Yukio Tsuruoka

According to our database1, Yukio Tsuruoka authored at least 10 papers between 1990 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Cloud Computing - Current Status and Future Directions.
J. Inf. Process., 2016

2014
Architecture for Offloading Processes of Web Applications Based on Standardized Web Technologies.
IEICE Trans. Commun., 2014

2013
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Three-Factor User Authentication Method Using Biometrics Challenge Response.
Proceedings of the Financial Cryptography and Data Security, 2013

2007
Certificate-less user authentication with consent.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

2006
Trusted-link: web-link enhancement for integrity and trustworthiness.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

1999
Modulus Search for Elliptic Curve Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

1997
On searching for solutions of the Diophantine equation x<sup>3</sup> + y<sup>3</sup> + z<sup>3</sup> = n.
Math. Comput., 1997

1992
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method.
Proceedings of the Advances in Cryptology, 1992

1990
Proposal and Evaluation of Dynamic Object-Oriented Programming.
Syst. Comput. Jpn., 1990


  Loading...