Search

Your search keyword '"Kikuchi, Hiroaki"' showing total 33 results

Search Constraints

Start Over You searched for: Author "Kikuchi, Hiroaki" Remove constraint Author: "Kikuchi, Hiroaki" Topic computer communication networks Remove constraint Topic: computer communication networks
33 results on '"Kikuchi, Hiroaki"'

Search Results

1. How to Find Many Collisions of 3-Pass HAVAL.

2. A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.

3. Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.

4. Nominative Signature from Ring Signature.

5. A Composite Privacy Protection Model.

6. GAS: Overloading a File Sharing Network as an Anonymizing System.

7. Secure Anonymous Communications with Practical Anonymity Revocation Scheme.

8. Fine-Grained Sticky Provenance Architecture for Office Documents.

9. Practical Security Analysis of E-Voting Systems.

10. Processing Multi-parameter Attacktrees with Estimated Parameter Values.

11. On Security Models and Compilers for Group Key Exchange Protocols.

12. Accredited Symmetrically Private Information Retrieval.

13. Generic Certificateless Encryption in the Standard Model.

14. InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs.

15. Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage.

16. Enforcement of Integrated Security Policy in Trusted Operating Systems.

17. Verifiable Internet Voting Solving Secure Platform Problem.

18. Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.

19. Privacy-Preserving Eigentaste-Based Collaborative Filtering.

20. Run-Time Randomization to Mitigate Tampering.

21. Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.

22. An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.

23. Botnet Traffic Detection Techniques by C&C Session Classification Using SVM.

24. A Global Authentication Scheme for Mobile Ad-Hoc Networks.

25. Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing.

26. Batch Pairing Delegation.

27. Experiments on the Linear Algebra Step in the Number Field Sieve.

28. Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique.

29. Design Issues of an Isolated Sandbox Used to Analyze Malwares.

30. A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.

31. Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.

32. Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.

33. Oblivious Counter and Majority Protocol.

Catalog

Books, media, physical & digital resources