114 results on '"Yutaka Kawai"'
Search Results
2. Public-key Searchable Encryption with Index Generation for Shared Database.
3. Verifiable Privacy-Preserving Data Aggregation Protocols.
4. Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
5. Token-Based Multi-input Functional Encryption.
6. Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption.
7. Multi-key Homomorphic Proxy Re-Encryption.
8. Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
9. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
10. Dynamic Multi Target Homomorphic Attribute-Based Encryption.
11. Master key updatable attribute-based encryption on the dual pairing vector space.
12. A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
13. Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
14. Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
15. Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption.
16. SEPM: Efficient Partial Keyword Search on Encrypted Data.
17. Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.
18. Plant and microbial community composition jointly determine moorland multifunctionality
19. A limitation on security evaluation of cryptographic primitives with fixed keys.
20. Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting.
21. Group Signatures with Message-Dependent Opening.
22. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
23. Managing Distributed Files with RNS in Heterogeneous Data Grids.
24. Secret Handshake Scheme with Request-Based-Revealing.
25. Towards Restricting Plaintext Space in Public Key Encryption.
26. SAGA-based file access application over multi-filesystem middleware.
27. Proxiable Designated Verifier Signature.
28. Secret Handshake: Strong Anonymity Definition and Construction.
29. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
30. Predicting diversity changes in subalpine moorland ecosystems based on geometry of species distributions and realistic area loss
31. Secret handshake scheme with request-based-revealing.
32. Methods for Restricting Message Space in Public-Key Encryption.
33. A Swarm Inspired Method for Efficient Data Transfer.
34. Proxiable Designated Verifier Signature.
35. A method for reliably managing files with RNS in multi Data Grids.
36. On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems.
37. The advanced data searching system with AMGA at the Belle II experiment.
38. SAGA-based user environment for distributed computing resources: A universal Grid solution over multi-middleware infrastructures.
39. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
40. Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency.
41. Predicting diversity changes in subalpine moorland ecosystems based on geometry of species distributions and realistic area loss
42. Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption.
43. Multi-Input Functional Encryption with Controlled Decryption
44. Fully-Anonymous Functional Proxy-Re-Encryption.
45. TECHNICAL DEVELOPMENTS IN STRUCTURAL ENGINEERING WITH EMPHASIS ON STEEL BRIDGES IN JAPAN
46. DEFLECTION BEHAVIOR OF THE APPLIED ADHESIVE SFRC UPPER SURFACE REINFORCING METHOD FOR THE HIGHWAY BRIDGE STEEL DECK
47. DECREASING EFFECT OF STRESS IN ORTHOTROPIC STEEL DECKS BY SFRC PAVEMENT WITH ORDINARY PORTLAND CEMENT AND LOW SHRINKAGE TYPE MIXTURE MATERIAL
48. FAILURE ANALYSIS OF THE HANGER CLAMPS OF THE KUTAI-KARTANEGARA BRIDGE FROM THE FRACTURE MECHANICS VIEWPOINT
49. SHEAR FAILURE ANALYSIS OF THE CABLE BAND'S PIN CLAMP OF THE COLLAPSED KUTAI-KARTANEGARA SUSPENSION BRIDGE
50. The Embedment of a Metadata System at Grid Farms at the Belle II Experiment
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.