Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yanai, Naoto
add a person with the name Yanai, Naoto
 

Other publications of authors with the same name

Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers., , , and . TrustCom/BigDataSE/ISPA (1), page 1329-1336. IEEE, (2015)Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack., , , , , , and . IEICE Transactions, 100-A (12): 2991-3006 (2017)Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs., , , , and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 32-48. Springer, (2015)On Security of Anonymous Invitation-Based System., and . DPM/CBT@ESORICS, volume 11025 of Lecture Notes in Computer Science, page 415-421. Springer, (2018)Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack., , , , , , and . SECRYPT, page 39-52. SciTePress, (2015)Identity-Based Key-Insulated Aggregate Signatures, Revisited., , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 141-156. Springer, (2017)Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones., , , and . CANDAR, page 89-95. IEEE Computer Society, (2015)Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption., , , and . AINA, page 669-676. IEEE Computer Society, (2016)On the Tightness of Deterministic Identity-Based Signatures.. CANDAR, page 168-173. IEEE, (2016)Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions., , , , and . JIP, 24 (2): 275-291 (2016)