Остановите войну!
for scientists:
default search action
Maki Yoshida
- > Home > Persons > Maki Yoshida
Publications
- 2019
- [j12]Maki Yoshida, Toru Fujiwara, Marc P. C. Fossorier:
Optimal Uniform Secret Sharing. IEEE Trans. Inf. Theory 65(1): 436-443 (2019) - 2016
- [j9]Maki Yoshida, Toru Fujiwara:
Efficient Usage of Cover Free Families in Broadcast Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1216-1221 (2016) - 2015
- [j8]Maki Yoshida, Kazuya Ohkita, Toru Fujiwara:
Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking. IEICE Trans. Inf. Syst. 98-D(1): 58-64 (2015) - [j7]Maki Yoshida, Toru Fujiwara:
On the Impossibility of d-Multiplicative Non-perfect Secret Sharing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 767-770 (2015) - 2014
- [c16]Hironobu Tozuka, Maki Yoshida, Toru Fujiwara:
Salt-and-pepper image watermarking system for IHC evaluation criteria. IWIHC@AsiaCCS 2014: 31-36 - 2012
- [c15]Maki Yoshida, Toru Fujiwara, Marc P. C. Fossorier:
Optimum General Threshold Secret Sharing. ICITS 2012: 187-204 - [c14]Seigo Ikeda, Maki Yoshida, Toru Fujiwara:
New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy. ISITA 2012: 797-801 - [c13]Itsuki Suzuki, Maki Yoshida, Toru Fujiwara:
Generic Construction of GUC Secure Commitment in the KRK Model. IWSEC 2012: 244-260 - 2011
- [j6]Maki Yoshida, Toru Fujiwara:
Toward Digital Watermarking for Cryptographic Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 270-272 (2011) - 2010
- [j5]Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara:
The Vector Decomposition Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 188-193 (2010) - 2009
- [j4]Maki Yoshida, Toru Fujiwara:
Flexible Timed-Release Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 222-225 (2009) - [c12]Maki Yoshida, Toru Fujiwara:
Watermarking Cryptographic Data. IIH-MSP 2009: 40-43 - [c11]Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara:
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. IWDW 2009: 279-293 - 2008
- [c9]Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara:
Anonymous Fingerprinting for Predelivery of Contents. ICISC 2008: 134-151 - [c8]Maki Yoshida, Toru Fujiwara:
Expiration Dated Fingerprinting. IIH-MSP 2008: 147-150 - 2007
- [j3]Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Toru Fujiwara:
A Private and Consistent Data Retrieval Scheme with Log-Squared Communication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 204-215 (2007) - [j2]Takaaki Fujita, Maki Yoshida, Toru Fujiwara:
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 216-225 (2007) - [c7]Maki Yoshida, Itaru Kitamura, Toru Fujiwara:
A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain. IIH-MSP 2007: 16-19 - [c6]Maki Yoshida, Toru Fujiwara:
Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing. ISIT 2007: 1041-1045 - 2006
- [c5]Maki Yoshida, Takaaki Fujita, Toru Fujiwara:
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. IIH-MSP 2006: 101-104 - [c4]Maki Yoshida, Toru Fujiwara:
On the Security of Tag-KEM for Signcryption. WCAN@ICALP 2006: 83-91 - 2005
- [j1]Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara:
Unlinkable Delivery System for Interactive Dramas. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 262-269 (2005) - [c3]Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara:
A Timed-Release Key Management Scheme for Backward Recovery. ICISC 2005: 3-14 - [c2]Shingo Okamura, Maki Yoshida, Toru Fujiwara:
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. ISSA 2005: 1-12 - 2001
- [c1]Maki Yoshida, Toru Fujiwara:
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. IMACC 2001: 27-37
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-23 23:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint