321 results on '"Yohei Watanabe"'
Search Results
52. A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test.
53. State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
54. Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage.
55. Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices.
56. Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication.
57. Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption.
58. A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule.
59. On the Power of Interaction in Signcryption.
60. Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
61. Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
62. Card-Based Majority Voting Protocols with Three Inputs Using Three Cards.
63. Multi-Designated Receiver Authentication Codes: Models and Constructions
64. A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model
65. Radiation-Induced Remodeling of the Tumor Microenvironment Through Tumor Cell-Intrinsic Expression of cGAS-STING in Esophageal Squamous Cell Carcinoma
66. Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
67. Broadcast Encryption with Guessing Secrecy.
68. Unconditionally secure searchable encryption.
69. New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
70. How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
71. Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
72. Sequential aggregate authentication codes with information theoretic security.
73. Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles.
74. Constructions of CCA-Secure Revocable Identity-Based Encryption.
75. Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
76. Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
77. Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices
78. Supplementary Table S1 from Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
79. Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
80. Supplementary Figures 1-6 from Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
81. Data from Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
82. Timed-Release Computational Secret Sharing Scheme and Its Applications.
83. Timed-Release Secret Sharing Schemes with Information Theoretic Security.
84. Efficient Card-Based Majority Voting Protocols
85. High-Sensitive and Selective Detection of Human-Infectious Influenza Virus Using Biomimetic Graphene Field-Effect Transistor.
86. Identity-based encryption with security against the KGC: A formal model and its instantiations
87. Preoperative bacterial culture can predict severe pneumonia in patients receiving esophagectomy
88. Habitat Segregation between Fagus crenata and Quercus crispula: Factors Causing Their Distributions on a Snowy Mountain
89. Clinical outcomes of laparoscopic and endoscopic cooperative surgery for gastric gastrointestinal stromal tumor
90. Information-Theoretically Secure Entity Authentication in the Multi-user Setting.
91. Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
92. Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
93. Slip measurement and vehicle control for leg/wheel mobile robots using caster type odometers.
94. The effects of T-DXd on the expression of HLA class I and chemokines CXCL9/10/11 in HER2-overexpressing gastric cancer cells
95. Adaptively secure revocable hierarchical IBE from k-linear assumption
96. Efficient revocable identity-based encryption with short public parameters
97. Neoadjuvant Chemotherapy Induces IL34 Signaling and Promotes Chemoresistance via Tumor-Associated Macrophage Polarization in Esophageal Squamous Cell Carcinoma
98. Key bacterial taxa and metabolic pathways affecting gut short-chain fatty acid profiles in early life
99. Epidemiologic, clinical, and genetic characteristics of influenza C virus infections among outpatients and inpatients in Sendai, Japan from 2006 to 2020
100. Lacking Interleukin-10 Regulates the Inflammasome-driven Alveolar Bone Loss
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.