NASA Scientific and Technical Aerospace Reports
NASA Scientific and Technical Aerospace Reports
NASA Scientific and Technical Aerospace Reports
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
we present a series of lessons learned based on a pilot experiment in which we explored the performance of two organizations<br />
(functional <strong>and</strong> divisional) performing a single mission, which in this case, was not designed to favor a particular organization.<br />
The lessons learned here suggest a variety of empirical strategies to further our investigations, including measures of<br />
performance, rigorous attention to team <strong>and</strong> mission definitions, <strong>and</strong> precise planning of training structure. Our findings<br />
suggest that each of these factors has the potential to profoundly influence the results, reflecting the multiple factors that shape<br />
team performance.<br />
DTIC<br />
Comm<strong>and</strong> <strong>and</strong> Control; Congruences; Organizations<br />
20060002073 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />
Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on Information<br />
Security, Volume 52, Nos. 1/2<br />
Takahashi, Tetsuo, Editor; Tawara, Yasuo, Editor; Watanabe, Katsuya, Editor; Tomita, Fumihiko, Editor; Kurihara, Noriyuki,<br />
Editor; Okada, Kazunori, Editor; March/June 2005; 313 pp.; In English; See also 20060002074 - 20060002101; Original<br />
contains color <strong>and</strong> black <strong>and</strong> white illustrations; Copyright; Avail.: Other Sources<br />
Contents include the following: 1. Researches on Information Security in NICT. Technologies for Security of the Internet.<br />
Study on Process Model for Internet Risk Analysis. Design <strong>and</strong> Phase-1 Development of Secure Overlay Networks. A<br />
Development of Experimental Environments ‘SIOS’ <strong>and</strong> ‘VM Nebula’ for Reproducing Internet Security Incidents.<br />
Buffer-Overflow Detection in C Program by Static Detection. Efficient Traceback Method for Detecting Illegal Access. Log<br />
Management System Based on Distributed Database Using P2P Network. The Mathematics Models <strong>and</strong> an Actual Proof<br />
Experiment for IP Traceback System. Detecting Unknown Computer Viruses -A New Approach. Countermeasures Against<br />
Information Leakage. Subgroup Membership Problem <strong>and</strong> Its Applications to Information Security. A Functional<br />
Cryptosystem Using a Group Action. A Generalized Harley Algorithm for Genus Two Hyperelliptic Curves. An Expansion<br />
Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers. A Study on Higher Order Differential<br />
Cryptanalysis of 64 Bit Block Cipher KASUMI. On Multi Rounds Elimination Method for Higher Order Differential<br />
Cryptanalysis. Error Detection <strong>and</strong> Authentication in Quantum Key Distribution. Information Hiding on Digital Documents<br />
by Adjustment of New-line Positions..<br />
CASI<br />
Computer Information Security; Computer Viruses; Management Systems; Information Systems<br />
20060002080 National Inst. of Information <strong>and</strong> Communications Technology, Japan<br />
A Functional Cryptosystem Using a Group Action<br />
Yamamura, Akihiro; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on<br />
Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 101-110; In English; See also 20060002073; Copyright;<br />
Avail.: Other Sources<br />
The main purpose of this paper is to examine applications of group cryptography. We construct a backward deterministic<br />
system employing the action of the modular group on the upper half plane <strong>and</strong> the amalgamated free product structure of the<br />
group. We invent a geometrical algorithm that finds the normal form of an element of the modular group effectively. This<br />
algorithm makes our backward deterministic system tractable. Using the backward deterministic system, we invent a<br />
public-key cryptosystem in terms of a functional cryp system.<br />
Author<br />
Algorithms; Cryptography; Group Theory; Modularity<br />
20060002099 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />
Limiting the Holding Time in Mobile Cellular Phone Systems During Disasters<br />
Okada, Kazunori; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special Issue on<br />
Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 289-299; In English; See also 20060002073; Copyright;<br />
Avail.: Other Sources<br />
Call dem<strong>and</strong> suddenly <strong>and</strong> greatly increases during major disasters, because people want to check on their families <strong>and</strong><br />
friends in the stricken area. Many call attempts in mobile cellular systems are blocked due to limited radio frequency<br />
resources. In this paper, as a solution to this problem, limiting the holding time of calls is investigated <strong>and</strong> a dynamic holding<br />
time limit (DHTL) method, which varies the holding time limit dynamically based on the number of call attempts is proposed.<br />
The effect of limiting holding time is investigated first using a computer simulation with a constant <strong>and</strong> heavy traffic load<br />
46