590 results on '"Yohei Watanabe"'
Search Results
52. Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
53. Ionic strength-sensitive and pH-insensitive interactions between C-reactive protein (CRP) and an anti-CRP antibody
54. 'Genetic tuning' of avian influenza virus host adaptation from birds to humans
55. Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
56. Card-Based Majority Voting Protocols with Three Inputs Using Three Cards.
57. Identity-based encryption with hierarchical key-insulation in the standard model.
58. Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing.
59. Radiation-Induced Remodeling of the Tumor Microenvironment Through Tumor Cell-Intrinsic Expression of cGAS-STING in Esophageal Squamous Cell Carcinoma
60. Downregulation of PAICS due to loss of chromosome 4q is associated with poor survival in stage III colorectal cancer.
61. Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
62. Broadcast Encryption with Guessing Secrecy.
63. Unconditionally secure searchable encryption.
64. New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
65. Timed-release computational secret sharing and threshold encryption.
66. Multiple polymerase gene mutations for human adaptation occurring in Asian H5N1 influenza virus clinical isolates
67. Viscosity is an important factor of resistance to alcohol-based disinfectants by pathogens present in mucus
68. Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
69. Sequential aggregate authentication codes with information theoretic security.
70. Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles.
71. CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance.
72. Supplementary Table S1 from Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
73. Supplementary Figures 1-6 from Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
74. Data from Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
75. Constructions of CCA-Secure Revocable Identity-Based Encryption.
76. Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
77. Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
78. State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
79. A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.
80. Generic Constructions of Revocable Hierarchical Identity-based Encryption.
81. How to Make a Secure Index for Searchable Symmetric Encryption, Revisited.
82. PB2 mutations arising during H9N2 influenza evolution in the Middle East confer enhanced replication and growth in mammals.
83. Information-theoretically Secure Timed-release Secret Sharing Schemes.
84. Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage.
85. Timed-Release Computational Secret Sharing Scheme and Its Applications.
86. Timed-Release Secret Sharing Schemes with Information Theoretic Security.
87. Preoperative bacterial culture can predict severe pneumonia in patients receiving esophagectomy
88. High-Sensitive and Selective Detection of Human-Infectious Influenza Virus Using Biomimetic Graphene Field-Effect Transistor.
89. Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption.
90. Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE.
91. Habitat Segregation between Fagus crenata and Quercus crispula: Factors Causing Their Distributions on a Snowy Mountain
92. Clinical outcomes of laparoscopic and endoscopic cooperative surgery for gastric gastrointestinal stromal tumor
93. Infection of Human Tracheal Epithelial Cells by H5 Avian Influenza Virus Is Regulated by the Acid Stability of Hemagglutinin and the pH of Target Cell Endosomes
94. Information-Theoretically Secure Entity Authentication in the Multi-user Setting.
95. Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
96. Double-Stranded RNA Derived from Lactic Acid Bacteria Augments Th1 Immunity via Interferon-β from Human Dendritic Cells
97. Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
98. The effects of T-DXd on the expression of HLA class I and chemokines CXCL9/10/11 in HER2-overexpressing gastric cancer cells
99. Slip measurement and vehicle control for leg/wheel mobile robots using caster type odometers.
100. Epidemiologic, clinical, and genetic characteristics of influenza C virus infections among outpatients and inpatients in Sendai, Japan from 2006 to 2020
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.