Author of the publication

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 34-49 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formally verifiable features in embedded vehicular security systems., , , , , and . VNC, page 1-7. IEEE, (2009)An Image Sanitizing Scheme Using Digital Watermarking., , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 474-482. Springer, (2009)Protocols for purpose-restricted anonymous communications in IP-based wireless networks., , , and . Comput. Commun., 31 (15): 3662-3671 (2008)A New Security Architecture for Personal Networks., , , , , and . GLOBECOM, IEEE, (2006)Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel., , and . IEEE Trans. Inf. Theory, 58 (4): 2321-2329 (2012)Applications of Error-Control Coding., , , and . IEEE Trans. Inf. Theory, 44 (6): 2531-2560 (1998)How to Protect Peer-to-Peer Online Games from Cheats., , and . CIG, IEEE, (2005)Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems., , and . IEICE Trans. Inf. Syst., 91-D (5): 1380-1389 (2008)How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 34-49 (2017)New security layer for overlay networks., , and . J. Commun. Networks, 11 (3): 211-228 (2009)