Search for persons
X
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2023 ,
3
Single-Shuffle Card-Based Protocols with Six Cards per Gate:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2023 ,
6
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitr..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2023 ,
7
Efficient Result-Hiding Searchable Encryption with Forward ..:
, In:
?
Unconventional Computation and Natural Computation; Lecture Notes in Computer Science ,
8
Card-Based Overwriting Protocol for Equality Function and A..:
, In:
?
Combinatorial Optimization and Applications; Lecture Notes in Computer Science ,
9
The Two Sheriffs Problem: Cryptographic Formalization and G..:
, In:
?
Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science ,
10
Lightweight Authentication Using Noisy Key Derived from Phy..:
, In:
?
IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society ,
11
Packet Analysis and Information Theory on Attack Detection ..:
, In:
?
Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy ,
14