量子暗号通信の仕組みと開発動向

Size: px
Start display at page:

Download "量子暗号通信の仕組みと開発動向"

Transcription

1 RSA AES 1 BB84Y-00 hitoshi.gotou-1@boj.or.jp //

2 km 1.02 Mbps 100 km 10.1 kbps 1 Gbps 10 Gbps VPN 7 km /

3

4 2 ID IC KEELOQ 1 1 EUROCRYPT IC IC 3 3a DESAESCamelliaMISTY /

5 3 a b 3b RSA Ξ 2 5,000 Web 111

6 Web 1 RSA A 4 A K K K A K K 112 /

7 4 Internet Explorer 4 113

8 5 SHA-1 Wang, Yin, and Yu [2005] NIST 2011 SHA-1 GPKI SHA-1 SHA /

9 5 IC IC 115

10 Φ 2 0 Φ 0 D 0; 1 Φ 0 D 1; 0 Φ 1 D 1; 1 Φ 1 D 0; Φ D ; Φ D : 1 RSA n 2 2 n 116 /

11 6 2 X a b a b Φ ff Φ ff D 0; (1) 0 Φ ff D ff Φ 0 D ff; (2) ff Φ fi D fi Φ ff; (3).ff Φ fi/ Φ fl D ff Φ.fi Φ fl /: (4) 117

12 1 ff fi ff fi ff Φ fi ff fi fl ff Φ fi fi Φ fl.ff Φ fi/ Φ fl ff Φ.fi Φ fl / Φ 1 D 1 1 Φ 0 D Φ 0 D 0 1 Φ 1 D Φ 1 D 0 1 Φ 1 D Φ 0 D 1 1 Φ 0 D Φ 1 D 0 0 Φ 0 D Φ 0 D 1 0 Φ 1 D Φ 1 D 1 0 Φ 1 D Φ 0 D 0 0 Φ 0 D X a a a Φ.a Φ X / D X: (5) X a 1 X i a i (4) (1) (2) X.a Φ X / a X b Φ a Φ fb Φ.a Φ X /g; (6).a Φ X / b fb Φ.a Φ X /g a a Φ fb Φ.a Φ X /g b (4) (3) (6) b Φ a Φ fa Φ.b Φ X /g: (7) 118 /

13 (4)(1) (2).b Φ X / b Φ.b Φ X / D X; (8) fb Φ.a Φ X /g a a Φ fb Φ.a Φ X /g (7).b Φ X / fb Φ.a Φ X /g.b Φ X / fb Φ.a Φ X /g Φ.b Φ X / D b Φ a Φ X Φ b Φ X D b Φ a Φ b Φ X Φ X D a Φ b Φ b Φ X Φ X D a Φ 0 Φ 0 D a; (1)(4) a a Φ X a RSA bit RSA CRYPTREC Report IFPn D pq FLOPS FLOPS 119

14 fm 1 3 f: 1, m 100 nm10 1 LSI 50 nm m 1nm m /

15 6 *

16 7 200,000,000,000, mm /

17 Christiaan Huygens ( ) 7 Isaac Newton ( ) 8 E D hνe: h: ν: 9 Albert Einstein ( )

18 Thomas Young ( ) 124 /

19

20 a /

21

22 /

23 2 2 EPREinstein-Podolsky-Rosen EPR 2 2 A B X X A B X 2 X X A

24 Walborn, Cunha, Pádua, and Monken [2002] BBOBeta-Barium borate ffi 1 45 ffi p Dp s 2 Ds 1 Ds Ds 2 Ds /

25 13 Walborn, Cunha, Pádua, and Monken [2002] Dp X Ds X Ds 2 Ds s p Dp p X Dp BBO Ds p Ds p 4. BB84Bennett and Brassard [1984] BB Charles H. Bennett 131

26 Gilles Brassard BB84 B92Bennett [1992] E91 Ekert [1991] BB /

27 ffi 45 ffi 90 ffi ffi 2 45 ffi ffi A 16 B45 ffi 16 C

28 ffi 45 ffi 135 ffi ffi 0 ffi 90 ffi 90 ffi ffi ffi 0 ffi 90 ffi 90 ffi 0 ffi 134 /

