Author of the publication

Batch Logical Protocols for Efficient Multi-Party Computation.

, , , , and . IEICE Transactions, 95-A (10): 1718-1728 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yoshiura, Hiroshi
add a person with the name Yoshiura, Hiroshi
 

Other publications of authors with the same name

Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation., , , , and . JIP, 20 (4): 861-870 (2012)Adaptive Embedding and Detection for Improved Video Watermarking., , , , and . Intelligent Multimedia Data Hiding: New Directions, volume 58 of Studies in Computational Intelligence, Springer, (2007)Evaluation of Integrity Verification System for Video Content Using Digital Watermarking., , , , , and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream., , , and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)A Private Information Detector for Controlling Circulation of Private Information through Social Networks., , , and . ARES, page 473-478. IEEE Computer Society, (2012)Preventing False Positives in Content-Based Phishing Detection., , and . IIH-MSP, page 48-51. IEEE Computer Society, (2009)Secure Generation of Digital Signature on Compromised Computer., , , and . IIH-MSP, page 12-15. IEEE Computer Society, (2007)Use of inferential statistics to estimate error probability of video watermarks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 391-399. SPIE, (2005)Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services., , , , , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 410-424. Springer, (2012)Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation., , , , and . ARES, page 461-467. IEEE Computer Society, (2014)