スポンサーリンク
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn | 論文
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- New Security Architecture for Mobile IPv6 Networks
- Spectroscopic Studies of the Solar Corona I. Spatial Variations in Line Parameters of Green and Red Coronal Lines
- Daily Urinary Excretion of Bisphenol A
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Interobserver Errors in Anthropometry
- Random Errors in Anthropometry
- A Trade-off Traitor Tracing Scheme
- A Formulation of Key Privacy in Plaintext Checking Attack Model
- Context-Aware Users' Preference Models by Integrating Real and Supposed Situation Data
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Robotization of Everyday Life
- How to List-up Weak IVs and Weak Keys in WEP : Swap Operations and Weak Patterns
- Secular Change and Socioeconomic Difference in Height in Japan
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
- Whole-body Insulin Resistance is Associated with Elevated Serum α-fetoprotein Levels in Patients with Chronic Hepatitis C
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack