Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Okamoto, Eiji")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 181

  • Page / 8
Export

Selection :

  • and

A Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer SecurityOKAMOTO, Eiji.IEICE transactions on communications. 2012, Vol 95, Num 4, pp 1384-1392, issn 0916-8516, 9 p.Article

Progress in cryptology - INDOCRYPT 2000 (Calcutta, 10-13 December 2000)Roy, Bimal; Okamoto, Eiji.Lecture notes in computer science. 2000, issn 0302-9743, isbn 3-540-41452-5, X, 294 p, isbn 3-540-41452-5Conference Proceedings

On the security of a multi-party certified email protocolJIANYING ZHOU.Lecture notes in computer science. 2004, pp 40-52, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

Information security (Wollongong, 20-21 December 2000)Pieprzyk, Josef; Okamoto, Eiji; Seberry, Jennifer et al.Lecture notes in computer science. 2000, issn 0302-9743, isbn 3-540-41416-9, X, 322 p, isbn 3-540-41416-9Conference Proceedings

Affine invariant watermarks for 3D polygonal and NURBS based modelsBENEDENS, Oliver.Lecture notes in computer science. 2000, pp 15-29, issn 0302-9743, isbn 3-540-41416-9Conference Paper

The role of the development process in operating system securityPAYNE, Christian.Lecture notes in computer science. 2000, pp 277-291, issn 0302-9743, isbn 3-540-41416-9Conference Paper

Two-pass authenticated key agreement protocol with key confirmationSONG, Boyeon; KIM, Kwangjo.Lecture notes in computer science. 2000, pp 237-249, issn 0302-9743, isbn 3-540-41452-5Conference Paper

Cryptanalysis of Message authentication CodesPRENEEL, B.Lecture notes in computer science. 1998, pp 55-65, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Threshold proxy signature schemesKAN ZHANG.Lecture notes in computer science. 1998, pp 282-290, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Information and communications security (Malaga, 27-29 October 2004)Lopez, Javier; Qing, Sihan; Okamoto, Eiji et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23563-9, XI, 564 p, isbn 3-540-23563-9Conference Proceedings

Characteristics of some binary codes for fingerprintingLINDKVIST, Tina.Lecture notes in computer science. 2000, pp 97-107, issn 0302-9743, isbn 3-540-41416-9Conference Paper

Advances in cryptology - ASIACRYPT'99 (Singapore, 14-18 November 1999)Kwok Yan Lam; Okamoto, Eiji; Chaoping Xing et al.Lecture notes in computer science. 1999, issn 0302-9743, isbn 3-540-66666-4, XI, 414 p, isbn 3-540-66666-4Conference Proceedings

An incremental payment method for internet based streaming real-time mediaFUCHSBERGER, A.Lecture notes in computer science. 1998, pp 321-327, issn 0302-9743, isbn 3-540-64382-6Conference Paper

On rough sets and inference analysisKAN ZHANG.Lecture notes in computer science. 1998, pp 256-265, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Cryptanalysis of the A5/1 GSM stream cipherBIHAM, Eli; DUNKELMAN, Orr.Lecture notes in computer science. 2000, pp 43-51, issn 0302-9743, isbn 3-540-41452-5Conference Paper

On bias estimation in linear cryptanalysisSELCUK, Ali Aydin.Lecture notes in computer science. 2000, pp 52-66, issn 0302-9743, isbn 3-540-41452-5Conference Paper

On choice of connection-polynomials for LFSR-based stream ciphersJAMBUNATHAN, K.Lecture notes in computer science. 2000, pp 9-18, issn 0302-9743, isbn 3-540-41452-5Conference Paper

Power analysis breaks elliptic curve cryptosystems even secure against the timing attackOKEYA, Katsuyuki; SAKURAI, Kouichi.Lecture notes in computer science. 2000, pp 178-190, issn 0302-9743, isbn 3-540-41452-5Conference Paper

Decimation attack of stream ciphersFILIOL, Eric.Lecture notes in computer science. 2000, pp 31-42, issn 0302-9743, isbn 3-540-41452-5Conference Paper

On resilient Boolean functions with maximal possible nonlinearityTARANNIKOV, Yuriy.Lecture notes in computer science. 2000, pp 19-30, issn 0302-9743, isbn 3-540-41452-5Conference Paper

The correlation of a Boolean function with its variablesDINGYI PEI; WENLIANG QIN.Lecture notes in computer science. 2000, pp 1-8, issn 0302-9743, isbn 3-540-41452-5Conference Paper

Practice-oriented provable-securityBELLARE, M.Lecture notes in computer science. 1998, pp 221-231, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Remarks on blind decryptionOHTA, K.Lecture notes in computer science. 1998, pp 109-115, issn 0302-9743, isbn 3-540-64382-6Conference Paper

The case for a secure multi-application smart card operating systemMARKANTONAKIS, C.Lecture notes in computer science. 1998, pp 188-197, issn 0302-9743, isbn 3-540-64382-6Conference Paper

Efficient construction of cryptographically strong elliptic curvesBUCHMANN, Johannes; BAIER, Harald.Lecture notes in computer science. 2000, pp 191-202, issn 0302-9743, isbn 3-540-41452-5Conference Paper

  • Page / 8