Search the dblp DataBase
Hiroaki Kikuchi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Hiroaki Kikuchi Dual RSA Accumulators and Its Application for Private Revocation Check. [Citation Graph (0, 0)][DBLP ] AINA (1), 2006, pp:237-242 [Conf ] Hiroaki Kikuchi , Minako Tada , Shohachiro Nakanishi Secure Instant Messaging Protocol Preserving Confidentiality against Administrator. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:27-30 [Conf ] Yuichi Nakamura , Hiroaki Kikuchi Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:707-712 [Conf ] Junji Nakazato , Kenji Fujimoto , Hiroaki Kikuchi Privacy Preserving Web-Based Questionnaire. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:285-288 [Conf ] Hiroaki Kikuchi , Yuichi Nakamura Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:199-202 [Conf ] Hiroaki Kikuchi Rabin Tree and Its Application to Group Key Distribution. [Citation Graph (0, 0)][DBLP ] ATVA, 2004, pp:384-391 [Conf ] Hiroaki Kikuchi (M+1)st-Price Auction Protocol. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:341-353 [Conf ] Hiroaki Kikuchi Closures of Fuzzy Linguitic Trugh Value With Regards to the Extension Principle. [Citation Graph (0, 0)][DBLP ] FUZZ-IEEE, 2001, pp:1416-1419 [Conf ] Noboru Takagi , Hiroaki Kikuchi , Kyoichi Nakashima Multi-Interval Truth Valued Logic. [Citation Graph (0, 0)][DBLP ] FUZZ-IEEE, 2001, pp:1119-1122 [Conf ] Hiroaki Kikuchi Power Auction Protocol without Revealing Winning Bids. [Citation Graph (0, 0)][DBLP ] ICOIN, 2001, pp:61-0 [Conf ] Hiroaki Kikuchi , Kensuke Abe , Shohachiro Nakanishi Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:204-0 [Conf ] Hiroaki Kikuchi Identification of Incompletely Specified Fuzzy Unate Logic Function. [Citation Graph (0, 0)][DBLP ] ISMVL, 2001, pp:116-0 [Conf ] Hiroaki Kikuchi , Noboru Takagi de Morgan Bisemilattice of Fuzzy Truth Value. [Citation Graph (0, 0)][DBLP ] ISMVL, 2002, pp:180-184 [Conf ] Hiroaki Kikuchi , Noboru Takagi , Shohachiro Nakanishi , Masao Mukaidono Uniqueness of Partially Specified Multiple-Valued Kleenean Function. [Citation Graph (0, 0)][DBLP ] ISMVL, 1995, pp:242-247 [Conf ] Noboru Takagi , Hiroaki Kikuchi , Kyoichi Nakashima , Masao Mukaidono A Characterization of Kleenean Functions. [Citation Graph (0, 0)][DBLP ] ISMVL, 1995, pp:236-241 [Conf ] Hiroaki Kikuchi Oblivious Counter and Majority Protocol. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:437-445 [Conf ] Hiroaki Kikuchi , Kensuke Abe , Shohachiro Nakanishi Performance Evaluation of Certificate Revocation Using k -Valued Hash Tree. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:103-117 [Conf ] Shohachiro Nakanishi , Akihiro Ohtake , Ronald R. Yager , Shinobu Ohtani , Hiroaki Kikuchi Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] IEEE/Nagoya-University World Wisepersons Workshop, 1995, pp:21-34 [Conf ] Hiroaki Kikuchi , Junji Nakazato ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:177-192 [Conf ] Mitsuo Okada , Hiroaki Kikuchi Secure Asymmetric Watermark Detection Without Secret of Modified Pixels. [Citation Graph (0, 0)][DBLP ] WISA, 2005, pp:165-178 [Conf ] Hiroaki Kikuchi , Noboru Takagi Hierarchical fuzzy modeling and jointly expandable functions. [Citation Graph (0, 0)][DBLP ] Int. J. Intell. Syst., 2002, v:17, n:5, pp:515-529 [Journal ] Hiroaki Kikuchi , Akihiro Ohtake , Shohachiro Nakanishi Functional Completeness of Hierarchical Fuzzy Modeling. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1998, v:110, n:1-2, pp:51-60 [Journal ] Noboru Takagi , Hiroaki Kikuchi , Masao Mukaidono Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP ] , 2004, v:, n:, pp:107-128 [Journal ] Noboru Takagi , Hiroaki Kikuchi , Kyoichi Nakashima , Masao Mukaidono Identification of incompletely specified multiple-valued Kleenean functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 1998, v:28, n:5, pp:637-647 [Journal ] Hiroaki Kikuchi , Masato Terada , Naoya Fukuno , Norihisa Doi Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors. [Citation Graph (0, 0)][DBLP ] OTM Conferences (2), 2007, pp:1659-1674 [Conf ] Hiroaki Kikuchi , Masato Terada How Many Malicious Scanners Are in the Internet? [Citation Graph (0, 0)][DBLP ] WISA, 2006, pp:381-390 [Conf ] Efficient Multiparty Computation for Comparator Networks. [Citation Graph (, )][DBLP ] ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. [Citation Graph (, )][DBLP ] Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? [Citation Graph (, )][DBLP ] Privacy-Preserving Collaborative Filtering Schemes. [Citation Graph (, )][DBLP ] Heuristics for Detecting Botnet Coordinated Attacks. [Citation Graph (, )][DBLP ] A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP ] Automated Classification of Port-Scans from Distributed Sensors. [Citation Graph (, )][DBLP ] Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. [Citation Graph (, )][DBLP ] A Storage Efficient Redactable Signature in the Standard Model. [Citation Graph (, )][DBLP ] A Proposal of Efficient Remote Biometric Authentication Protocol. [Citation Graph (, )][DBLP ] Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms. [Citation Graph (, )][DBLP ] Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication. [Citation Graph (, )][DBLP ] Principal Components of Port-Address Matrices in Port-Scan Analysis. [Citation Graph (, )][DBLP ] Evaluation and implement of fuzzy vault scheme using indexed minutiae. [Citation Graph (, )][DBLP ] Orthogonal Expansion of Port-scanning Packets. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.281secs