Search

Your search keyword '"Hiroaki Anada"' showing total 20 results

Search Constraints

Start Over You searched for: Author "Hiroaki Anada" Remove constraint Author: "Hiroaki Anada" Topic business Remove constraint Topic: business
20 results on '"Hiroaki Anada"'

Search Results

1. A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing

2. Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)

3. RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust

4. Approach to Cryptography from Differential Geometry with Example

5. Quantum Security and Implementation Evaluation of Non-adaptive Group-Testing Aggregate Message Authentication Codes

6. Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability

7. Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions

8. Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map

9. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

10. Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for Security

11. Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions

12. Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption

13. Anonymous Authentication Scheme with Decentralized Multi-Authorities

14. Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

15. Application of NTRU Using Group Rings to Partial Decryption Technique

16. Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms

17. Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks'

18. Identity-Embedding Method for Decentralized Public-Key Infrastructure

19. Correction: Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks'

20. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse

Catalog

Books, media, physical & digital resources