|
Search the dblp DataBase
Shinsaku Kiyomoto:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. [Citation Graph (0, 0)][DBLP] MDM, 2006, pp:17- [Conf]
- Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:287-295 [Journal]
- Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:182-189 [Journal]
Security Verification for Authentication and Key Exchange Protocols, Revisited. [Citation Graph (, )][DBLP]
On-the-Fly Automatic Generation of Security Protocols. [Citation Graph (, )][DBLP]
The rakaposhi Stream Cipher. [Citation Graph (, )][DBLP]
Anonymous attribute authentication scheme using self-blindable certificates. [Citation Graph (, )][DBLP]
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. [Citation Graph (, )][DBLP]
How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]
FPGA-Targeted Hardware Implementations of K2. [Citation Graph (, )][DBLP]
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. [Citation Graph (, )][DBLP]
An Offline Peer-to-peer Broadcasting Scheme with Anonymity. [Citation Graph (, )][DBLP]
Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]
Ternary Subset Difference Method and Its Quantitative Analysis. [Citation Graph (, )][DBLP]
Privacy-Aware Location Database Service for Granular Queries. [Citation Graph (, )][DBLP]
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|