Atsuko Miyaji
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j40]Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Atsuko Miyaji, Uyen Trang Nguyen:
SupAUTH: A new approach to supply chain authentication for the IoT. Computational Intelligence 34(2): 582-602 (2018) - [j39]Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani:
OTP-IoT: An ownership transfer protocol for the Internet of Things. J. Inf. Sec. Appl. 43: 73-82 (2018) - [c111]
- [c110]Katsuya Tanaka, Ryuichi Yamamoto, Kazuhisa Nakasho, Atsuko Miyaji:
Development of a Secure Cross-Institutional Data Collection System Based on Distributed Standardized EMR Storage. EFMI-STC 2018: 35-39 - [c109]Tung Chou, Yohei Maezawa, Atsuko Miyaji:
A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes. ICISC 2018: 341-353 - [c108]Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji:
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. PST 2018: 1-7 - [c107]Katsunari Shishido, Atsuko Miyaji:
Efficient and Quasi-accurate Multiparty Private Set Union. SMARTCOMP 2018: 309-314 - 2017
- [j38]Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Variable message encryption through blockcipher compression function. Concurrency and Computation: Practice and Experience 29(7) (2017) - [j37]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A simple authentication encryption scheme. Concurrency and Computation: Practice and Experience 29(16) (2017) - [j36]Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo:
Cloud computing security and privacy: Standards and regulations. Computer Standards & Interfaces 54: 1-2 (2017) - [j35]Ryoma Ito, Atsuko Miyaji:
Refined Construction of RC4 Key Setting in WPA. IEICE Transactions 100-A(1): 138-148 (2017) - [j34]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data. Int. J. Found. Comput. Sci. 28(6): 661-682 (2017) - [j33]Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida:
Privacy-Preserving Integration of Medical Data - A Practical Multiparty Private Set Intersection. J. Medical Systems 41(3): 37:1-37:10 (2017) - [j32]Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. IEEE Trans. Information Forensics and Security 12(12): 3024-3038 (2017) - [c106]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A simple construction of encryption for a tiny domain message. CISS 2017: 1-6 - [c105]Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji:
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. ICISC 2017: 245-263 - [c104]Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota:
Robust ORAM: Enhancing Availability, Confidentiality and Integrity. PRDC 2017: 30-39 - [c103]Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su:
Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2. TrustCom/BigDataSE/ICESS 2017: 721-728 - [c102]Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji:
(p, N)-identifiability: Anonymity under Practical Adversaries. TrustCom/BigDataSE/ICESS 2017: 996-1003 - [e5]Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi:
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017, ISBN 978-3-319-61203-4 [contents] - 2016
- [j31]Ryoma Ito, Atsuko Miyaji:
Refined Glimpse Correlations of RC4. IEICE Transactions 99-A(1): 3-13 (2016) - [j30]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256. IEICE Transactions 99-A(1): 14-21 (2016) - [j29]Rashed Mazumder, Atsuko Miyaji:
A New Scheme of Blockcipher Hash. IEICE Transactions 99-D(4): 796-804 (2016) - [j28]Ryoma Ito, Atsuko Miyaji:
Refined RC4 Key Correlations of Internal States in WPA. IEICE Transactions 99-A(6): 1132-1144 (2016) - [j27]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
A Matrix Based ORAM: Design, Implementation and Experimental Analysis. IEICE Transactions 99-D(8): 2044-2055 (2016) - [c101]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
A Blockcipher Based Authentication Encryption. CD-ARES 2016: 106-123 - [c100]Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
An Efficient Construction of a Compression Function for Cryptographic Hash. CD-ARES 2016: 124-140 - [c99]Kaitai Liang, Atsuko Miyaji, Chunhua Su:
Secure and Traceable Framework for Data Circulation. ACISP (1) 2016: 376-388 - [c98]Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun:
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space. ATIS 2016: 130-141 - [c97]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin:
Security and experimental performance analysis of a matrix ORAM. ICC 2016: 1-6 - 2015
- [j26]Atsuko Miyaji, Kazumasa Omote:
Self-healing wireless sensor networks. Concurrency and Computation: Practice and Experience 27(10): 2547-2568 (2015) - [j25]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A privacy-preserving efficient RFID authentication protocol from SLPN assumption. IJCSE 10(3): 234-243 (2015) - [j24]Jiageng Chen, Keita Emura, Atsuko Miyaji:
SKENO: Secret key encryption with non-interactive opening. J. Mathematical Cryptology 9(2): 63-74 (2015) - [j23]Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An efficient batch verification system and its effect in a real time VANET environment. Security and Communication Networks 8(2): 298-310 (2015) - [j22]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. Security and Communication Networks 8(8): 1547-1560 (2015) - [c96]Ryoma Ito, Atsuko Miyaji:
