Author of the publication

A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.

, , , , , and . ISITA, page 315-319. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Munaka, Tatsuji
add a person with the name Munaka, Tatsuji
 

Other publications of authors with the same name

Design of Secure Mobile Application on Cellular Phones., , , and . IEEE Pacific Rim Conference on Multimedia, volume 2532 of Lecture Notes in Computer Science, page 17-24. Springer, (2002)Abnormal Behavior Detection in Activities of Daily Living: An Ontology with a New Perspective on Potential Indicators of Early Stages of Dementia Diagnosis., and . ICCE-Berlin, page 210-215. IEEE, (2023)Density Maximization in Context-Sense Metric Space for All-words WSD., , , and . ACL (1), page 884-893. The Association for Computer Linguistics, (2013)Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes., , , , , , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 91-110. Springer, (2016)SEPM: Efficient Partial Keyword Search on Encrypted Data., , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 75-91. Springer, (2015)An empirical study of applying a reflective-distributed memory for automation systems., , and . ICUFN, page 347-352. IEEE, (2016)A stream query language TPQL for anomaly detection in facility management., , and . IDEAS, page 235-238. ACM, (2012)A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols., , , , , and . ISITA, page 315-319. IEEE, (2016)