Publication: Publication Date: 2019/08/01 Vol. E102-DNo. 8 ;
pp. 1439-1448 Type of Manuscript: Special Section PAPER (Special Section on Formal Approaches) Category: Keyword: formal methods, end-to-end encryption, LINE Encryption, ProVerif,
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols Kazuki YONEYAMA
Publication: Publication Date: 2017/09/01 Vol. E100-ANo. 9 ;
pp. 1794-1803 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: formal methods, computational soundness, asymmetric bilinear pairing,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2012/05/01 Vol. E95-DNo. 5 ;
pp. 1342-1354 Type of Manuscript: Special Section PAPER (Special Section on Formal Approach) Category: Formal Methods Keyword: risk analysis, business process, formal methods,
Publication: IEICE TRANSACTIONS on Communications Publication Date: 2009/01/01 Vol. E92-BNo. 1 ;
pp. 9-16 Type of Manuscript: INVITED PAPER (Special Section on Networking Technologies for Dependable Networks) Category: Keyword: dependability, software engineering, formal methods,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/09/01 Vol. E91-ANo. 9 ;
pp. 2597-2606 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: formal methods, anonymity, software security, verification, theorem-proving,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/04/01 Vol. E91-ANo. 4 ;
pp. 1112-1120 Type of Manuscript: Special Section PAPER (Special Section on Selected Papers from the 20th Workshop on Circuits and Systems in Karuizawa) Category: Keyword: formal methods, anonymity, software security, verification, theorem-proving,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2003/12/01 Vol. E86-DNo. 12 ;
pp. 2612-2622 Type of Manuscript: Special Section PAPER (Special Issue on Dependable Computing) Category: Verification and Dependability Analysis Keyword: intrusion tolerance, group communication systems, validation, formal methods,