Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks., , , , and . Int. J. Inf. Sec., 19 (3): 245-255 (2020)Identification of incompletely specified multiple-valued Kleenean functions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)Privacy-Preserving Decision Tree Learning with Boolean Target Class., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2291-2300 (2015)Multiparty Computation from El Gamal/Paillier Conversion., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 137-146 (2009)SWIPASS: Image-Based User Authentication for Touch Screen Devices., , , and . J. Inf. Process., 24 (2): 227-236 (2016)Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection., and . J. Inf. Process., 22 (2): 388-400 (2014)Proposal of anonymization dictionary using disclosed statements by business operators., , , , , , and . Internet Things, (2022)How Much is Risk Increased by Sharing Credential in Group?, , and . STM, volume 10547 of Lecture Notes in Computer Science, page 103-117. Springer, (2017)