フォロー
Jun Kurihara
Jun Kurihara
Zettant Inc.
確認したメール アドレス: ieee.org - ホームページ
タイトル
引用先
引用先
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
International Conference on Information Security, 455-470, 2008
1372008
An encryption-based access control framework for content-centric networking
J Kurihara, E Uzun, CA Wood
IFIP Networking Conference (IFIP Networking), 2015, 1-9, 2015
822015
Security vulnerabilities and solutions in mobile WiMAX
A Deininger, S Kiyomoto, J Kurihara, T Tanaka
IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007
692007
On a fast (k, n)-threshold secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
682008
Relative generalized rank weight of linear codes and its applications to network coding
J Kurihara, R Matsumoto, T Uyematsu
IEEE Transactions on Information Theory 61 (7), 3912-3936, 2013
542013
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE transactions on fundamentals of electronics, communications and …, 2008
512008
Secret sharing schemes based on linear codes can be precisely characterized by the relative generalized Hamming weight
J Kurihara, T Uyematsu, R Matsumoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2012
442012
A fast (k, L, n)-threshold ramp secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009
402009
The rakaposhi Stream Cipher
C Cid, S Kiyomoto, J Kurihara
International Conference on Information and Communications Security, 32-46, 2009
372009
Access control framework for information centric networking
E Uzun, J Kurihara, CA Wood
US Patent 9,552,493, 2017
302017
Explicit construction of universal strongly secure network coding via MRD codes
J Kurihara, T Uyematsu, R Matsumoto
2012 IEEE International Symposium on Information Theory Proceedings, 1483-1487, 2012
162012
Threshold secret sharing apparatus, threshold secret sharing scheme, secret information decryption method, and program for the same
J Kurihara, S Kiyomoto, T Tanaka
US Patent 8,275,124, 2012
132012
A consumer-driven access control approach to censorship circumvention in content-centric networking
J Kurihara, K Yokota, A Tagami
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 186-194, 2016
122016
A novel realization of threshold schemes over binary field extensions
J Kurihara, T Uyematsu
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011
112011
Network coding for content-centric network
J Kurihara, E Uzun, JJ Garcia-Luna-Aceves
US Patent 9,497,282, 2016
72016
New parameters of linear codes expressing security performance of universal secure network coding
J Kurihara, T Uyematsu, R Matsumoto
2012 50th Annual Allerton Conference on Communication, Control, and …, 2012
72012
In-device proxy re-encryption service for information-centric networking access control
K Suksomboon, A Tagami, A Basu, J Kurihara
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 303-306, 2018
62018
Strongly-secure secret sharing based on linear codes can be characterized by generalized Hamming weight
J Kurihara, T Uyematsu
2011 49th Annual Allerton Conference on Communication, Control, and …, 2011
62011
On a construction of stream-cipher-based hash functions
Y Nakano, J Kurihara, S Kiyomoto, T Tanaka
2010 International Conference on Security and Cryptography (SECRYPT), 1-11, 2010
62010
排他的論理和を用いた高速な (4, n) 閾値秘密分散法と (k, n) 閾値法への拡張
栗原淳, 清本晋作, 福島和英, 田中俊昭
電子情報通信学会技術研究報告. ISEC, 情報セキュリティ 107 (44), 23-30, 2007
62007
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20