-
1كتابCorrection to: Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-Input AND Protocols
المصدر: Cryptology and Network Security ; Lecture Notes in Computer Science ; page C1-C1 ; ISSN 0302-9743 1611-3349 ; ISBN 9789819975624 9789819975631
-
2كتاب
المصدر: Cryptology and Network Security ; Lecture Notes in Computer Science ; page 211-231 ; ISSN 0302-9743 1611-3349 ; ISBN 9789819975624 9789819975631
-
3دورية أكاديمية
المؤلفون: He, Anxiao, Bu, Kai, Li, Yucong, Chida, Eikoh, Gu, Qianping, Ren, Kui
المساهمون: National Science Foundation of China, Natural Science Foundation of Zhejiang Province, National Natural Science Foundation, Zhejiang Key Research and Development Plan, Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Research Institute of Cyberspace Governance in Zhejiang University, Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang
المصدر: IEEE Transactions on Information Forensics and Security ; volume 15, page 3832-3847 ; ISSN 1556-6013 1556-6021
مصطلحات موضوعية: Computer Networks and Communications, Safety, Risk, Reliability and Quality
الإتاحة: https://doi.org/10.1109/tifs.2020.3001669Test
http://xplorestaging.ieee.org/ielx7/10206/8833568/09115077.pdf?arnumber=9115077Test -
4مؤتمر
المؤلفون: Yonemura, Keiichi, Komura, Ryotaro, Sato, Jun, Hoga, Takeshi, Takeichi, Yoshihiro, Chida, Eikoh, Matsuoka, Masato
المصدر: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)
الإتاحة: https://doi.org/10.1109/iscaie.2018.8405480Test
http://xplorestaging.ieee.org/ielx7/8399564/8405426/08405480.pdf?arnumber=8405480Test -
5كتاب
المؤلفون: Ishikawa, Rie, Chida, Eikoh, Mizuki, Takaaki
المصدر: Unconventional Computation and Natural Computation ; Lecture Notes in Computer Science ; page 215-226 ; ISSN 0302-9743 1611-3349 ; ISBN 9783319218182 9783319218199
-
6مؤتمر
المؤلفون: Yanai, Naoto, Chida, Eikoh, Mambo, Masahiro
المصدر: 2010 International Symposium On Information Theory & Its Applications
الإتاحة: https://doi.org/10.1109/isita.2010.5649617Test
http://xplorestaging.ieee.org/ielx5/5640322/5648872/05649617.pdf?arnumber=5649617Test -
7دورية أكاديمية
المؤلفون: Yanai Naoto, Chida Eikoh, Mambo Masahiro, Okamoto Eiji
مصطلحات موضوعية: CDH problem, Multisignatures, Ordred multisignatures, Standard model
العلاقة: https://www.jstage.jst.go.jp/browse/ipsjjipTest; https://www.ipsj.or.jpTest/; https://kanazawa-u.repo.nii.ac.jp/?action=repository_uri&item_id=9019Test; http://hdl.handle.net/2297/37596Test; Journal of Information Processing, 22(2), 366-375(2014-01-01); https://kanazawa-u.repo.nii.ac.jp/?action=repository_action_common_download&item_id=9019&item_no=1&attribute_id=26&file_no=1Test
-
8
المؤلفون: Chida, Eikoh, Li, Li, Shizuya, Hiroki
المصدر: Interdisciplinary information sciences. 8(1):57-61
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=jairo_______::181c6651c002a721e4eb23dc397d87f5Test
http://hdl.handle.net/10097/17410Test -
9
المؤلفون: Chida, Eikoh, Mambo, Masahiro, Shizuya, Hiroki
المصدر: Interdisciplinary information sciences. 7(2):135-165
مصطلحات موضوعية: ComputerApplications_MISCELLANEOUS, TheoryofComputation_GENERAL
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=jairo_______::14408dd2a501300761b155cccfdff26dTest
http://hdl.handle.net/10097/17371Test -
10كتاب
المؤلفون: Chida, Eikoh, Kasai, Yosuke, Mambo, Masahiro, Shizuya, Hiroki
المصدر: Progress in Cryptology — INDOCRYPT 2002 ; Lecture Notes in Computer Science ; page 339-353 ; ISSN 0302-9743 ; ISBN 9783540002635 9783540362319