• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Wang Lihua  王 立華

ORCIDConnect your ORCID iD *help
… Alternative Names

WANG Lihua  王 立華

Less
Researcher Number 00447228
Other IDs
Affiliation (Current) 2025: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所, 主任研究員
Affiliation (based on the past Project Information) *help 2021 – 2023: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所, 主任研究員
2020: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員
2018: 神戸大学, 工学研究科, 特命准教授
2016 – 2017: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員
2015: 国立研究開発法人情報通信研究機構, ネットワークセキュリティ研究所・セキュリティ基盤研究室, 主任研究員
2012 – 2013: 独立行政法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティ基盤研究室, 主任研究員
2011: 独立行政法人情報通信研究機構, ネットワークセキュリティ研究所 セキュリティ基盤研究室, 専攻研究員
Review Section/Research Field
Principal Investigator
Basic Section 60070:Information security-related / Theory of informatics / Fundamental theory of informatics
Keywords
Principal Investigator
準同型暗号 / 秘密計算 / クラウドコンピューティング / エッジコンピューティング / データマイニング / 追加学習 / 機械学習 / 匿名化 / 差分プライバシー / 継続学習 … More / 決定木 / 連合学習 / プライバシー保護 / 安全性帰着方法 / 結託攻撃 / 代理人再暗号 / セキュア計算 / 代理計算 / 暗号 / プライバシー保護データマイニング / 代理再暗号 / クラウドセキュリティ / Threshold KEM / プロキシ暗号 / PRE / IDベース暗号 / 耐量子攻撃 / Threshold PKE / 秘密分散 / 位置情報認証 / 準同型暗号応用 / クラウドストレージ / PRINCESS / プロキシ再暗号 / 非可換暗号 / LWE / Lattice / 暗号系 Less
  • Research Projects

    (3 results)
  • Research Products

    (51 results)
  • Co-Researchers

    (14 People)
  •  R&D of Machine Learning Mechanism for Privacy Preserving Data Mining over Different IndustriesPrincipal Investigator

    • Principal Investigator
      Wang Lihua
    • Project Period (FY)
      2020 – 2023
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      National Institute of Information and Communications Technology
  •  R&D on privacy-preserving outsourced computing in cloud computingPrincipal Investigator

    • Principal Investigator
      Wang Lihua
    • Project Period (FY)
      2015 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Theory of informatics
    • Research Institution
      Kobe University
      National Institute of Information and Communications Technology
  •  R&D of New Cryptographic Technologies with Long-Term UsabilityPrincipal Investigator

    • Principal Investigator
      WANG Lihua
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      National Institute of Information and Communications Technology

All 2024 2023 2022 2020 2019 2018 2017 2016 2014 2013 2012 2011

All Journal Article Presentation Patent

  • [Journal Article] Security Evaluation of Decision Tree Meets Data Anonymization2024

    • Author(s)
      Wakabayashi Ryousuke、Wang Lihua、Nojima Ryo、Waseda Atsushi
    • Journal Title

      Proceedings of the 10th International Conference on Information Systems Security and Privacy

      Volume: ICISSP 2024 Pages: 853-860

    • DOI

      10.5220/0012456600003648

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Journal Article] Frameworks for Privacy-Preserving Federated Learning2024

    • Author(s)
      PHONG Le Trieu、PHUONG Tran Thi、WANG Lihua、OZAWA Seiichi
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E107.D Issue: 1 Pages: 2-12

    • DOI

      10.1587/transinf.2023MUI0001

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2024-01-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Journal Article] Permissioned Blockchain-Based XGBoost for Multi Banks Fraud Detection2023

    • Author(s)
      Asrori Septiviana Savitri、Wang Lihua、Ozawa Seiichi
    • Journal Title

      ICONIP 2022: Neural Information Processing

      Volume: LNCS 13625 Pages: 683-692

    • DOI

      10.1007/978-3-031-30111-7_57

    • ISBN
      9783031301100, 9783031301117
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Journal Article] Differential Private (Random) Decision Tree Without Adding Noise2023

    • Author(s)
      Nojima Ryo、Wang Lihua
    • Journal Title

      Neural Information Processing

      Volume: ICONIP 2023 Pages: 162-174

    • DOI

      10.1007/978-981-99-8138-0_14

    • ISBN
      9789819981373, 9789819981380
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Journal Article] eFL-Boost: Efficient Federated Learning for Gradient Boosting Decision Trees2022

    • Author(s)
      Yamamoto Fuki、Ozawa Seiichi、Wang Lihua
    • Journal Title

      IEEE Access

      Volume: 10 Pages: 43954-43963

    • DOI

      10.1109/access.2022.3169502

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Journal Article] Enhanced Secure Comparison Schemes Using Homomorphic Encryption2020

    • Author(s)
      Wang Lihua、Saha Tushar Kanti、Aono Yoshinori、Koshiba Takeshi、Moriai Shiho
    • Journal Title

      NBiS 2020 -Advances in Networked-Based Information Systems

      Volume: AISC1264 Pages: 211-224

    • DOI

      10.1007/978-3-030-57811-4_20

    • ISBN
      9783030578107, 9783030578114
    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-20K11826, KAKENHI-PROJECT-16H01705
  • [Journal Article] A new secure matrix multiplication from ring-LWE2018

    • Author(s)
      Lihua Wang, Yoshinori Aono, Le Trieu Phong
    • Journal Title

      CANS2017-16th International Conference on Cryptology And Network Security

      Volume: -

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Journal Article] Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios2018

