Hiroaki Anada
Orcid: 0000-0002-4472-0662
According to our database1,
Hiroaki Anada
authored at least 42 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Theoretical Analysis of Serial/Parallel Variations of Hash-Mining for Smaller Variance of Confirmation Time.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
2023
Int. J. Netw. Comput., 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
2022
Int. J. Netw. Comput., 2022
Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups.
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
2021
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021
J. Internet Serv. Inf. Secur., 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
2020
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs.
J. Internet Serv. Inf. Secur., 2020
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
Int. J. Inf. Sec., 2020
Security Reconsideration and Efficiency Evaluation of Decentralized Multi-authority Anonymous Authentication Scheme.
Proceedings of the IEEE International Conference on Smart Computing, 2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Quantum Security and Implementation Evaluation of Non-adaptive Group-Testing Aggregate Message Authentication Codes.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020
2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019
Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2018
Witness-Indistinguishable Arguments with Σ-Protocols for Bundled Witness Spaces and its Application to Global Identities.
IACR Cryptol. ePrint Arch., 2018
Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for Security.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
2016
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
2015
Proceedings of the Provable Security, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the ASIAPKC'14, 2014
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2010
Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
Proceedings of the Provable Security - 4th International Conference, 2010