2008 |
27 | | Shinsaku Kiyomoto,
Haruki Ota,
Toshiaki Tanaka:
On-the-Fly Automatic Generation of Security Protocols.
ICEIS (3-2) 2008: 97-104 |
26 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
ISC 2008: 455-470 |
25 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka:
Anonymous attribute authentication scheme using self-blindable certificates.
ISI 2008: 215-217 |
24 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis.
WISA 2008: 225-239 |
23 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Transactions 91-A(1): 127-138 (2008) |
22 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions 91-A(1): 316-329 (2008) |
21 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme.
IEICE Transactions 91-A(9): 2365-2378 (2008) |
20 | EE | Motoi Yoshitomi,
Tsuyoshi Takagi,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Transactions 91-D(5): 1330-1337 (2008) |
2007 |
19 | EE | Motoi Yoshitomi,
Tsuyoshi Takagi,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW.
WISA 2007: 203-214 |
18 | EE | Haruki Ota,
Kazuki Yoneyama,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kazuo Ohta:
Universally Composable Hierarchical Hybrid Authenticated Key Exchange.
IEICE Transactions 90-A(1): 139-151 (2007) |
17 | EE | Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka,
Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions 90-A(9): 1780-1787 (2007) |
16 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka,
Yutaka Miyake,
Yoshinori Mitamura:
Development of security functions for a medical information sharing platform.
Systems and Computers in Japan 38(11): 49-63 (2007) |
2006 |
15 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
MDM 2006: 17 |
14 | | Masaki Inamura,
Toshiaki Tanaka,
Toshiyuki Fujisawa,
Kazuto Ogawa,
Takeshi Kimura:
Flexible License Transfer System Using Mobile Terminal.
SECRYPT 2006: 397-404 |
13 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka:
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Transactions 89-A(1): 222-226 (2006) |
12 | EE | Satoshi Hada,
Toshiaki Tanaka:
Zero-Knowledge and Correlation Intractability.
IEICE Transactions 89-A(10): 2894-2905 (2006) |
11 | EE | Ayumu Kubota,
Yutaka Miyake,
Toshiaki Tanaka:
Secure Host Name Resolution Infrastructure for Overlay Networks.
IEICE Transactions 89-B(9): 2434-2439 (2006) |
2005 |
10 | EE | Akira Yamada,
Yutaka Miyake,
Keisuke Takemori,
Toshiaki Tanaka:
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data.
ITCC (1) 2005: 650-655 |
9 | EE | Haruki Ota,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification.
IEICE Transactions 88-A(1): 287-295 (2005) |
8 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Transactions 88-A(10): 2778-2791 (2005) |
2004 |
7 | EE | Kenji Rikitake,
Hiroki Nogawa,
Toshiaki Tanaka,
Koji Nakao,
Shinji Shimojo:
DNS Transport Size Issues in IPv6 Environment.
SAINT Workshops 2004: 141-145 |
6 | EE | Akira Yamada,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Transactions 87-A(1): 182-189 (2004) |
2001 |
5 | EE | Takeshi Tsuruga,
Shuichi Ino,
Tohru Ifukube,
Mitsuru Sato,
Toshiaki Tanaka,
Takashi Izumi,
Masahiko Muro:
A basic study for a robotic transfer aid system based on human motion analysis.
Advanced Robotics 14(7): 579-595 (2001) |
1999 |
4 | EE | Satoshi Hada,
Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability.
Public Key Cryptography 1999: 82-96 |
1998 |
3 | EE | Satoshi Hada,
Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols.
CRYPTO 1998: 408-423 |
1990 |
2 | | Koji Nakao,
Sadao Obana,
Satoshi Nishiyama,
Toshiaki Tanaka:
Feasibility Study for Worldwide Videotex Interworking.
IEEE Journal on Selected Areas in Communications 8(1): 80-92 (1990) |
1989 |
1 | EE | Toshiaki Tanaka,
Tsutomu Kobayashi,
Osamu Karatsu:
HARP: FORTRAN to silicon [compilation system].
IEEE Trans. on CAD of Integrated Circuits and Systems 8(6): 649-660 (1989) |