29 BB84 3BB84 BB ffi 190 ffi ffi 90 ffi 45 ffi 135 ffi 45 ffi 1135 ffi 0 0 ffi 90 ffi 45 ffi 135 ffi ffi

30 18 BB84 BC 18 A 4 0 ffi 45 ffi 90 ffi 135 ffi B CD B 1 45 ffi ffi C D /

31 BB84 0 ffi 45 ffi 135 ffi 0 ffi 135 ffi 0 ffi 90 ffi 135 ffi ffi 90 ffi 135 ffi 45 ffi 135 ffi 0 ffi 45 ffi 90 ffi BB84 137

32 ffi 45 ffi 135 ffi 0 ffi 135 ffi 0 ffi 90 ffi 135 ffi ffi 45 ffi 0 ffi 135 ffi 0 ffi 45 ffi 90 ffi 135 ffi ffi 90 ffi 45 ffi 135 ffi 135 ffi 90 ffi 45 ffi 90 ffi /

33 ,000 1 kbps

34 QKD: Quantum Key Distribution kbps Mbps CD kbps AES Triple-DES 1 BB84 Y Y-00 Yuen 2000 Yuen Y Y-00 Y km 2.5 Gbps BB km 10.1 kbps BB84 BB Y BB /

35 8Y Y

36 Y-00 BB84 Y /

37 BB84 Y-00 BB84 Y-00 Y-00 BB84 Y-00 Y-00 Nishioka et al. [2004, 2005] BB84 Y

38 BB BB84 Y /

39 RSA RSA 2 2 Okamoto, Tanaka, and Uchiyama [2000] PKIPublic Key Infrastructure 6. MagiQ Technologies, Inc. 18 QPN Security Gateway 8505 id Quantique SA 19 Cerberis SmartQuantum 20 SQBox Defender NECNTT Y-00 BB84 BB84 AES Triple-DES km

40 SANStorage Area Network 7. AIST 21 NTT SECOQCdevelopment of a global network for SEcure COmmunication based on Quantum Cryptography 22 Network Demonstration Scientific Conference 4 St. Pölten 5 85 km Kurtsiefer [2008] NICT 23 Space Quest EU ECHELON National Institute of Information and Communications Technology: /

41 AS IP Future Internet GENIGlobal Environment for Network Innovations GÉANT2 NICT TCP/IP Clean Slate BB

42 BB /

43 CRYPTREC Report SHA-1 RSA Bennett, Charles H., Quantum Cryptography Using Any Two Nonorthogonal States, Physical Review Letters, 68 (21), American Physical Society, 1992., and Gilles Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing, Proceedings of the IEEE International Conference on Computers, Systems & Signal Processing, Bangalore, India, Ekert, Artur K., Quantum Cryptography Based on Bell s Theorem, Physical Review Letters, 67 (6), American Physical Society, Kurtsiefer, Christian, Status of R&D on Quantum Communication and Related Research in Singapore, Proceedings of the Updating Quantum Cryptography 2008, AIST, IPA, NICT, December Nishioka, Tsuyoshi, Toshio Hasegawa, Hirokazu Ishizuka, Kentaro Imafuku, and Hideki Imai, How Much Security Does Y-00 Protocol Provide Us? Physics Letters A, 327 (1), June 2004, pp ,,,,and, Reply to: Comment on: How Much Security Does Y-00 Protocol Provide Us? [Phys. Lett. A 346 (2005) 1], Physics Letters A, 346 (1-3), 10 October 2005, pp Okamoto, Tatsuaki, Keisuke Tanaka, and Shigenori Uchiyama, Quantum Public- Key Cryptosystems, Proceedings of the CRYPTO2000, Lecture Notes in Computer Science, 1880, Springer-Verlag, 2000, pp Walborn, Stephen P., Marcelo O. Terra Cunha, Sebastião Pádua, and Carlos H. Monken, Double-Slit Quantum Eraser, Physical Review A, 65, , American Physical Society, Wang, Xiaoyun, Yiqun Lisa Yin, and Hongbo Yu, Finding Collisions in the Full SHA-1, Proceedings of the CRYPTO2005, Lecture Notes in Computer Science, 3621, Springer, 2005 (available at ProceedingVersion.pdf). 149

