi 1. IT [1, 2, 3, 4] ON/OFF PC cogma [5] cogma
More informationB 20 Web
B 20 Web 0753018 21 1 29 1 1 6 2 8 3 UI 10 3.1........................ 10 3.2 Web............ 11 3.3......... 12 4 UI 14 4.1 Web....................... 15 4.2 Web........... 16 4.3 Web....................
More information1. - - - 2 - - 3 - - 4 - 1 Muser KT, Bond GR, Drake RE, et al(1998). Model of community care for severe mental illness: A review of research on case management. Schizophrenia Bulletin, 24(1): 33-74. -
More informationRBA RBA TSM 2) RBA Visa MC RBA RBA RBA
RBA No-Surcharge NSR 1) RBA RBA TSM RBA RBA RBAReserve Bank of Australia USA RBA RBA TSM 2) RBA Visa MC RBA RBA RBA 3) MSF 4) default ATM Two-sided Markets Two-sidedMarkets Two-sided MarketsTSM 5) Platform
More information情報科学研究 第19号
Research on Organizational Information Security Management and Privacy Protection of Personal Data in the Digital Surveillance Society Tadaaki Nemoto, Yoshihito Hattori, Ken-ichi Sato p. Mark Weiser 4.
More information日立評論2013年1月号 : ITソリューション・クラウドサービス
IT Solutions and Cloud Services IT IT IT 1 2 SNS Social Networking Service Field to Future Technology Harmonious Cloud IT Information Technology 2012 4 6 IT Field to Future Technology Big Data Ex IT 1
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More information