Tanaka Toshiaki | Kddi R&d Laboratories Inc.
スポンサーリンク
概要
関連著者
-
KIYOMOTO Shinsaku
KDDI R & D Laboratories Inc.
-
TANAKA Toshiaki
KDDI R & D Laboratories Inc.
-
Kiyomoto Shinsaku
Kddi R&d Laboratories Inc.
-
Tanaka Toshiaki
Kddi R&d Laboratories Inc.
-
KIYOMOTO Shinsaku
KDDI R&D Laboratories, Inc.
-
FUKUSHIMA Kazuhide
KDDI R & D Laboratories Inc.
-
Fukushima Kazuhide
Kddi R&d Laboratories Inc.
-
Fukushima Kazuhide
KDDI R&D Laboratories, Inc.
-
Tanaka Toshiaki
KDDI R&D Laboratories, Inc.
-
Tanaka T
Kddi R & D Laboratories Inc.
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
Kurihara Jun
Kddi R&d Laboratories Inc.
-
NAKAO KOJI
KDDI RD Laboratories, Inc.
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Nakao Koji
Kddi R&d Laboratories Inc.
-
Nakao Koji
Kddi R&apm;d Laboratories Inc.
-
SAKURAI Kouichi
Dept. of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Dept. Of Computer Science And Communication Engineering Kyushu University
-
Yamada A
Wireless Laboratories Ntt Docomo Inc.
-
YAMADA AKIRA
KDDI R & D Laboratories Inc.
-
田中 俊昭
株式会社 Kddi研究所
-
田中 俊昭
(株)KDDI研究所
-
TAKAGI Tsuyoshi
Future University-Hakodate
-
Takagi Tsuyoshi
Future Univ.‐hakodate Hakodate‐shi Jpn
-
Takagi Tsuyoshi
Future University-hakodate School Of System Information Science
-
YOSHITOMI Motoi
Future University-Hakodate, School of System Information Science
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Yoshitomi Motoi
Future University-hakodate School Of System Information Science
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
-
Tanaka Toshiaki
Information Security Laboratory Kddi R&d Laboratories Inc.
-
Tanaka Toshiaki
Kddi Rd Laboratories Inc.
著作論文
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- Efficient Implementation of the Pairing on Mobilephones Using BREW
- A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
- Design of Anonymous Attribute Authentication Mechanism
- A-7-3 Revocation and Addition Mechanisms for Fast (k, n)-Threshold Schemes
- On a Fast (K, n)-Threshold Secret Sharing Scheme
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
- Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution (特集:ユビキタス時代を支えるモバイル通信と高度交通システム)
- An Obfuscation Scheme Using Affine Transformation and Its Implementation (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Implementation and Evaluation of a Micropayment System for Mobile Environments (Security and Society)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients (Applications) (Cryptography and Information Security)
- New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
- A Study of Access Control Method for Mobile Agents by Using Secure Stubs (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Improved Subset Difference Method with Ternary Tree