1,412 results on '"Sakurai, Kouichi"'
Search Results
52. Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
53. 3-Party Adversarial Steganography
54. Secret Sharing on Evolving Multi-level Access Structure
55. An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning.
56. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work
57. RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust
58. Secured tracing for group signatures from attribute‐based encryption.
59. Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability—Revisited
60. Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows
61. Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
62. Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
63. Efficacy of Acid Suppression Therapy
64. Short-Term Symptomatic Relief in Gastroesophageal Reflux Disease: A Comparative Study of Esomeprazole and Vonoprazan
65. A Comprehensive Security Analysis Checksheet for OpenFlow Networks
66. A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation
67. Evasion Attacks Against Statistical Code Obfuscation Detectors
68. A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
69. On the Robustness of Visual Cryptographic Schemes
70. Phoenix: A Live Upgradable Blockchain Client
71. 3-Party Adversarial Cryptography
72. Classification of Malicious Domains by Their LIFETIME
73. $$AC^0$$ Constructions of Secret Sharing Schemes – Accommodating New Parties
74. 3-Party Adversarial Steganography
75. Secret Sharing on Evolving Multi-level Access Structure
76. Blockchain for IoT-Based Digital Supply Chain: A Survey
77. Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
78. Deniable Secret Handshake Protocol - Revisited
79. Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation
80. A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing
81. An Analysis of IT Assessment Security Maturity in Higher Education Institution
82. CCA-Secure Keyed-Fully Homomorphic Encryption
83. Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools
84. On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies
85. Application of NTRU Using Group Rings to Partial Decryption Technique
86. Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS
87. Attribute-Based Two-Tier Signatures: Definition and Construction
88. A Multivariate Encryption Scheme with Rainbow
89. Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
90. Expressive Rating Scheme by Signatures with Predications on Ratees
91. Securing Sensor Networks by Moderating Frequencies
92. Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU
93. Identity-Embedding Method for Decentralized Public-Key Infrastructure
94. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse
95. Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage
96. Authentication in mobile cloud computing: A survey
97. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work
98. Ciphertext-Auditable Public Key Encryption
99. A Review on Machine Unlearning
100. A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.