Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kato, Ryo
add a person with the name Kato, Ryo
 

Other publications of authors with the same name

CCD Multi-Ion Image Sensor with Four 128 × 128 Pixels Array., , , , and . Sensors, 19 (7): 1582 (2019)Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation., , , and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 289-308. Springer, (2011)Ergonomic evaluation of portable videogame software., , , , , , , and . DiGRA Conference, Digital Games Research Association, (2007)How does antagonistic salt exhibit surfactant-like characteristics in water?, , , , , , and . MHS, page 1-4. IEEE, (2018)Securing a B+tree for Use with Secret-Shared Databases., , and . DNIS, volume 7813 of Lecture Notes in Computer Science, page 246-261. Springer, (2013)A dummy-based anonymization method based on user trajectory with pauses., , , , , , and . SIGSPATIAL/GIS, page 249-258. ACM, (2012)Batch Logical Protocols for Efficient Multi-Party Computation., , , , and . IEICE Transactions, 95-A (10): 1718-1728 (2012)User Location Anonymization Method for Wide Distribution of Dummies., , , , , and . DEXA (2), volume 8056 of Lecture Notes in Computer Science, page 259-273. Springer, (2013)Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols., , , , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 187-202. Springer, (2011)Embedding Lemmas for Functional Encryption., , , , , , , , , and . ISITA, page 712-716. IEEE, (2018)