91 results on '"Hiroaki Anada"'
Search Results
2. Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks'.
3. Correction: Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks'.
4. Finsler Encryption.
5. Accountable Ring Signatures from Symmetric-Key Primitives.
6. Dynamic Group Signatures with Message Dependent Opening and Non-Interactive Signing.
7. Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups.
8. Dynamic Group Signatures with Message Dependent Opening and Non-Interactive Signing.
9. Group Signatures with Equality Test on Signers.
10. Group Signatures with Designated Traceability over Openers' Attributes.
11. Group Signatures with Designated Traceability.
12. Security Reconsideration and Efficiency Evaluation of Decentralized Multi-authority Anonymous Authentication Scheme.
13. Quantum Security and Implementation Evaluation of Non-adaptive Group-Testing Aggregate Message Authentication Codes.
14. Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers.
15. Approach to Cryptography from Differential Geometry with Example.
16. Anonymous Deniable Predicate Authentication Scheme with Revocability.
17. A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
18. Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs.
19. Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map.
20. Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability.
21. Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs.
22. Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
23. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
24. Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
25. Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for Security.
26. Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities.
27. RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
28. Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption.
29. Anonymous Authentication Scheme with Decentralized Multi-Authorities.
30. Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'.
31. Cross-group Secret Sharing for Secure Cloud Storage Service.
32. Expressive Rating Scheme by Signatures with Predications on Ratees.
33. Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
34. Application of NTRU Using Group Rings to Partial Decryption Technique.
35. Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
36. Reset-Secure Identity-Based Identification Schemes Without Pairings.
37. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
38. Attribute-Based Two-Tier Signatures: Definition and Construction.
39. A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
40. Identity-Embedding Method for Decentralized Public-Key Infrastructure.
41. Attribute-based signatures without pairings via the fiat-shamir paradigm.
42. Group Signatures with Designated Traceability over Openers’ Attributes in Bilinear Groups
43. Attribute-Based Identification: Definitions and Efficient Constructions.
44. Identification Schemes from Key Encapsulation Mechanisms.
45. Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
46. Attribute-Based Identification: Definitions and Efficient Constructions.
47. A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing
48. Attribute-Based Signatures of Fiat-Shamir Type in Bilinear Groups: Scheme and Performance
49. Identification Schemes from Key Encapsulation Mechanisms.
50. Witness-Indistinguishable Arguments with Σ-Protocols for Bundled Witness Spaces and its Application to Global Identities.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.