Author of the publication

Design of Enclosing Signing Keys by All Issuers in Distributed Public Key Certificate-Issuing Infrastructure.

, , , and . IEICE Trans. Inf. Syst., 106 (9): 1495-1498 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Authentication and Authorization System with Blockchain., , , , , , , and . AsiaJCIS, page 111-118. IEEE, (2019)Zero-Knowledge Identification Scheme Using LDPC Codes., , , , and . IEICE Trans. Inf. Syst., 101-D (11): 2688-2697 (2018)A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (2): 83-94 (2011)CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments., , , and . IEICE Trans. Inf. Syst., 102-D (9): 1653-1664 (2019)A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (8): 2155-2158 (2003)Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time., , , , , , , and . IEICE Trans. Inf. Syst., 104-D (5): 556-561 (2021)Investigations of Electronic Signatures for Construction of Trust Services., , , , , , and . IEICE Trans. Inf. Syst., 106 (9): 1436-1451 (September 2023)A Cache-Aided Power Optimization Technique for Adaptive Secure Transmission Systems., , , and . PIMRC, page 1122-1127. IEEE, (2022)Systemization of Vulnerability Information by Ontology for Impact Analysis., , and . QRS Companion, page 1126-1134. IEEE, (2021)A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes., , , , , , , , and . AsiaJCIS, page 142-145. IEEE, (2019)