Kazuo Takaragi

According to our database1, Kazuo Takaragi authored at least 17 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2019
Competitive Compliance with Blockchain.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

2018
Privacy-Enhancing Trust Infrastructure for Process Mining.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2010
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2007
Verifying a signature architecture: a comparative case study.
Formal Aspects Comput., 2007

2006
Generalized Powering Functions and Their Application to Digital Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Verification of a Signature Architecture with HOL-Z.
Proceedings of the FM 2005: Formal Methods, 2005

2004
A New Keystream Generator MUGI.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
A Formal Analysis of a Digital Signature Architecture.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

2002
Integrity-Aware Mode of Stream Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Legally Authorized and Unauthorized Digital Evidence.
Proceedings of the Security Protocols, 2002

2001
An Ultra Small Individual Recognition Security Chip.
IEEE Micro, 2001

A Multi-OS Approach to Trusted Computer Systems.
Proceedings of the Security Protocols, 2001

1998
Secure Fingerprinting Using Public-Key Cryptography (Position Paper).
Proceedings of the Security Protocols, 1998

1990
A Method for Rapid RSA Key Generation.
Syst. Comput. Jpn., 1990


  Loading...