Author of the publication

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.

, , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 39-48 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters., , , , , and . IACR Cryptology ePrint Archive, (2015)An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . IACR Cryptology ePrint Archive, (2014)Cyberbullying detection using parent-child relationship between comments., , , and . iiWAS, page 325-334. ACM, (2016)A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree., and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 170-181. Springer, (2008)A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing., , and . Comput. Electr. Eng., (2017)Securing Sensor Networks by Moderating Frequencies., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 173-185. Springer, (2014)Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework., , , , and . J. Networks, 9 (11): 2905-2913 (2014)A Comprehensive Security Analysis Checksheet for OpenFlow Networks., , , , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 231-242. Springer, (2016)RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust., , , , and . J. Inf. Secur. Appl., (2019)