The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shinsaku Kiyomoto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka
    Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. [Citation Graph (0, 0)][DBLP]
    MDM, 2006, pp:17- [Conf]
  2. Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
    Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:287-295 [Journal]
  3. Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
    New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:182-189 [Journal]

  4. Security Verification for Authentication and Key Exchange Protocols, Revisited. [Citation Graph (, )][DBLP]


  5. On-the-Fly Automatic Generation of Security Protocols. [Citation Graph (, )][DBLP]


  6. The rakaposhi Stream Cipher. [Citation Graph (, )][DBLP]


  7. Anonymous attribute authentication scheme using self-blindable certificates. [Citation Graph (, )][DBLP]


  8. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. [Citation Graph (, )][DBLP]


  9. How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]


  10. FPGA-Targeted Hardware Implementations of K2. [Citation Graph (, )][DBLP]


  11. K2: A Stream Cipher Algorithm using Dynamic Feedback Control. [Citation Graph (, )][DBLP]


  12. An Offline Peer-to-peer Broadcasting Scheme with Anonymity. [Citation Graph (, )][DBLP]


  13. Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]


  14. Ternary Subset Difference Method and Its Quantitative Analysis. [Citation Graph (, )][DBLP]


  15. Privacy-Aware Location Database Service for Granular Queries. [Citation Graph (, )][DBLP]


  16. Obfuscation Mechanism in Conjunction with Tamper-Proof Module. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002