How TKIP Induces Biases of Internal States of Generic RC4. ACISP 2015: 329-342 - [c95]Atsuko Miyaji, Mazumder Rashed:
A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling. AINA 2015: 564-570 - [c94]Atsuko Miyaji, Xiaonan Shi, Satoru Tanaka:
Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree. CAI 2015: 165-175 - [c93]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. Inscrypt 2015: 108-124 - [c92]Jiageng Chen, Rashed Mazumder, Atsuko Miyaji:
A Single Key Scheduling Based Compression Function. CRiSIS 2015: 207-222 - [c91]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Improved Differential Characteristic Searching Methods. CSCloud 2015: 500-508 - [c90]
- [c89]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin:
Analysis of Path ORAM toward Practical Utilization. NBiS 2015: 646-651 - [c88]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao:
A New Statistical Approach for Integral Attack. NSS 2015: 345-356 - [c87]
- [c86]Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su:
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags. TrustCom/BigDataSE/ISPA (1) 2015: 17-24 - [c85]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost. WISA 2015: 3-15 - [e4]Man Ho Au, Atsuko Miyaji:
Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9451, Springer 2015, ISBN 978-3-319-26058-7 [contents] - 2014
- [j21]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users. J. Applied Mathematics 2014: 983040:1-983040:14 (2014) - [c84]Chengqiang Huang, Atsuko Miyaji, Longhai Li, Shangmei Xu:
POND: A Novel Protocol for Network Coding Based on Hybrid Cryptographic Scheme. CIT 2014: 373-380 - [c83]
- [c82]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A Scalable and Secure RFID Ownership Transfer Protocol. AINA 2014: 343-350 - [c81]Atsuko Miyaji, Mazumder Rashed, Tsuyoshi Sawada:
A New (n, n) Blockcipher Hash Function: Apposite for Short Messages. AsiaJCIS 2014: 56-63 - [c80]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. ICISC 2014: 271-285 - [c79]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. ISPEC 2014: 373-387 - [c78]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Hiroaki Takada:
A Multi-purpose Group Signature for Vehicular Network Security. NBiS 2014: 511-516 - [c77]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. NSS 2014: 184-197 - [c76]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. ProvSec 2014: 103-116 - [c75]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
Secure VANET applications with a refined group signature. PST 2014: 199-206 - [c74]
- [i8]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm. IACR Cryptology ePrint Archive 2014: 272 (2014) - 2013
- [j20]Jiageng Chen, Atsuko Miyaji:
Novel strategies for searching RC4 key collisions. Computers & Mathematics with Applications 66(1): 81-90 (2013) - [c73]Jiageng Chen, Atsuko Miyaji:
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock. CD-ARES Workshops 2013: 1-15 - [c72]Atsuko Miyaji, Kazumasa Omote:
How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs. AINA 2013: 205-212 - [c71]
- [c70]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption. TrustCom/ISPA/IUCC 2013: 102-109 - [c69]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Multiparty Set Intersection Protocol in Rational Model. TrustCom/ISPA/IUCC 2013: 431-438 - [i7]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security. IACR Cryptology ePrint Archive 2013: 321 (2013) - [i6]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
Group Signature with relaxed-privacy and revocability for VANET. IACR Cryptology ePrint Archive 2013: 804 (2013) - 2012
- [j19]Jiageng Chen, Atsuko Miyaji:
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack. IEICE Transactions 95-A(12): 2148-2159 (2012) - [j18]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Dynamic attribute-based signcryption without random oracles. IJACT 2(3): 199-211 (2012) - [j17]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-preserving Two-party Rational Set Intersection Protocol. Informatica (Slovenia) 36(3): 277-286 (2012) - [j16]Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Two-Party Set Intersection Protocol in Rational Model. J. Internet Serv. Inf. Secur. 2(1/2): 93-104 (2012) - [c68]Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs. AINA Workshops 2012: 552-557 - [c67]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Set Operations in the Presence of Rational Parties. AINA Workshops 2012: 869-874 - [c66]
- [c65]Atsuko Miyaji, Phuong V. X. Tran:
Constant-Ciphertext-Size Dual Policy Attribute Based Encryption. CSS 2012: 400-413 - [c64]Tomoyuki Karasawa, Masakazu Soshi, Atsuko Miyaji:
A Novel Hybrid IP Traceback Scheme with Packet Counters. IDCS 2012: 71-84 - [c63]Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote:
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. ISPEC 2012: 245-258 - [c62]Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman:
A Secure and Private RFID Authentication Protocol under SLPN Problem. NSS 2012: 476-489 - [i5]Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An Optimized Signature Verification System for Vehicle Ad hoc NETwork. CoRR abs/1208.5096 (2012) - [i4]Atsuko Miyaji, Mohammad Shahriar Rahman:
