Search results for: Takaaki Mizuki
Soft Computing > 2018 > 22 > 2 > 361-371
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Contributed Papers > 301-310
Lecture Notes in Computer Science > Digital Rights Management. Technologies, Issues, Challenges and Systems > Fingerprinting and Image Authentication > 203-216
Lecture Notes in Computer Science > Combinatorial Optimization and Applications > Contributed Papers > 255-266
Electronics and Communications in Japan > 99 > 10 > 24 - 32
Lecture Notes in Computer Science > Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics > Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key > 273-285
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Contributed Papers > 499-510
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Security > 547-554
Lecture Notes in Computer Science > Computing and Combinatorics > Combinatorics and Cryptography > 349-360
Lecture Notes in Computer Science > Information Security Applications > HW Implementation Security > 66-78
Lecture Notes in Computer Science > Algorithms and Computation > Computational Complexity and Cryptology > 196-207
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’99 > Tools from Related areas > 389-401
Theoretical Computer Science > 2016 > 622 > C > 34-44