Search

Your search keyword '"Sakurai, Kouichi"' showing total 1,412 results

Search Constraints

Start Over You searched for: Author "Sakurai, Kouichi" Remove constraint Author: "Sakurai, Kouichi"
1,412 results on '"Sakurai, Kouichi"'

Search Results

51. Constructions of Secret Sharing Schemes – Accommodating New Parties

52. Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings

53. 3-Party Adversarial Steganography

54. Secret Sharing on Evolving Multi-level Access Structure

55. An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning.

56. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

58. Secured tracing for group signatures from attribute‐based encryption.

61. Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness

62. Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

66. A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation

67. Evasion Attacks Against Statistical Code Obfuscation Detectors

68. A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks

69. On the Robustness of Visual Cryptographic Schemes

83. Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools

84. On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies

85. Application of NTRU Using Group Rings to Partial Decryption Technique

86. Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS

87. Attribute-Based Two-Tier Signatures: Definition and Construction

88. A Multivariate Encryption Scheme with Rainbow

89. Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters

90. Expressive Rating Scheme by Signatures with Predications on Ratees

91. Securing Sensor Networks by Moderating Frequencies

93. Identity-Embedding Method for Decentralized Public-Key Infrastructure

94. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse

95. Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage

98. Ciphertext-Auditable Public Key Encryption

Catalog

Books, media, physical & digital resources