Search results for: Hidenori Kuwakado
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Cryptographic Algorithms > 151-168
Lecture Notes in Computer Science > Information and Communications Security > Cryptographic Protocols > 112-122
Lecture Notes in Computer Science > Information Security Applications > N/W Security and Intrusion Detection > 174-189
2010 IEEE International Symposium on Information Theory > 2682 - 2685