APRAP: Another Privacy Preserving RFID Authentication Protocol. CoRR abs/1209.5066 (2012) - [i3]Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Efficient and Low-Cost RFID Authentication Schemes. CoRR abs/1209.5076 (2012) - [i2]Atsuko Miyaji, Mohammad Shahriar Rahman:
KIMAP: Key-Insulated Mutual Authentication Protocol for RFID. CoRR abs/1209.5388 (2012) - 2011
- [j15]Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang:
Sequential Bitwise Sanitizable Signature Schemes. IEICE Transactions 94-A(1): 392-404 (2011) - [j14]Shoujiro Hirasawa, Atsuko Miyaji:
New Concrete Relation between Trace, Definition Field, and Embedding Degree. IEICE Transactions 94-A(6): 1368-1374 (2011) - [j13]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Timed-Release Proxy Re-Encryption Scheme. IEICE Transactions 94-A(8): 1682-1695 (2011) - [j12]Atsuko Miyaji, Kazumasa Omote:
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes. IEICE Transactions 94-D(10): 1955-1965 (2011) - [j11]Jiageng Chen, Atsuko Miyaji:
Generalized Analysis on Key Collisions of Stream Cipher RC4. IEICE Transactions 94-A(11): 2194-2206 (2011) - [j10]Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli:
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic. J. Cryptographic Engineering 1(2): 161-176 (2011) - [j9]Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Efficient and Low-Cost RFID Authentication Schemes. JoWUA 2(3): 4-25 (2011) - [c61]Tetsuya Hatano, Atsuko Miyaji, Takashi Sato:
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity. ACISP 2011: 189-207 - [c60]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Toward Dynamic Attribute-Based Signcryption (Poster). ACISP 2011: 439-443 - [c59]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Data Mining: A Game-Theoretic Approach. DBSec 2011: 186-200 - [c58]Jiageng Chen, Keita Emura, Atsuko Miyaji:
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys. ICICS 2011: 57-68 - [c57]Kai-Yuen Cheong, Atsuko Miyaji:
Unconditionally Secure Oblivious Transfer Based on Channel Delays. ICICS 2011: 112-120 - [c56]Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi:
Ideal Secret Sharing Schemes with Share Selectability. ICICS 2011: 143-157 - [c55]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. ICISC 2011: 186-203 - [c54]
- [c53]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. ISC 2011: 102-118 - [c52]Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote:
POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks. SSS 2011: 253-267 - 2010
- [j8]Atsuko Miyaji, Masahiro Sukegawa:
New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences. IEICE Transactions 93-A(6): 1066-1077 (2010) - [j7]Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi:
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. IJACT 2(1): 46-59 (2010) - [c51]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Efficient Privacy-Preserving Data Mining in Malicious Model. ADMA (1) 2010: 370-382 - [c50]Atsuko Miyaji, Mohammad Shahriar Rahman:
Privacy-Preserving Data Mining in Presence of Covert Adversaries. ADMA (1) 2010: 429-440 - [c49]Raveen R. Goundar, Marc Joye, Atsuko Miyaji:
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract). CHES 2010: 65-79 - [c48]Jiageng Chen, Atsuko Miyaji:
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. Inscrypt 2010: 62-76 - [c47]Yvo Desmedt, Atsuko Miyaji:
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. Inscrypt 2010: 236-254 - [c46]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. EuroPKI 2010: 77-92 - [c45]Hisashige Ito, Atsuko Miyaji, Kazumasa Omote:
RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c44]Jiageng Chen, Atsuko Miyaji:
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. ISPEC 2010: 30-44 - [c43]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. ProvSec 2010: 184-198 - [c42]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication. ProvSec 2010: 200-213 - [c41]
- [c40]Atsuko Miyaji, Kazumasa Omote:
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks. WISA 2010: 135-149 - [c39]Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Hidden Credential Retrieval without Random Oracles. WISA 2010: 160-174 - [e3]Marc Joye, Atsuko Miyaji, Akira Otsuka:
Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings. Lecture Notes in Computer Science 6487, Springer 2010, ISBN 978-3-642-17454-4 [contents] - [i1]Raveen R. Goundar, Marc Joye, Atsuko Miyaji:
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves. IACR Cryptology ePrint Archive 2010: 309 (2010)
2000 – 2009
- 2009
- [j6]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics. JIP 17: 216-231 (2009) - [c38]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. ARES 2009: 487-492 - [c37]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. ARES 2009: 769-773 - [c36]Atsuko Miyaji, Masahiro Sukegawa:
New Correlations of RC4 PRGA Using Nonzero-Bit Differences. ACISP 2009: 134-152 - [c35]Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko Miyaji:
A Secure RFID Authentication Protocol with Low Communication Cost. CISIS 2009: 559-564 - [c34]Shoujiro Hirasawa, Atsuko Miyaji:
Elliptic curves with a pre-determined embedding degree. ISIT 2009: 2391-2395 - [c33]Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi:
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. ISPEC 2009: 13-23 - [c32]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Selectable k-Times Relaxed Anonymous Authentication Scheme. WISA 2009: 281-295