Author of the publication

Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.

, , , and . PerCom Workshops, page 223-228. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards optimal countermeasures against wolves and lambs in biometrics., , and . BTAS, page 69-76. IEEE, (2012)An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan., , and . WEIS, (2006)Guest Editorial: Cloud Security., , , , and . IEEE Trans. Cloud Computing, 2 (4): 377-379 (2014)ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology., , , , , , and . EuroS&P, page 357-371. IEEE, (2016)Proxy re-encryption via indistinguishability obfuscation., and . Security and Communication Networks, 9 (12): 1786-1795 (2016)Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks., and . IEICE Transactions, 102-A (1): 65-73 (2019)Relations Among Notions of Security for Identity Based Encryption Schemes., , , , , , and . IACR Cryptology ePrint Archive, (2005)Unconditionally Secure Chaffing-and-Winnowing for Multiple Use., , , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 133-145. Springer, (2007)Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation., , , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 165-180. Springer, (2006)Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption., , , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 410-428. Springer, (2015)