Search

Your search keyword '"Keita Emura"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Keita Emura" Remove constraint Author: "Keita Emura" Topic computer security Remove constraint Topic: computer security
47 results on '"Keita Emura"'

Search Results

1. An Anonymous Trust-Marking Scheme on Blockchain Systems

3. Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation

4. A Privacy-Preserving Enforced Bill Collection System using Smart Contracts

5. Road-to-Vehicle Communications With Time-Dependent Anonymity: A Lightweight Construction and Its Experimental Results

6. Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation

7. Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures

8. A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage

9. Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices

10. Group Signature with Deniability: How to Disavow a Signature

11. Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation

12. Fully Anonymous Group Signature with Verifier-Local Revocation

13. SKENO: Secret key encryption with non-interactive opening

14. A Framework of Privacy Preserving Anomaly Detection

15. Group Signatures with Time-bound Keys Revisited

16. A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords

17. New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters

18. Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

19. Revocable hierarchical identity-based encryption

20. A Remark on ' Efficient Revocable ID-Based Encryption with a Public Channel'

21. Methods for Restricting Message Space in Public-Key Encryption

22. On the Leakage Resilient Cryptography in Game-Theoretic Settings

23. A Light-Weight Group Signature Scheme with Time-Token Dependent Linking

24. A KEM/DEM-Based Construction for Secure and Anonymous Communication

25. Disavowable Public Key Encryption with Non-interactive Opening

26. Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

27. Anonymous Data Collection System with Mediators

28. Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

29. A privacy-enhanced access log management mechanism in SSO systems from nominative signatures

30. Building secure and anonymous communication channel

31. An $r$ -Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

32. Risk visualization and alerting system

33. Revocable Identity-Based Encryption Revisited: Security Model and Construction

34. Group Signatures with Message-Dependent Opening

35. Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption

36. Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption

37. On the Security of Dynamic Group Signatures: Preventing Signature Hijacking

38. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption

39. Ideal Secret Sharing Schemes with Share Selectability

40. An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System

41. Efficient Privacy-Preserving Data Mining in Malicious Model

42. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation

43. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication

44. A Selectable k-Times Relaxed Anonymous Authentication Scheme

45. Group Signature Implies PKE with Non-interactive Opening and Threshold PKE

46. Towards Restricting Plaintext Space in Public Key Encryption

47. A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List

Catalog

Books, media, physical & digital resources