Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tao Gu
Hang Zhang
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Dan Graur
Liangliang Shang
Leonardo Ferreira
Chen Ma
Barbara Aquilani
Home
/
Author
/
YUTAKA KAWAI
Author Info
Open Visualization
Name
Affiliation
Papers
YUTAKA KAWAI
The University of Electro-Communications, Tokyo, Japan 182-8585
29
Collaborators
Citations
PageRank
46
94
11.48
Referers
Referees
References
202
449
385
Search Limit
100
449
Publications (29 rows)
Collaborators (46 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Verifiable Privacy-Preserving Data Aggregation Protocols
0
0.34
2020
Proxy Re-Encryption That Supports Homomorphic Operations For Re-Encrypted Ciphertexts
2
0.37
2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions
0
0.34
2019
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
0
0.34
2018
Token-Based Multi-input Functional Encryption.
0
0.34
2018
Multi-Key Homomorphic Proxy Re-Encryption
0
0.34
2018
Efficient Trapdoor Generation From Multiple Hashing In Searchable Symmetric Encryption
0
0.34
2018
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption.
0
0.34
2017
Dynamic Multi Target Homomorphic Attribute-Based Encryption.
0
0.34
2017
A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols
0
0.34
2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
2
0.36
2016
A limitation on security evaluation of cryptographic primitives with fixed keys.
0
0.34
2016
Master key updatable attribute-based encryption on the dual pairing vector space
0
0.34
2016
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.
7
0.44
2015
Methods For Restricting Message Space In Public-Key Encryption
4
0.39
2013
Fully-Anonymous Functional Proxy-Re-Encryption.
6
0.42
2013
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting.
4
0.39
2013
A Swarm Inspired Method For Efficient Data Transfer
0
0.34
2012
Generic construction of chosen ciphertext secure proxy re-encryption
37
1.02
2012
Group signatures with message-dependent opening
8
0.51
2012
Secret handshake scheme with request-based-revealing
1
0.37
2011
Managing Distributed Files with RNS in Heterogeneous Data Grids
1
0.39
2011
Towards restricting plaintext space in public key encryption
2
0.37
2011
A method for reliably managing files with RNS in multi Data Grids
0
0.34
2011
Public Key Encryption Schemes From The (B)Cdh Assumption With Better Efficiency
6
0.42
2010
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
0
0.34
2010
Proxiable Designated Verifier Signature
0
0.34
2010
SAGA-based file access application over multi-filesystem middleware
0
0.34
2010
Secret Handshake: Strong Anonymity Definition and Construction
14
0.63
2009
1