Author of the publication

A Restricted Undeniable Designated Verifier Signature.

, , , and . APSCC, page 1375-1380. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Signature Scheme Based on New On-line Computation., , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 111-121. Springer, (2003)A Vulnerability Remediation Support System Using a Peer-to-Peer Network., and . KES (4), volume 6884 of Lecture Notes in Computer Science, page 298-307. Springer, (2011)A Worm Filter Based on the Number of Unacknowledged Requests.. KES (2), volume 3682 of Lecture Notes in Computer Science, page 93-99. Springer, (2005)Efficient convertible Limited Verifier Signatures., , , and . ISIT, page 230-234. IEEE, (2008)Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks., , , , , and . Secur. Commun. Networks, 1 (2): 179-189 (2008)Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography., and . II3E, volume 286 of IFIP Advances in Information and Communication Technology, page 265-277. Springer, (2008)Immunity-Based Diagnosis for a Motherboard., , and . Sensors, 11 (4): 4462-4473 (2011)Strongly Unforgeable ID-Based Signatures without Random Oracles., , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 35-46. Springer, (2009)A cyber attack-resilient server inspired by biological diversity., , , , and . Artif. Life Robotics, 21 (3): 345-350 (2016)Efficient ön the Fly" Signature Schemes Based on Integer Factoring., , and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 275-286. Springer, (2001)