Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Satoshi Iriyama"'
Autor:
Kazumi Yoshizawa, Saki Ukai, Junpei Kuroda, Tsugumi Yamauchi, Daisuke Yamada, Akiyoshi Saitoh, Satoshi Iriyama, Shoichi Nishino, Satoru Miyazaki
Publikováno v:
Neuropsychopharmacology Reports, Vol 42, Iss 2, Pp 213-217 (2022)
Abstract Stress has been shown to affect brain activity and exert potent and complex modulatory effects on pain. Several behavioral tests have shown that acute stress produces hyperalgesia, depending on the stress conditions. In the present study, we
Externí odkaz:
https://doaj.org/article/02c2263a351d46538e3e4317f4943dc8
Autor:
Maki Kihara, Satoshi Iriyama
Publikováno v:
Information, Vol 14, Iss 2, p 126 (2023)
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain
Externí odkaz:
https://doaj.org/article/ca4ab8702ed14ca2a9a4732dbd0bef27
Publikováno v:
Applied Sciences, Vol 11, Iss 12, p 5540 (2021)
Strongly asymmetric public key agreement (SAPKA) is a class of key exchange between Alice and Bob that was introduced in 2011. The greatest difference from the standard PKA algorithms is that Bob constructs multiple public keys and Alice uses one of
Externí odkaz:
https://doaj.org/article/9b797a3638f3431eb2c7e8ad0db76d3c
Publikováno v:
Cryptography, Vol 4, Iss 3, p 21 (2020)
A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her pub
Externí odkaz:
https://doaj.org/article/a73f0afcf845494e9e3919a06d522a62
Autor:
Maki Kihara, Satoshi Iriyama
Publikováno v:
Cryptography, Vol 4, Iss 2, p 16 (2020)
Single sign-on (SSO) techniques allow access control for multiple systems with a single login. The aim of our study is to construct an authentication algorithm that provides the authentication information of a user to a requester without requiring an
Externí odkaz:
https://doaj.org/article/184d7c35dc174504a6bac95e07cc6ba5
Autor:
Maki Kihara, Satoshi Iriyama
Publikováno v:
Cryptography, Vol 3, Iss 3, p 19 (2019)
We propose a new authentication algorithm for small internet of things (IoT) devices without key distribution and secure servers. Encrypted private data are stored on the cloud server in the registration step and compared with incoming encrypted data
Externí odkaz:
https://doaj.org/article/d278f2c1b6d34ce6aa99a4fd9d243ac4
Publikováno v:
Cryptography, Vol 3, Iss 1, p 9 (2019)
A new class of public key agreement (PKA) algorithms called strongly-asymmetric algorithms (SAA) was introduced in a previous paper by some of the present authors. This class can be shown to include some of the best-known PKA algorithms, for example
Externí odkaz:
https://doaj.org/article/719f1842957949f29440f089d0f126d6
Autor:
Tsugumi, Yamauchi, Toshinori, Yoshioka, Daisuke, Yamada, Takumi, Hamano, Maika, Ikeda, Masato, Kamei, Takaya, Otsuki, Yasuo, Sato, Kyoko, Nii, Masashi, Suzuki, Satoshi, Iriyama, Kazumi, Yoshizawa, Shoichi, Nishino, Hiroko, Ichikawa, Satoru, Miyazaki, Akiyoshi, Saitoh
Publikováno v:
NeuroReport. 33:445-449
According to previous studies, ultrasound exposure appears to be a noninvasive method for modulating brain activity related to cognition and consciousness; however, its effects on emotional states remain unclear. Therefore, an animal model is require
Autor:
Tsugumi, Yamauchi, Toshinori, Yoshioka, Daisuke, Yamada, Takumi, Hamano, Misaki, Ohashi, Maki, Matsumoto, Keita, Iio, Maika, Ikeda, Masato, Kamei, Takaya, Otsuki, Yasuo, Sato, Kyoko, Nii, Masashi, Suzuki, Hiroko, Ichikawa, Hiroshi, Nagase, Satoshi, Iriyama, Kazumi, Yoshizawa, Shoichi, Nishino, Satoru, Miyazaki, Akiyoshi, Saitoh
Publikováno v:
Biological and Pharmaceutical Bulletin. 45:268-275
Ultrasonic vocalization (USVs) is a promising tool to measure behavioral anxiety in rodents as USV recording is noninvasive, behaviorally relevant, ethological, and reproducible. Studies reporting the effects of stress-induced USVs in adult mice rema
Publikováno v:
Applied Sciences, Vol 11, Iss 5540, p 5540 (2021)
Applied Sciences
Volume 11
Issue 12
Applied Sciences
Volume 11
Issue 12
Strongly asymmetric public key agreement (SAPKA) is a class of key exchange between Alice and Bob that was introduced in 2011. The greatest difference from the standard PKA algorithms is that Bob constructs multiple public keys and Alice uses one of