Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Takato Hirano"'
Autor:
Mitsuhiro Hattori, Nori Matsuda, Yutaka Kawai, Tadakazu Yamanaka, Masakatsu Nishigaki, Takashi Ito, Takato Hirano
Publikováno v:
Journal of Information Processing. 28:520-536
Publikováno v:
2021 Thirteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU).
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :81-98
Publikováno v:
DSC
Searchable symmetric encryption enables users with the secret key to conduct keyword search on encrypted data without decryption. Recently, dynamic searchable symmetric encryption (DSSE) which provides secure functionalities for adding or deleting do
Autor:
Yutaka Kawai, Jacob C. N. Schuldt, Goichiro Hanaoka, Nuttapong Attrapadung, Takato Hirano, Koseki Yoshihiro
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.
Publikováno v:
Journal of Information Processing. 26:648-661
Publikováno v:
Information Security Practice and Experience ISBN: 9783319998060
ISPEC
ISPEC
Searchable symmetric encryption (SSE) which can search encrypted data using encrypted keywords has been extremely studied. In Asiacrypt’10, Chase and Kamara formalized structured encryption which is a generalization of SSE, and its concrete schemes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e96630e82b56b599cd5aeef959eb3bb2
https://doi.org/10.1007/978-3-319-99807-7_10
https://doi.org/10.1007/978-3-319-99807-7_10
Autor:
Yutaka Kawai, Nuttapong Attrapadung, Koseki Yoshihiro, Jacob C. N. Schuldt, Goichiro Hanaoka, Takato Hirano
Publikováno v:
Provable Security ISBN: 9783030014452
ProvSec
ProvSec
In this paper, we put forward the notion of a token-based multi-input functional encryption (token-based MIFE) scheme – a notion intended to give encryptors a mechanism to control the decryption of encrypted messages, by extending the encryption an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d7dac35c0068612745451ab98ca13e58
https://doi.org/10.1007/978-3-030-01446-9_9
https://doi.org/10.1007/978-3-030-01446-9_9
Autor:
Nori Matsuda, Ye Wang, Nisarg Raval, Takato Hirano, Mitsuhiro Hattori, Shimizu Rina, Prakash Ishwar
Publikováno v:
ICASSP
Household energy monitoring via smart-meters motivates the problem of disaggregating the total energy usage signal into the component energy usage and operating patterns of individual appliances. While energy disaggregation enables useful analytics,
Publikováno v:
Information Security and Privacy ISBN: 9783319598697
ACISP (2)
ACISP (2)
Privacy-preserving data mining technologies have been studied extensively, and as a general approach, du Pin Calmon and Fawaz have proposed a data distortion mechanism based on a statistical inference attack framework. This theory has been extended b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b9859f5069ff8014edc928e89c262a85
https://doi.org/10.1007/978-3-319-59870-3_12
https://doi.org/10.1007/978-3-319-59870-3_12