44 150 /

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

量子情報科学−情報科学の物理限界への挑戦- 2018

量子情報科学−情報科学の物理限界への挑戦- 2018 1 http://qi.mp.es.osaka-u.ac.jp/main 2 0 5000 10000 15000 20000 25000 30000 35000 40000 1945 1947 1949 1951 1953 1955 1957 1959 1961 1963 1965 1967 1969 1971 1973 1975 1977 1979 1981 1983 1985 1987 1989

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo 1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,

More information

2013 M

2013 M 2013 M0110453 2013 : M0110453 20 1 1 1.1............................ 1 1.2.............................. 4 2 5 2.1................................. 6 2.2................................. 8 2.3.................................

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

http://www.ipa.go.jp/security/ Contents 1. NIST 2010 2. NISC 3. CRYPTREC 2008 10 28 Copyrignt 2008, IPA all right reserved. 2 1977 MAC) PKI PKI PKI: (Public Key Infrastructure) 2008 10 28 Copyrignt 2008,

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

[3] 2 2

[3] 2 2 (Akio HOSOYA) 2-12-1 Department of Physics, Tokyo Institute of Technology 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 2011 9 27 1 2 9 = 18 9 9 = 81 3 9 = 27 8 9 = 72 [1] [2] email: ahosoya@th.phys.titech.ac.jp

More information

...i A

...i A ...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights 1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless

More information

IPSJ SIG Technical Report NetMAS NetMAS NetMAS One-dimensional Pedestrian Model for Fast Evacuation Simulator Shunsuke Soeda, 1 Tomohisa Yam

IPSJ SIG Technical Report NetMAS NetMAS NetMAS One-dimensional Pedestrian Model for Fast Evacuation Simulator Shunsuke Soeda, 1 Tomohisa Yam 1 1 1 1 1 NetMAS NetMAS NetMAS One-dimensional Model for Fast Evacuation Simulator Shunsuke Soeda, 1 Tomohisa Yamashita, 1 Masaki Onishi, 1 Ikushi Yoda 1 and Itsuki Noda 1 We propose the one-dimentional

More information

Si-R30取扱説明書

Si-R30取扱説明書 1 1 25 2 61 3 103 1 1 1 27 27 28 29 30 31 34 ISDN 34 35 35 36 ISDN 38 38 ISDN 39 40 ISDN 40 41 42 42 43 43 44 44 44 46 LAN 46 TCP/IP 46 WWW 52 LAN 54 54 HUB LAN 55 LAN 56 56 IP 57 58 1 1 Si-R30 CD-ROM

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome

More information

特集 e- サイエンスを実現するグリッド技術 1 サイエンスグリッドの動向 三浦謙一 国立情報学研究所 サイエンスグリッドとは 10 e- Electrical Power Grid 図 -1 Virtual Organization 1 ET 所の 所 (Electric ow

特集 e- サイエンスを実現するグリッド技術 1 サイエンスグリッドの動向 三浦謙一 国立情報学研究所 サイエンスグリッドとは 10 e- Electrical Power Grid 図 -1 Virtual Organization 1 ET 所の 所 (Electric ow 特集 e- サイエンスを実現するグリッド技術 1 サイエンスグリッドの動向 三浦謙一 国立情報学研究所 サイエンスグリッドとは 10 e- Electrical Power Grid 図 -1 Virtual Organization 1 ET SETI@HOME 所の 所 (Electric ower rid) 所 rid ット ー rid の の 所 ( 計算機 ー 機 ) 図 -1 グリッドのコンセプト

More information

1009.\1.\4.ai

1009.\1.\4.ai - 1 - E O O O O O O - 2 - E O O O - 3 - O N N N N N N N N N N N N N N N N N N N N N N N E e N N N N N N N N N N N N N N N N N N N N N N N D O O O - 4 - O O O O O O O O N N N N N N N N N N N N N N N N N

More information

20mm 63.92% ConstantZoom U 5

20mm 63.92% ConstantZoom U 5 29 30 2 13 16350926 20mm 63.92% ConstantZoom U 5 1 3 1.1...................................... 3 1.2................................. 4 2 8 2.1............... 8 2.2............................ 8 2.3..

