From post

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.

, , , , и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 159-178. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Kiyomoto, Shinsaku
add a person with the name Kiyomoto, Shinsaku
 

Другие публикации лиц с тем же именем

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension., , , и . ISC, том 5222 из Lecture Notes in Computer Science, стр. 455-470. Springer, (2008)Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha., , и . ICICS, том 7043 из Lecture Notes in Computer Science, стр. 255-266. Springer, (2011)Sensor-based Wearable PUF., , и . SECRYPT, стр. 207-214. SciTePress, (2016)Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features., , , и . ICCSP, стр. 62-66. ACM, (2018)AMY: Use your cell phone to create a protected personal network over devices., , , и . IEEE Trans. Consumer Electron., 57 (1): 99-104 (2011)Lattice-based public key encryption with equality test in standard model, revisited., , , , , и . CoRR, (2020)R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training., , , , и . CoRR, (2022)Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (10): 2778-2791 (2005)Improved Subset Difference Method with Ternary Tree., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2034-2044 (2010)A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (9): 1048-1060 (2019)