Search results for: Keita Emura
Journal of Medical Systems > 2019 > 43 > 5 > 1-15
Designs, Codes and Cryptography > 2018 > 86 > 8 > 1623-1683
Journal of Information Security and Applications > 2017 > 34 > P2 > 84-91
International Journal of Information Security > 2018 > 17 > 2 > 193-220
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 13-23
Theoretical Computer Science > 2016 > 630 > C > 95-116
Lecture Notes in Computer Science > Information Security Applications > Anonymity/Authentication/Access Control > 281-295
Lecture Notes in Computer Science > Advances in Information and Computer Security > Protocols > 181-198
Lecture Notes in Computer Science > Provable Security > Signature II > 184-198
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Session 3: PKI and PKC Applications > 77-92
Lecture Notes in Computer Science > Advances in Information and Computer Security > Public Key Encryption > 193-209
Lecture Notes in Computer Science > Advanced Data Mining and Applications > Data Mining in Specific Areas > 370-382
Lecture Notes in Computer Science > Information and Communications Security > Applied Cryptography > 143-157
Lecture Notes in Computer Science > Information and Communications Security > Public Key Encryption > 57-68
Lecture Notes in Computer Science > Provable Security > Encryption > 200-213
Theoretical Computer Science > 2016 > 615 > C > 45-60