More information

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW

PeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3

More information

VQS Collabo Homepage

VQS Collabo Homepage VQS Collabo Homepage http://www.vqscollabo.jp FAQ VQS...1...2...2 VQS...2...3...3...4 ( )...7...7...8 FAQ...8 VQS...9 FAQ... 10 VQS Internet Explorer... 11... 15 PROXY... 15 FinePrint5... 16... 17 FAQ...

More information

. NICT 100Tbps 10 80 40Gbit/s4ch x 40Gbit/s DQPSK 1 LSI 40G OTN LSI 40G DWDM LSI H22 12 5 1000 H23 2 22 10 LSI 4 1 042 327 7457 042 327 5959 042 327 6011 2 NICT GMPLS IETFASON ID 3 JGN2plus H20 ID H22

More information

IP IP DHCP..

IP IP DHCP.. NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

情報セキュリティ_2017版単ページ.indd

情報セキュリティ_2017版単ページ.indd Information Security Report 2016 1 INDEX 3 4 8 13 14 15 16 18 19 22 22 24 26 28 30 34 36 38 44 46 48 51 2 3 4 5 6 7 mail 8 9 10 mail mai ail il il mail mail mail mai ail il il mail mail mail HDD HDD 11

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

The Plasma Boundary of Magnetic Fusion Devices

The Plasma Boundary of Magnetic Fusion Devices ASAKURA Nobuyuki, Japan Atomic Energy Research Institute, Naka, Ibaraki 311-0193, Japan e-mail: asakuran@fusion.naka.jaeri.go.jp The Plasma Boundary of Magnetic Fusion Devices Naka Fusion Research Establishment,

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal 1 2 3 A projection-based method for interactive 3D visualization of complex graphs Masanori Takami, 1 Hiroshi Hosobe 2 and Ken Wakita 3 Proposed is a new interaction technique to manipulate graph layouts

More information

生体認証システムにおける情報漏洩対策技術の研究動向

生体認証システムにおける情報漏洩対策技術の研究動向 ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM

More information

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数 Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 takaken@ol.inf.uec.ac.jp {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods

More information

( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................

More information

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN 1 Internet Week 2002 20021218() 9:3012:30 () kuma@isid.co.jp ADSLFTTH 24 IP LAN LAN LAN 2 1 ? 3? 4 e-japan 20053000 20051000 2 IP»» 5 CATV DSL FTTH LAN 6 620(20029) CATV 180DSL 422FTTH 12 14 3 MP3CD CM

More information

1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15. 1. 2. 3. 16 17 18 ( ) ( 19 ( ) CG PC 20 ) I want some rice. I want some lice. 21 22 23 24 2001 9 18 3 2000 4 21 3,. 13,. Science/Technology, Design, Experiments,

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

IPSJ SIG Technical Report Vol.2014-ARC-213 No.24 Vol.2014-HPC-147 No /12/10 GPU 1,a) 1,b) 1,c) 1,d) GPU GPU Structure Of Array Array Of

IPSJ SIG Technical Report Vol.2014-ARC-213 No.24 Vol.2014-HPC-147 No /12/10 GPU 1,a) 1,b) 1,c) 1,d) GPU GPU Structure Of Array Array Of GPU 1,a) 1,b) 1,c) 1,d) GPU 1 GPU Structure Of Array Array Of Structure 1. MPS(Moving Particle Semi-Implicit) [1] SPH(Smoothed Particle Hydrodynamics) [] DEM(Distinct Element Method)[] [] 1 Tokyo Institute

More information

IntroductionToQuantumComputer

IntroductionToQuantumComputer http://quantphys.org/wp/keisukefujii/?p=433 Twitter Keisuke Fujii@fgksk ? 1687: () Isaac Newton (1642-1727) http://www.newton.cam.ac.uk/art/portrait.html Equation of motion ? 1687: () 1873: () James C.

