Kunihiko Miyazaki

According to our database1, Kunihiko Miyazaki authored at least 22 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Gait Analysis Using Stereo Camera in Daily Environment.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

2017
Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography.
J. Inf. Process., 2017

2016
Large-scale system development using Abstract Data Types and refinement.
Sci. Comput. Program., 2016

2015
Improving the Security of Cryptographic Protocol Standards.
IEEE Secur. Priv., 2015

Consistency Verification of Specification Rules.
Proceedings of the Formal Methods and Software Engineering, 2015

2014
Code Generation for Event-B.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

Formal System Modelling Using Abstract Data Types in Event-B.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014

2012
Abstract Data Types in Event-B - An Application of Generic Instantiation
CoRR, 2012

2011
Sequential Bitwise Sanitizable Signature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A Study on Multi-Resipient Encryptions for Selective Disclosure.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Invisibly Sanitizable Digital Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Cryptographic Approch for Workflow Systems.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Verifying a signature architecture: a comparative case study.
Formal Aspects Comput., 2007

2006
Digitally signed document sanitizing scheme based on bilinear maps.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2003
A Formal Analysis of a Digital Signature Architecture.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

2002
Legally Authorized and Unauthorized Digital Evidence.
Proceedings of the Security Protocols, 2002

2001
A Multi-OS Approach to Trusted Computer Systems.
Proceedings of the Security Protocols, 2001

A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
Proceedings of the Information Security and Cryptology, 2001


  Loading...