Author of the publication

Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.

, , , and . PerCom Workshops, page 223-228. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Imai, Hideki
add a person with the name Imai, Hideki
 

Other publications of authors with the same name

Error-correcting codes and cryptography., and . Appl. Algebra Eng. Commun. Comput., 19 (3): 213-228 (2008)Protocols for purpose-restricted anonymous communications in IP-based wireless networks., , , and . Computer Communications, 31 (15): 3662-3671 (2008)A New Security Architecture for Personal Networks., , , , , and . GLOBECOM, IEEE, (2006)Formally verifiable features in embedded vehicular security systems., , , , , and . VNC, page 1-7. IEEE, (2009)CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project)., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Performance of OFDM-CDMA with Simple Peak Power Reduction., and . European Transactions on Telecommunications, 10 (4): 391-398 (1999)A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding., , and . ISITA, page 690-695. IEEE, (2010)Unconditionally Secure Anonymous Encryption and Group Authentication., , , and . Comput. J., 49 (3): 310-321 (2006)New security layer for overlay networks., , and . Journal of Communications and Networks, 11 (3): 211-228 (2009)Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - ., and . IEICE Transactions, 89-A (8): 2198-2206 (2006)