Search

Your search keyword '"Kikuchi, Hiroaki"' showing total 31 results

Search Constraints

Start Over You searched for: Author "Kikuchi, Hiroaki" Remove constraint Author: "Kikuchi, Hiroaki" Topic systems and data security Remove constraint Topic: systems and data security
31 results on '"Kikuchi, Hiroaki"'

Search Results

1. Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.

2. Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.

3. How to Find Many Collisions of 3-Pass HAVAL.

4. A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.

5. A Composite Privacy Protection Model.

6. Practical Security Analysis of E-Voting Systems.

7. Nominative Signature from Ring Signature.

8. Secure Anonymous Communications with Practical Anonymity Revocation Scheme.

9. Processing Multi-parameter Attacktrees with Estimated Parameter Values.

10. GAS: Overloading a File Sharing Network as an Anonymizing System.

11. Fine-Grained Sticky Provenance Architecture for Office Documents.

12. On Security Models and Compilers for Group Key Exchange Protocols.

13. Accredited Symmetrically Private Information Retrieval.

14. Enforcement of Integrated Security Policy in Trusted Operating Systems.

15. Generic Certificateless Encryption in the Standard Model.

16. InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs.

17. Verifiable Internet Voting Solving Secure Platform Problem.

18. Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.

19. Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage.

20. Run-Time Randomization to Mitigate Tampering.

21. Privacy-Preserving Eigentaste-Based Collaborative Filtering.

22. Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.

23. An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.

24. A Global Authentication Scheme for Mobile Ad-Hoc Networks.

25. Botnet Traffic Detection Techniques by C&C Session Classification Using SVM.

26. Batch Pairing Delegation.

27. Experiments on the Linear Algebra Step in the Number Field Sieve.

28. Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing.

29. Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique.

30. Design Issues of an Isolated Sandbox Used to Analyze Malwares.

31. A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.

Catalog

Books, media, physical & digital resources