Masayuki Yoshino
According to our database1,
Masayuki Yoshino
authored at least 26 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2021
2020
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem.
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
2015
Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
2010
Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
Int. J. Inf. Sec., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.
Proceedings of the Topics in Cryptology, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006