Maki Yoshida
Orcid: 0000-0002-1267-0058
According to our database1,
Maki Yoshida
authored at least 42 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
Proceedings of Work-in-Progress in Hardware and Software for Location Computation (WIPHAL 2023), 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS.
Proceedings of the 2022 International Conference on Localization and GNSS, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Information Theory Workshop, 2021
2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IEICE Trans. Inf. Syst., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Advances in Information and Computer Security, 2012
New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the Information Security and Cryptology, 2005
2001
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
Proceedings of the Cryptography and Coding, 2001