Author of the publication

TENeT: A Framework for Distributed Smartcards.

, , , , , , and . SPC, volume 3450 of Lecture Notes in Computer Science, page 3-17. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hongo, Sadayuki
add a person with the name Hongo, Sadayuki
 

Other publications of authors with the same name

Edge-based binocular stereopsis algorithm--a matching mechanism with probabilistic feedback., , and . Neural Networks, 9 (3): 379-395 (1996)A Prototype of a Motor-Learning Support System Using a Motion-Capture Device., , , , , and . GCCE, page 1148-1150. IEEE, (2019)Integral Cryptanalysis on Reduced-Round KASUMI., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (9): 1309-1316 (September 2022)Contour extraction by local parallel and stochastic algorithm which has energy learning faculty., , , and . Syst. Comput. Jpn., 23 (4): 26-35 (1992)Evaluation of Energy Conversion Efficiency in Gait by Using a Portable Motion Capture Device., , , , and . GCCE, page 700-702. IEEE, (2020)TENeT: A Framework for Distributed Smartcards., , , , , , and . SPC, volume 3450 of Lecture Notes in Computer Science, page 3-17. Springer, (2005)Modeling Agreement Problems in the Universal Composability Framework., , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 350-361. Springer, (2007)A Study on Higher Order Differential Attack of KASUMI., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (1): 14-21 (2007)An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items., , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 105-118. Springer, (2006)Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 259-273. Springer, (2007)