More information

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8 2001/1/11 Web Simplified Techniques for Econometric Plannings & Simulations for WWW Fujiwara Takamichi 97-5075 N-23 Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3.

More information

ERA-201D1

ERA-201D1 4-652-247-01(1) AIBO LAN ERA-201D1 2000 Sony Corporation 6 8 AIBO b 1 AIBO 2 AIBO LAN AIBO 3 AIBO 2 3 AIBO http://www.aibo.com/ 4 AIBO AIBO OPEN-R OPEN-R MEMORY STICK TM ... 2... 9 AIBO LAN... 11... 12

More information

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi 3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d DEIM Forum 2013 F1-4 DTN, 565-0871 1-5 567-0047 5-1 184-8795 4-2-1 565-0871 2-1 E-mail: {sawamura.yusuke,nishio}@ist.osaka-u.ac.jp, teranisi@cmc.osaka-u.ac.jp, harumoto@eng.osaka-u.ac.jp DTN (DTN ) DTN

More information

IPA... 3... 4... 7... 8... 8... 10... 11... 13... 14... 21... 21... 23... 27 2

IPA... 3... 4... 7... 8... 8... 10... 11... 13... 14... 21... 21... 23... 27 2 IPA 1 IPA... 3... 4... 7... 8... 8... 10... 11... 13... 14... 21... 21... 23... 27 2 IPA 2011103 3 1 139 2 4 10 4 5 6 7 8 9 2 ID 10 11 12 13 14 15 16 17 18 19 20 http://www.jpcert.or.jp/research/2008/inoculation_200808.pdf

More information

untitled

untitled 1 1-1 p-i-n 1-1 (CIS/CIGS CdTe ) (GaAs) (,,) (, ) (,,) Si Si Si (CIS/CIGS CdTe ) (GaAs) (,,) (, ) (,,) Si Si Si Si 1-2 HITHeterojunction with Intrinsic Thin layer 30 HIT 22.3NIKKEI MICRODEVICES, May,82-86(2008)

More information

IP Management Within Universities: Experiences in the US

IP Management Within Universities: Experiences in the US yuko.harayama@most.tohoku.ac.jp 17/3/2004 1 Ref. Sandelin TLO expertise Ref. AUTM 17/3/2004 2 Ref. Heller & Eisenberg, 1998 The scientific commons is becoming privatized! (Ref. Nelson, 2003) 17/3/2004

More information

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10

More information

i Version 1.1, (2012/02/22 24),.,..,.,,. R-space,, ( R- space),, Kahler (Kähler C-space)., R-space,., R-space, Hermite,.

i Version 1.1, (2012/02/22 24),.,..,.,,. R-space,, ( R- space),, Kahler (Kähler C-space)., R-space,., R-space, Hermite,. R-space ( ) Version 1.1 (2012/02/29) i Version 1.1, (2012/02/22 24),.,..,.,,. R-space,, ( R- space),, Kahler (Kähler C-space)., R-space,., R-space, Hermite,. ii 1 Lie 1 1.1 Killing................................

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

1 IPA Hierocrypt-L1 Hierocrypt-L Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 2 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-

1 IPA Hierocrypt-L1 Hierocrypt-L Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 2 Hierocrypt-L1 Hierocrypt-L1 Hierocrypt- Hierocrypt-L1 : Hierocrypt-L1 Hierocrypt-L1 Hierocrypt-L1 Abstract: In this report, we address our security evaluation of Hierocrypt-L1. As a result, we found no critical security flaw during the limited

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

2

2 1 2 3 14 IT IT IT e-japan IT IT 24 IT IT IT IT CAD CAD Conference 2003 300 Web 41,056 15 Web (3D) 3,569 CIAJ () JEITA CEATEC JAPAN 2002 754 17 e-business Solution Plaza 28 30 4 5 1. 17 1465() 285 185 1

