Shikata Junji | Graduate School Of Environment And Information Sciences Yokohama National University
スポンサーリンク
概要
- SHIKATA Junjiの詳細を見る
- 同名の論文著者
- Graduate School Of Environment And Information Sciences Yokohama National Universityの論文著者
関連著者
-
Shikata Junji
Graduate School Of Environment And Information Sciences Yokohama National University
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Shikata J
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
SHIKATA Junji
Graduate School of Environment and Information Sciences, Yokohama National University
-
Zheng Y
Univ. North Carolina Charlotte Nc Usa
-
Zheng Yuliang
Department Of Software And Information Systems
-
IMAI Hideki
University of Tokyo
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
Otsuka A
Ipa Tokyo Jpn
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
IMAI Hideki
3rd Department, Institute of Industrial Science, University of Tokyo
-
ZHENG Yuliang
Department of Software and Information Systems UNC
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
SHIKATA Junji
Dept. of Electrical and computer Engineering, Yokohama National University
-
Matsumoto Tsutomu
Graduate School Of Engineering Yokohama National University:graduate School Of Environment And Infor
-
Shikata Junji
Dept. Of Electrical And Computer Engineering Yokohama National University
-
MATSUMOTO Tsutomu
Graduate School of Environment and Information Sciences, Yokohama National University
-
HANAOKA Goichiro
Institute of Industrial Science, The University of Tokyo
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Otsuka Akira
Institute Of Industrial Science University Of Tokyo
-
HANAOKA Goichiro
University of Tokyo
-
HANAOKA Yumiko
NTT DoCoMo, Inc.
-
HANAOKA Yumiko
Security Systems Group, Network Management Development Department, NTT DoCoMo
-
Hanaoka Yumiko
Security Systems Group Network Management Development Department Ntt Docomo
-
Imai Hideki
Dept. of Electrical and computer Engineering, Yokohama National University
-
Shikata Junji
Institute of Industrial Science, University of Tokyo
-
SEITO Takenobu
Graduate School of Environment and Information Sciences, Yokohama National University
-
HARA Yuki
Graduate School of Environment and Information Sciences, Yokohama National University
-
IMAI Hideki
the Institute of Industrial Science, The University of Tokyo
-
Hara Yuki
Graduate School Of Environment And Information Sciences Yokohama National University
-
Seito Takenobu
Graduate School Of Environment And Information Sciences Yokohama National University
-
Hanaoka Goichiro
Institute Of Industrial Science University Of Tokyo
-
IMAI Hideki
The author is with Institute of Industrial Sience, the University of Tokyo
-
Shikata Junji
Yokohama National Univ. Yokohama‐shi Jpn
-
Shikata Junji
The Authors Are With The Institute Of Industrial Science The University Of Tokyo
-
OTSUKA Akira
the Institute of Industrial Science, The University of Tokyo
-
HANAOKA Goichiro
the Institute of Industrial Science, The University of Tokyo
-
SHIKATA Junji
the Institute of Industrial Science, The University of Tokyo
-
HANAOKA Goichiro
the 3rd Department, Institute of Industrial Science, The University of Tokyo
-
SHIKATA Junji
the 3rd Department, Institute of Industrial Science, The University of Tokyo
-
ZHENG Yuliang
the Department of Software and Information Systems, University of North Carolina
-
IMAI Hideki
the 3rd Department, Institute of Industrial Science, The University of Tokyo
-
SHIKATA Junji
University of Tokyo
-
ZHENG Yuliang
University of North Carolina at Charlotte
-
ZHENG Yuliang
The author is with the School of Network Computing, Monash University
-
SUZUKI Joe
The authors are with the Graduate School of Science, Osaka University
-
YONEZAWA Shoko
NEC Corporation
-
Suzuki Joe
The Authors Are With The Department Of Mathematics Graduate School Of Science Osaka University
-
Suzuki Joe
The Authors Are With The Graduate School Of Science Osaka University
-
Matsumoto T
Yokohama National Univ. Yokohama‐shi Jpn
-
YOSHIOKA Katsunari
Graduate School of Environment and Information Sciences, Yokohama National University
-
Matsumoto Tsutomu
Graduate School Of Environmental And Information Sciences Yokohama National University
-
Yoshioka K
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Imai Hideki
The Institute Of Industrial Science The University Of Tokyo
-
YOSHIOKA Katsunari
Graduate School of Environment and Information Sciences Yokohama National University
著作論文
- Unconditionally Secure Group Signatures
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)