Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2015/02/01 Vol. E98-ANo. 2 ;
pp. 758-761 Type of Manuscript: LETTER Category: Cryptography and Information Security Keyword: cryptography, security analysis, ID-based proxy signature, standard model,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2014/01/01 Vol. E97-ANo. 1 ;
pp. 421-424 Type of Manuscript: LETTER Category: Cryptography and Information Security Keyword: public key cryptography, knapsack problem, security analysis, trapdoor knapsack,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2010/11/01 Vol. E93-DNo. 11 ;
pp. 2898-2906 Type of Manuscript: Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet) Category: Keyword: cryptography, security analysis, security protocol, mobile commerce, WAP, authentication,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2009/04/01 Vol. E92-ANo. 4 ;
pp. 1246-1250 Type of Manuscript: LETTER Category: Cryptography and Information Security Keyword: privacy-preserving, k-means clustering, security analysis,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2009/01/01 Vol. E92-ANo. 1 ;
pp. 197-206 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Application Keyword: fingerprint, c-secure code, collusion attack, security analysis, watermark, DRM,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2008/05/01 Vol. E91-DNo. 5 ;
pp. 1477-1480 Type of Manuscript: Special Section LETTER (Special Section on Information and Communication System Security) Category: Secure Communication Keyword: security analysis, security protocol, mobile commerce, WAP, authentication,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2005/07/01 Vol. E88-DNo. 7 ;
pp. 1697-1699 Type of Manuscript: PAPER Category: Application Information Security Keyword: nominative proxy signature, security analysis, improved scheme,