An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. [Citation Graph (, )][DBLP]
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. [Citation Graph (, )][DBLP]
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. [Citation Graph (, )][DBLP]
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. [Citation Graph (, )][DBLP]
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. [Citation Graph (, )][DBLP]
Image-Feature Based Human Identification Protocols on Limited Display Devices. [Citation Graph (, )][DBLP]
Ternary Subset Difference Method and Its Quantitative Analysis. [Citation Graph (, )][DBLP]