Author of the publication

On zero-knowledge proofs (extended abstract): "from membership to decision".

, , and . STOC, page 255-264. ACM, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for the User-Oriented Personal Information Protection., and . Security and Management, page 12-19. CSREA Press, (2006)Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters., , , , , and . IACR Cryptology ePrint Archive, (2015)An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . IACR Cryptology ePrint Archive, (2014)Cyberbullying detection using parent-child relationship between comments., , , and . iiWAS, page 325-334. ACM, (2016)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones., and . NTMS, page 1-5. IEEE, (2015)How to sign multiple versions of digital documents., and . IWBIS, page 133-136. IEEE, (2017)A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation., , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 461-473. Springer, (2017)Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 83-97. Springer, (2011)Analysis and Design for Private Message Board Systems., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 87-A (1): 204-211 (2004)