Search results for: Kazuhide Fukushima
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 10: Attacks II > 498-513
Lecture Notes in Computer Science > Advances in Information and Computer Security > Implementation and Real Life Security > 326-336
Lecture Notes in Computer Science > Information Security Applications > Application Security and Trust Management > 225-239
Lecture Notes in Computer Science > Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks > Mobility > 28-37
Lecture Notes in Computer Science > Information Security Applications > Digital Rights Management > 303-316
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Applications of Cryptography and Information Hiding > 119-131
Communications in Computer and Information Science > e-Business and Telecommunications > Part II: Security and Cryptography > 174-185
Journal of Ambient Intelligence and Humanized Computing > 2014 > 5 > 2 > 173-185
IEEE Transactions on Consumer Electronics > 2011 > 57 > 1 > 99 - 104