The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Akihiro Yamamura: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Akihiro Yamamura, Hirokazu Ishizuka
    Error Detection and Authentication in Quantum Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:260-273 [Conf]
  2. Akihiro Yamamura
    A Functional Cryptosystem Using a Group Action. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:314-325 [Conf]
  3. Akihiro Yamamura, Taiichi Saito
    Private Information Retrieval Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:206-220 [Conf]
  4. Duong Viet, Akihiro Yamamura, Hidema Tanaka
    Anonymous Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:244-257 [Conf]
  5. Akihiro Yamamura, Kaoru Kurosawa
    Generic Algorithms and Key Agreement Protocols Based on Group Actions. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2001, pp:208-218 [Conf]
  6. Akihiro Yamamura
    Public-Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:203-216 [Conf]
  7. Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura
    Evaluation and Improvement of the Tempest Fonts. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:457-469 [Conf]
  8. Akihiro Yamamura
    Embedding Theorems for Groups Presented Via Partial Automorphisms: a Generalization of Semidirect Products and HNN Extensions. [Citation Graph (0, 0)][DBLP]
    IJAC, 2002, v:12, n:1-2, pp:51-83 [Journal]
  9. Akihiro Yamamura, Takashi Kurokawa, Junji Nakazato
    Threshold Anonymous Group Identification and Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:370-384 [Conf]
  10. Junji Nakazato, Lihua Wang, Akihiro Yamamura
    Privacy Enhancing Credentials. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:55-61 [Conf]

  11. Homomorphic Encryptions of Sums of Groups. [Citation Graph (, )][DBLP]


  12. Current Status of Japanese Government PKI Systems. [Citation Graph (, )][DBLP]


  13. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002