Search results for: Kanta Matsuura
Lecture Notes in Computer Science > Electronic Government > Workshop: Regional Developments in Global Connection > 547-548
Security and Communication Networks > 9 > 12 > 1786 - 1795
Lecture Notes in Computer Science > Information Security, Practice and Experience > Public Key Cryptography > 276-293
Lecture Notes in Computer Science > Information and Communication Security > Security Protocols > 169-182
Lecture Notes in Computer Science > LATIN 2006: Theoretical Informatics > Regular Contributions > 130-141
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 183-192
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Identity-Based Encryption > 16-31
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Signature Protocols > 321-342
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 5: Eclectic Assortment > 220-237
Lecture Notes in Computer Science > Information Security and Cryptology > Denial of Service Attacks > 395-406
Lecture Notes in Computer Science > Cryptology and Network Security > Algebraic and Number-Theoretic Schemes > 402-412
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Applications: Code Generation, Time-Released Encryption, Cloud Computing > 225-245
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Public-Key Encryption > 366-384
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Symmetric Cryptography: Attacks > 48-62