Yutaka Kawai
According to our database1,
Yutaka Kawai
authored at least 37 papers
between 2009 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
J. Inf. Process., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2018
Proceedings of the Provable Security, 2018
Proceedings of the Provable Security, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption.
Proceedings of the Information Security Practice and Experience, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017
2016
Secur. Commun. Networks, 2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Proceedings of the International Conference on Computational Science, 2011
J. Internet Serv. Inf. Secur., 2011
Comput. Phys. Commun., 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011
2010
SAGA-based user environment for distributed computing resources: A universal Grid solution over multi-middleware infrastructures.
Proceedings of the International Conference on Computational Science, 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010
2009
IACR Cryptol. ePrint Arch., 2009