05.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

we present a series of lessons learned based on a pilot experiment in which we explored the performance of two organizations<br />

(functional <strong>and</strong> divisional) performing a single mission, which in this case, was not designed to favor a particular organization.<br />

The lessons learned here suggest a variety of empirical strategies to further our investigations, including measures of<br />

performance, rigorous attention to team <strong>and</strong> mission definitions, <strong>and</strong> precise planning of training structure. Our findings<br />

suggest that each of these factors has the potential to profoundly influence the results, reflecting the multiple factors that shape<br />

team performance.<br />

DTIC<br />

Comm<strong>and</strong> <strong>and</strong> Control; Congruences; Organizations<br />

20060002073 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />

Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on Information<br />

Security, Volume 52, Nos. 1/2<br />

Takahashi, Tetsuo, Editor; Tawara, Yasuo, Editor; Watanabe, Katsuya, Editor; Tomita, Fumihiko, Editor; Kurihara, Noriyuki,<br />

Editor; Okada, Kazunori, Editor; March/June 2005; 313 pp.; In English; See also 20060002074 - 20060002101; Original<br />

contains color <strong>and</strong> black <strong>and</strong> white illustrations; Copyright; Avail.: Other Sources<br />

Contents include the following: 1. Researches on Information Security in NICT. Technologies for Security of the Internet.<br />

Study on Process Model for Internet Risk Analysis. Design <strong>and</strong> Phase-1 Development of Secure Overlay Networks. A<br />

Development of Experimental Environments ‘SIOS’ <strong>and</strong> ‘VM Nebula’ for Reproducing Internet Security Incidents.<br />

Buffer-Overflow Detection in C Program by Static Detection. Efficient Traceback Method for Detecting Illegal Access. Log<br />

Management System Based on Distributed Database Using P2P Network. The Mathematics Models <strong>and</strong> an Actual Proof<br />

Experiment for IP Traceback System. Detecting Unknown Computer Viruses -A New Approach. Countermeasures Against<br />

Information Leakage. Subgroup Membership Problem <strong>and</strong> Its Applications to Information Security. A Functional<br />

Cryptosystem Using a Group Action. A Generalized Harley Algorithm for Genus Two Hyperelliptic Curves. An Expansion<br />

Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers. A Study on Higher Order Differential<br />

Cryptanalysis of 64 Bit Block Cipher KASUMI. On Multi Rounds Elimination Method for Higher Order Differential<br />

Cryptanalysis. Error Detection <strong>and</strong> Authentication in Quantum Key Distribution. Information Hiding on Digital Documents<br />

by Adjustment of New-line Positions..<br />

CASI<br />

Computer Information Security; Computer Viruses; Management Systems; Information Systems<br />

20060002080 National Inst. of Information <strong>and</strong> Communications Technology, Japan<br />

A Functional Cryptosystem Using a Group Action<br />

Yamamura, Akihiro; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on<br />

Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 101-110; In English; See also 20060002073; Copyright;<br />

Avail.: Other Sources<br />

The main purpose of this paper is to examine applications of group cryptography. We construct a backward deterministic<br />

system employing the action of the modular group on the upper half plane <strong>and</strong> the amalgamated free product structure of the<br />

group. We invent a geometrical algorithm that finds the normal form of an element of the modular group effectively. This<br />

algorithm makes our backward deterministic system tractable. Using the backward deterministic system, we invent a<br />

public-key cryptosystem in terms of a functional cryp system.<br />

Author<br />

Algorithms; Cryptography; Group Theory; Modularity<br />

20060002099 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />

Limiting the Holding Time in Mobile Cellular Phone Systems During Disasters<br />

Okada, Kazunori; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on<br />

Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 289-299; In English; See also 20060002073; Copyright;<br />

Avail.: Other Sources<br />

Call dem<strong>and</strong> suddenly <strong>and</strong> greatly increases during major disasters, because people want to check on their families <strong>and</strong><br />

friends in the stricken area. Many call attempts in mobile cellular systems are blocked due to limited radio frequency<br />

resources. In this paper, as a solution to this problem, limiting the holding time of calls is investigated <strong>and</strong> a dynamic holding<br />

time limit (DHTL) method, which varies the holding time limit dynamically based on the number of call attempts is proposed.<br />

The effect of limiting holding time is investigated first using a computer simulation with a constant <strong>and</strong> heavy traffic load<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!