The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hiroaki Kikuchi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hiroaki Kikuchi
    Dual RSA Accumulators and Its Application for Private Revocation Check. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:237-242 [Conf]
  2. Hiroaki Kikuchi, Minako Tada, Shohachiro Nakanishi
    Secure Instant Messaging Protocol Preserving Confidentiality against Administrator. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:27-30 [Conf]
  3. Yuichi Nakamura, Hiroaki Kikuchi
    Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:707-712 [Conf]
  4. Junji Nakazato, Kenji Fujimoto, Hiroaki Kikuchi
    Privacy Preserving Web-Based Questionnaire. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:285-288 [Conf]
  5. Hiroaki Kikuchi, Yuichi Nakamura
    Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:199-202 [Conf]
  6. Hiroaki Kikuchi
    Rabin Tree and Its Application to Group Key Distribution. [Citation Graph (0, 0)][DBLP]
    ATVA, 2004, pp:384-391 [Conf]
  7. Hiroaki Kikuchi
    (M+1)st-Price Auction Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:341-353 [Conf]
  8. Hiroaki Kikuchi
    Closures of Fuzzy Linguitic Trugh Value With Regards to the Extension Principle. [Citation Graph (0, 0)][DBLP]
    FUZZ-IEEE, 2001, pp:1416-1419 [Conf]
  9. Noboru Takagi, Hiroaki Kikuchi, Kyoichi Nakashima
    Multi-Interval Truth Valued Logic. [Citation Graph (0, 0)][DBLP]
    FUZZ-IEEE, 2001, pp:1119-1122 [Conf]
  10. Hiroaki Kikuchi
    Power Auction Protocol without Revealing Winning Bids. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2001, pp:61-0 [Conf]
  11. Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi
    Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:204-0 [Conf]
  12. Hiroaki Kikuchi
    Identification of Incompletely Specified Fuzzy Unate Logic Function. [Citation Graph (0, 0)][DBLP]
    ISMVL, 2001, pp:116-0 [Conf]
  13. Hiroaki Kikuchi, Noboru Takagi
    de Morgan Bisemilattice of Fuzzy Truth Value. [Citation Graph (0, 0)][DBLP]
    ISMVL, 2002, pp:180-184 [Conf]
  14. Hiroaki Kikuchi, Noboru Takagi, Shohachiro Nakanishi, Masao Mukaidono
    Uniqueness of Partially Specified Multiple-Valued Kleenean Function. [Citation Graph (0, 0)][DBLP]
    ISMVL, 1995, pp:242-247 [Conf]
  15. Noboru Takagi, Hiroaki Kikuchi, Kyoichi Nakashima, Masao Mukaidono
    A Characterization of Kleenean Functions. [Citation Graph (0, 0)][DBLP]
    ISMVL, 1995, pp:236-241 [Conf]
  16. Hiroaki Kikuchi
    Oblivious Counter and Majority Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:437-445 [Conf]
  17. Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi
    Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:103-117 [Conf]
  18. Shohachiro Nakanishi, Akihiro Ohtake, Ronald R. Yager, Shinobu Ohtani, Hiroaki Kikuchi
    Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE/Nagoya-University World Wisepersons Workshop, 1995, pp:21-34 [Conf]
  19. Hiroaki Kikuchi, Junji Nakazato
    ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:177-192 [Conf]
  20. Mitsuo Okada, Hiroaki Kikuchi
    Secure Asymmetric Watermark Detection Without Secret of Modified Pixels. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:165-178 [Conf]
  21. Hiroaki Kikuchi, Noboru Takagi
    Hierarchical fuzzy modeling and jointly expandable functions. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2002, v:17, n:5, pp:515-529 [Journal]
  22. Hiroaki Kikuchi, Akihiro Ohtake, Shohachiro Nakanishi
    Functional Completeness of Hierarchical Fuzzy Modeling. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1998, v:110, n:1-2, pp:51-60 [Journal]
  23. Noboru Takagi, Hiroaki Kikuchi, Masao Mukaidono
    Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP]
    , 2004, v:, n:, pp:107-128 [Journal]
  24. Noboru Takagi, Hiroaki Kikuchi, Kyoichi Nakashima, Masao Mukaidono
    Identification of incompletely specified multiple-valued Kleenean functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 1998, v:28, n:5, pp:637-647 [Journal]
  25. Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi
    Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1659-1674 [Conf]
  26. Hiroaki Kikuchi, Masato Terada
    How Many Malicious Scanners Are in the Internet? [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:381-390 [Conf]

  27. Efficient Multiparty Computation for Comparator Networks. [Citation Graph (, )][DBLP]


  28. ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. [Citation Graph (, )][DBLP]


  29. Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? [Citation Graph (, )][DBLP]


  30. Privacy-Preserving Collaborative Filtering Schemes. [Citation Graph (, )][DBLP]


  31. Heuristics for Detecting Botnet Coordinated Attacks. [Citation Graph (, )][DBLP]


  32. A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP]


  33. Automated Classification of Port-Scans from Distributed Sensors. [Citation Graph (, )][DBLP]


  34. Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. [Citation Graph (, )][DBLP]


  35. A Storage Efficient Redactable Signature in the Standard Model. [Citation Graph (, )][DBLP]


  36. A Proposal of Efficient Remote Biometric Authentication Protocol. [Citation Graph (, )][DBLP]


  37. Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms. [Citation Graph (, )][DBLP]


  38. Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication. [Citation Graph (, )][DBLP]


  39. Principal Components of Port-Address Matrices in Port-Scan Analysis. [Citation Graph (, )][DBLP]


  40. Evaluation and implement of fuzzy vault scheme using indexed minutiae. [Citation Graph (, )][DBLP]


  41. Orthogonal Expansion of Port-scanning Packets. [Citation Graph (, )][DBLP]


Search in 0.206secs, Finished in 0.208secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002