Kunihiko Miyazaki
According to our database1,
Kunihiko Miyazaki
authored at least 22 papers
between 2001 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019
2017
Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography.
J. Inf. Process., 2017
2016
Sci. Comput. Program., 2016
2015
Proceedings of the Formal Methods and Software Engineering, 2015
2014
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014
2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
A Study on Multi-Resipient Encryptions for Selective Disclosure.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Formal Aspects Comput., 2007
2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
2002
Proceedings of the Security Protocols, 2002
2001
Proceedings of the Security Protocols, 2001
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
Proceedings of the Information Security and Cryptology, 2001