More information

Anderson ( ) Anderson / 14

Anderson ( ) Anderson / 14 Anderson 2008 12 ( ) Anderson 2008 12 1 / 14 Anderson ( ) Anderson 2008 12 2 / 14 Anderson P.W.Anderson 1958 ( ) Anderson 2008 12 3 / 14 Anderson tight binding Anderson tight binding Z d u (x) = V i u

More information

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre 3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination

More information

Internet Live Broadcasting of the Cycling Championships, Tomohito WADA, Koichi SHIMOZONO, and Masato MASUYA Information Technology Center for Sports S

Internet Live Broadcasting of the Cycling Championships, Tomohito WADA, Koichi SHIMOZONO, and Masato MASUYA Information Technology Center for Sports S Internet Live Broadcasting of the Cycling Championships, Tomohito WADA, Koichi SHIMOZONO, and Masato MASUYA Information Technology Center for Sports Sciences, National Institute of Fitness and Sports in

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

1007.\1.ai

1007.\1.ai - 1 - B - 2 - e - 3 - F O f g e f - 4 - O O N N N N N N N N N N N N N N N N N N N N N N N F C - 5 - N N N N N N N N N N N N N N N N N N N N N N N F - 6 - D - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 -

More information

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [ 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

IT Information Technology Information and Communication Technology E mail IT -84-

IT Information Technology Information and Communication Technology E mail IT -84- Protection of personal information and privacy Shinako MATSUI* * 17 19 * -83- IT Information Technology Information and Communication Technology E mail 18 15 17 IT -84- -85- 1980 OECD Guidelines on the

More information

IPSJ SIG Technical Report Vol.2010-NL-199 No /11/ treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corp

IPSJ SIG Technical Report Vol.2010-NL-199 No /11/ treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corp 1. 1 1 1 2 treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corpus Management Tool: ChaKi Yuji Matsumoto, 1 Masayuki Asahara, 1 Masakazu Iwatate 1 and Toshio Morita 2 This paper

More information

Microsoft Excelを用いた分子軌道の描画の実習

Microsoft Excelを用いた分子軌道の描画の実習 J. Comput. Chem. Jpn.,Vol.9, No.4, pp.177 182 (2010) 2010 Society of Computer Chemistry, Japan Microsoft Excel a*, b, c a, 790-8577 2-5 b, 350-0295 1-1 c, 305-8568 1-1-1 *e-mail: nagaoka@ehimegw.dpc.ehime-u.ac.jp

More information

2 A id A : A A A A id A def = {(a, a) A A a A} 1 { } 1 1 id 1 = α: A B β : B C α β αβ : A C αβ def = {(a, c) A C b B.((a, b) α (b, c) β)} 2.3 α

2 A id A : A A A A id A def = {(a, a) A A a A} 1 { } 1 1 id 1 = α: A B β : B C α β αβ : A C αβ def = {(a, c) A C b B.((a, b) α (b, c) β)} 2.3 α 20 6 18 1 2 2.1 A B α A B α: A B A B Rel(A, B) A B (A B) A B 0 AB A B AB α, β : A B α β α β def (a, b) A B.((a, b) α (a, b) β) 0 AB AB Rel(A, B) 1 2 A id A : A A A A id A def = {(a, a) A A a A} 1 { } 1

More information

2 3 5 5 5 5 6 6 7 7 8 10 10 10 10 11 11 12 12 13 16 16 16 16 17 19 21 21 22 5

2 3 5 5 5 5 6 6 7 7 8 10 10 10 10 11 11 12 12 13 16 16 16 16 17 19 21 21 22 5 1D000425-2 1 2 3 5 5 5 5 6 6 7 7 8 10 10 10 10 11 11 12 12 13 16 16 16 16 17 19 21 21 22 5 3 29 29 29 30 31 31 32 35 35 35 36 41 41 41 46 48 48 48 52 57 4 700 13 1988 4 5 4 5 21 1 1 3 4 5 6 21 10 1888

