Search results for: Kazumasa Omote
Lecture Notes in Computer Science > Information Security Practice and Experience > Public Key Encryption > 13-23
Lecture Notes in Computer Science > Information Security Applications > Mobile Security/Secure Coding > 135-149
Lecture Notes in Computer Science > Information Security Applications > Anonymity/Authentication/Access Control > 281-295
Lecture Notes in Computer Science > Stabilization, Safety, and Security of Distributed Systems > 253-267
Lecture Notes in Computer Science > Provable Security > Signature II > 184-198
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Session 3: PKI and PKC Applications > 77-92
Lecture Notes in Computer Science > Information Security > E-Commerce > 108-120
Lecture Notes in Computer Science > Advances in Information and Computer Security > Public Key Encryption > 193-209
Lecture Notes in Computer Science > Provable Security > Encryption > 200-213
Communications in Computer and Information Science > E-business and Telecommunications > Part II: SECRYPT > 125-138
IEEE Transactions on Emerging Topics in Computing > 2016 > 4 > 1 > 88 - 101
Concurrency and Computation: Practice and Experience > 27 > 10 > 2547 - 2568