Search results for: Koutarou Suzuki
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2009 > Identity-Based Encryption > 215-234
Lecture Notes in Computer Science > Advances in Information and Computer Security > Protocols > 164-180
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming - CP 2002 > Technical Papers > 387-401
Lecture Notes in Computer Science > Cryptology and Network Security > Cryptographic Protocol and Schemes II > 518-536
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Key Agreement > 187-205
Lecture Notes in Computer Science > Financial Cryptography > Auctions > 239-249
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Digital Signatures > 62-77
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2011 > Authenticated Key Agreement > 121-141
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Works in Progress > 333-335
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Key Management and Key Exchange > 16-33