More information

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i 26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication

More information

経済論集 46‐2(よこ)(P)☆/2.三崎

経済論集 46‐2(よこ)(P)☆/2.三崎 1 2 1869 11 17 5 10 1 3 1914 5 15 5 1872 9 12 3 1870 1 26 14 1881 11 11 12 6 11 1878 5 9 13 1880 6 17 1 15 1882 1 2 3 11 1828 2 26 24 1891 4 22 2 1849 12 1 3 1856 pp 20 21. 1971 p.429. 1973 1, pp.440 444.

More information

(Kiyoshi Kitahara) Department of Engineering, Kogakuin University (Takayuki Abe) (Masataka Kaneko) (Satoshi Yamashita) Departmen

(Kiyoshi Kitahara) Department of Engineering, Kogakuin University (Takayuki Abe) (Masataka Kaneko) (Satoshi Yamashita) Departmen 1674 2010 132-145 132 (Kiyoshi Kitahara) Department of Engineering, Kogakuin University (Takayuki Abe) (Masataka Kaneko) (Satoshi Yamashita) Department of Fundamental Research, Kisarazu National College

More information

Initiative for developing a New Generation Network Architecture

Initiative for developing a New Generation Network Architecture (C) National Institute of Information and Communications Technology 1 (C) National Institute of Information and Communications Technology 2 AKARI Clean-Slate ) (C) National Institute of Information and

More information

1 (1997) (1997) 1974:Q3 1994:Q3 (i) (ii) ( ) ( ) 1 (iii) ( ( 1999 ) ( ) ( ) 1 ( ) ( 1995,pp ) 1

1 (1997) (1997) 1974:Q3 1994:Q3 (i) (ii) ( ) ( ) 1 (iii) ( ( 1999 ) ( ) ( ) 1 ( ) ( 1995,pp ) 1 1 (1997) (1997) 1974:Q3 1994:Q3 (i) (ii) ( ) ( ) 1 (iii) ( ( 1999 ) ( ) ( ) 1 ( ) ( 1995,pp.218 223 ) 1 2 ) (i) (ii) / (iii) ( ) (i ii) 1 2 1 ( ) 3 ( ) 2, 3 Dunning(1979) ( ) 1 2 ( ) ( ) ( ) (,p.218) (

More information

33312004_先端融合開発専攻_観音0314PDF用

33312004_先端融合開発専攻_観音0314PDF用 Advanced Course for Interdisciplinary Technology Development National Institute of Technology, Gifu College Advanced Course for Interdisciplinary Technology Development 1 5 Curriculum National Institute

More information

a m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B

a m 1 mod p a km 1 mod p k<s 1.6. n > 1 n 1= s m, (m, = 1 a n n a m 1 mod n a km 1 mod n k<sn a 1.7. n > 1 n 1= s m, (m, = 1 r n ν = min ord (p 1 (1 B 10 004 Journal of the Institute of Science and Engineering. Chuo University Euler n > 1 p n p ord p n n n 1= s m (m B psp = {a (Z/nZ ; a n 1 =1}, B epsp = { ( a (Z/nZ ; a n 1 a }, = n B spsp = { a (Z/nZ

More information

21 1 2 1 2

21 1 2 1 2 21 1 2 1 2 1 2 3 ( ) 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 210 0.0 0.0 22 23 25 27 28 29 30 31 32 33 34 35 36 74 pp.4362003.10 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 141224 14 48 10

More information

橡qc_report.PDF

橡qc_report.PDF () 4 () 5 -BB84 5 -a)bb84 5. BB84 5. BB84 5 3. BB84 6 4. BB84 -b)bb84 4. 4. 5 3. 9 -c) 3. 3. 5 3. 7 -d)bb84 30. 30. 3 -B9 36 -a)b9 36. 36. 38 3. 38 4. 39 -b)b9 4. 4. 44 -E9 47 -a)e9 47. 47. 49 -b)e9 5

More information

1. 2

1. 2 2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )

More information