Search

Your search keyword '"Emura, Keita"' showing total 163 results

Search Constraints

Start Over You searched for: Author "Emura, Keita" Remove constraint Author: "Emura, Keita" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
163 results on '"Emura, Keita"'

Search Results

1. An Anonymous yet Accountable Contract Wallet System using Account Abstraction

2. An End-To-End Encrypted Cache System with Time-Dependent Access Control

3. Attribute-Based Keyed Fully Homomorphic Encryption

6. A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage

8. Membership Privacy for Asynchronous Group Messaging

9. An Anonymous Trust-Marking Scheme on Blockchain Systems

11. More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model

13. Output Prediction Attacks on Block Ciphers Using Deep Learning

16. Verifiable Functional Encryption Using Intel SGX

23. Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices

25. A Generic Construction of Integrated Secure-Channel Free PEKS and PKE

26. A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation

27. Fully Anonymous Group Signature with Verifier-Local Revocation

30. Generic Constructions for Fully Secure Revocable Attribute-Based Encryption

31. A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords

32. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions

33. New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters

34. A Light-Weight Group Signature Scheme with Time-Token Dependent Linking

35. Group Signature with Deniability: How to Disavow a Signature

37. Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

38. Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

39. Anonymous Data Collection System with Mediators

40. Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions

41. Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts

Catalog

Books, media, physical & digital resources