Hayata, Junichiro
8  Ergebnisse:
Personensuche X
?
1

A Trust Service Model Adaptable to Various Assurance Levels..:

, In: 2024 8th International Conference on Cryptography, Security and Privacy (CSP),
Hayata, Junichiro ; Nomura, Kenta ; Takata, Yuta... - p. 38-45 , 2024
 
?
2

Signature for Objects: Formalizing How to Authenticate Phys..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
Hayashi, Ryuya ; Asano, Taiki ; Hayata, Junichiro... - p. 182-199 , 2023
 
?
3

On private information retrieval supporting range queries:

Hayata, Junichiro ; Schuldt, Jacob C. N. ; Hanaoka, Goichiro.
International Journal of Information Security.  23 (2023)  1 - p. 629-647 , 2023
 
?
4

Equivalence between Non-Malleability against Replayable CCA..:

HAYATA, Junichiro ; KITAGAWA, Fuyuki ; SAKAI, Yusuke..
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E104.A (2021)  1 - p. 89-103 , 2021
 
?
5

On Private Information Retrieval Supporting Range Queries:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
 
?
6

Generic Construction of Adaptively Secure Anonymous Key-Pol..:

HAYATA, Junichiro ; ISHIZAKA, Masahito ; SAKAI, Yusuke..
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E103.A (2020)  1 - p. 107-113 , 2020
 
?
7

Equivalence Between Non-malleability Against Replayable CCA..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
 
?
8

Dok-3 and Dok-1/-2 adaptors play distinctive roles in cell ..:

Kajikawa, Shuhei ; Taguchi, Yuu ; Hayata, Tadayoshi...
Biochemical and Biophysical Research Communications.  498 (2018)  4 - p. 967-974 , 2018
 
1-8