http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
The Advantage of an Endoscopic Submucosal Tunneling Technique for Rectal Carcinoid Tumors
( Hideki Kobara ),( Hirohito Mori ),( Li Chei Shintaro Fujihara ),( Noriko Nishiyama ),( Tsutomu Masaki ) 대한간학회 2017 Gut and Liver Vol.11 No.5
Endoscopic treatment can be a curative option for small carcinoid tumors with an extremely low risk of metastasis. Since most carcinoid tumors are characterized by a specific growth pattern in the submucosal (SM) layer, specialized endoscopic techniques for deeper resection to achieve clear vertical margins are needed. The endoscopic submucosal dissection (ESD) method in the SM space is superior to con-ventional endoscopic mucosal resection. However, the stan-dard ESD technique sometimes fails to provide complete deep SM dissection due to insufficient SM lifting. Here, to resolve this problem, we describe our initial experience with an endoscopic SM tunneling technique that is effective for treating rectal carcinoid tumors. (Gut Liver 2017;11:735- 737)
Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol
SeongHan Shin,Kazukuni Kobara,Hideki Imai 한국정보보호학회 2004 정보보호학회논문지 Vol.14 No.4
At Asiacrypt 2003, Shin et al., have proposed a new class for Authenticated Key Establishment (AKE) protocol named Leakage-Resilient AKE (LR-AKE). The authenticity of LR-AKE is based on a user's password and his/her stored secrets in both client side and server side. In their LR-AKE protocol, no TRM (Tamper Resistant Modules) is required and leakage of the stored secrets from any side does not reveal any critical information on the password. This property is useful when the following situation is considered:(1) Stored secrets may leak out;(2) A user communicates with a lot of servers;(3) A user remembers only one password. The other AKE protocols, such as SSL/TLS and SSH (based on PKI), Password-Authenticated Key Exchange (PAKE) and Threshold-PAKE (T-PAKE), do not satisfy that property under the above-mentioned situation since their stored secrets (or, verification data on password) in either the client or the servers contain enough information to succeed in retrieving the relatively short password with off-line exhaustive search. As of now, the LR-AKE protocol is the currently known solution. In this paper, we prove its security of the LR-AKE protocol in the standard model. Our security analysis shows that the LR-AKE protocol is provably secure under the assumptions that DDH (Decisional Diffie-Hellman) problem is hard and MACs are selectively unforgeable against partially chosen message attacks (which is a weaker notion than being existentially unforgeable against chosen message attacks).
New Security Layer for OverLay Networks
Imai, Hideki,Shin, Seong-Han,Kobara, Kazukuni The Korea Institute of Information and Commucation 2009 Journal of communications and networks Vol.11 No.3
After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.
New Security Layer for OverLay Networks (Invited Paper)
Hideki Imai,SeongHan Shin,Kazukuni Kobara 한국통신학회 2009 Journal of communications and networks Vol.11 No.3
After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.
Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications
Imai, Hideki,Shin, Seong-Han,Kobara, Kazukuni Korea Institute of Information Security and Crypto 2008 정보보호학회논문지 Vol.18 No.b6
Secure channels, indispensable to many applications, can be established by using an authenticated key exchange (AKE) protocol where the involving parties authenticate one another and then share authenticated session keys over insecure networks. In this paper, we introduce a new type of AKE protocols that are especially designed to minimize the damages caused by leakages of stored secrets. Such protocols are called Leakage-Resilient AKE (LR-AKE) protocols, whose motivation, design principles, several constructions, security analysis and applications are explained in detail.
Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications
Hideki Imai,SeongHan Shin,Kazukuni Kobara 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.b6
Secure channels, indispensable to many applications, can be established by using an authenticated key exchange (AKE) protocol where the involving parties authenticate one another and then share authenticated session keys over insecure networks. In this paper, we introduce a new type of AKE protocols that are especially designed to minimize the damages caused by leakages of stored secrets. Such protocols are called Leakage-Resilient AKE (LR-AKE) protocols, whose motivation, design principles, several constructions, security analysis and applications are explained in detail.
Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications
Hideki Imai,SeongHan Shin,Kazukuni Kobara 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.6
Secure channels, indispensable to many applications, can be established by using an authenticated key exchange (AKE) protocol where the involving parties authenticate one another and then share authenticated session keys over insecure networks. In this paper, we introduce a new type of AKE protocols that are especially designed to minimize the damages caused by leakages of stored secrets. Such protocols are called Leakage-Resilient AKE (LR-AKE) protocols, whose motivation, design principles, several constructions, security analysis and applications are explained in detail.