Author of the publication

Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones.

, , , and . CANDAR, page 89-95. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fujiwara, Toru
add a person with the name Fujiwara, Toru
 

Other publications of authors with the same name

Bag-based data models for incomplete information and their closure properties., , , and . J. Intell. Inf. Syst., 30 (2): 115-135 (2008)New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy., , and . ISITA, page 797-801. IEEE, (2012)Expiration Dated Fingerprinting., and . IIH-MSP, page 147-150. IEEE Computer Society, (2008)Determination of the Local Weight Distribution of Binary Linear Block Codes., and . IEEE Trans. Information Theory, 52 (10): 4444-4454 (2006)The weight distributions of extended binary primitive BCH codes of length 128., , and . IEEE Trans. Information Theory, 43 (4): 1364-1371 (1997)On correctable errors of binary linear codes., and . IEEE Trans. Information Theory, 56 (6): 2537-2548 (2010)Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity., , , and . IEEE Trans. Information Theory, 45 (2): 725-731 (1999)A cascaded coding scheme for error control and its performance analysis., , , and . IEEE Trans. Information Theory, 34 (3): 448-462 (1988)ISDSR: Secure DSR with ID-based Sequential Aggregate Signature., , , and . SECRYPT, page 376-387. SciTePress, (2016)Tighter Reductions for Deterministic Identity-Based Signatures., and . IEICE Transactions, 101-A (1): 64-76 (2018)