    • Author(s)
      Li Jing、Wang Licheng、Wang Lihua、Wang Xianmin、Huang Zhengan、Li Jin
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: June Issue: 22

    • DOI

      10.1002/cpe.4523

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Journal Article] Verifiable Chebyshev Maps-Based Encryption Schemes with Outsourcing Computations in the Cloud/Fog Scenarios2018

    • Author(s)
      Jing Li, Licheng Wang, Lihua Wang, Zhengan Huang, Jin Li
    • Journal Title

      J. Concurrency and Computation: Practice and Experience

      Volume: -

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Journal Article] Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption2018

    • Author(s)
      Kim Sangwook、Omori Masahiro、Hayashi Takuya、Omori Toshiaki、Wang Lihua、Ozawa Seiichi
    • Journal Title

      ICONIP 2018- 25th International Conference on Neural Information Processing

      Volume: LNCS11304 Pages: 349-358

    • DOI

      10.1007/978-3-030-04212-7_30

    • ISBN
      9783030042110, 9783030042127
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-15K00028, KAKENHI-PROJECT-16H02874
  • [Journal Article] A New Secure Matrix Multiplication from Ring-LWE2018

    • Author(s)
      Wang Lihua、Aono Yoshinori、Phong Le Trieu
    • Journal Title

      CANS2017-16th International Conference on Cryptology And Network Security

      Volume: LNCS 11261 Pages: 93-111

    • DOI

      10.1007/978-3-030-02641-7_5

    • ISBN
      9783030026400, 9783030026417
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Journal Article] Securing Named Data Networking: Attribute-Based Encryption and Beyond2018

    • Author(s)
      Wang Licheng、Zhang Zonghua、Dong Mianxiong、Wang Lihua、Cao Zhenfu、Yang Yixian
    • Journal Title

      IEEE Communications Magazine

      Volume: 56 Issue: 11 Pages: 76-81

    • DOI

      10.1109/mcom.2018.1701123

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16K00117, KAKENHI-PROJECT-15K00028
  • [Journal Article] A Generic yet Efficient Method for Secure Inner Product2017

    • Author(s)
      Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong
    • Journal Title

      Proceedings of NSS2017- 11th International Conference on Network and System Security, Springer International Publishing

      Volume: LNCS 10394 Pages: 217-232

    • DOI

      10.1007/978-3-319-64701-2_16

    • ISBN
      9783319647005, 9783319647012
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Journal Article] Efficient Lattice-Based Signcryption in Standard Model2013

    • Author(s)
      Jianhua Yan, Licheng Wang, Lihua Wang, Yixian Yang, Wenbin Yao
    • Journal Title

      Mathematical Problems in Engineering

      Volume: 2013 Pages: 1-18

    • DOI

      10.1155/2013/702539

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang
    • Journal Title

      INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS

      Volume: - Issue: 2 Pages: 902462-902462

    • DOI

      10.1155/2013/902462

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Key-Private Proxy Re-encryption under LWE2013

    • Author(s)
      Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang
    • Journal Title

      INDOCRYPT 2013

      Volume: 8250 Pages: 1-18

    • DOI

      10.1007/978-3-319-03515-4_1

    • ISBN
      9783319035147, 9783319035154
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups2013

    • Author(s)
      Ping Pan, Licheng Wang, Yixian Yang, Yuanju Gan, Lihua Wang, and Chengqian Xu
    • Journal Title

      Fundamenta Informaticae

      Volume: 126 Issue: 1 Pages: 103-119

    • DOI

      10.3233/fi-2013-873

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨,王 立華,市川 隆一,岩間 司,小山 泰弘
    • Journal Title

      IEICE

      Volume: Vol.J96-D, No.8 Pages: 1913-1924

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie–Hellman Assumption2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang
    • Journal Title

      THE COMPUTER JOURNAL

      Volume: - Issue: 10 Pages: 1249-1257

    • DOI

      10.1093/comjnl/bxs167

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Efficient Threshold PKE with Full Security Based on Dual Pairing Vector Spaces2013

    • Author(s)
      Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, and Yixian Yang
    • Journal Title

      International Journal of Communication Systems

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Certificate-based proxy decryption systems with revocability in the standard model2013

    • Author(s)
      Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, and Licheng Wang
    • Journal Title

      Information Sciences

      Volume: Vol.247 Pages: 188-201

    • DOI

      10.1016/j.ins.2013.06.026

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中秀磨, 王立華, 市川隆一, 岩間司, 小山泰弘
    • Journal Title

      電子情報通信学会誌

      Volume: Vol.J96-D,No.8

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨, 王 立華, 市川 隆一, 岩間 司, 小山 泰弘
    • Journal Title

      IEICE

      Volume: J96-D(8) Pages: 1913-1924

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] CSP-DHIES: a new public-key encryption scheme from matrix conjugation2012

    • Author(s)
      Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang
    • Journal Title

      Security and Communication Networks

      Volume: Volume 5, Issue 7, Issue: 7 Pages: 809-822

    • DOI

      10.1002/sec.376

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities2012

    • Author(s)
      Lihua Wang, Licheng Wang, Masahiro Mambo, and Eiji Okamoto
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E95-A Issue: 1 Pages: 70-88

    • DOI

      10.1587/transfun.E95.A.70

    • NAID

      10030534516

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Patent] 特許権2017

    • Inventor(s)
      王 立華, 青野 良範, レ チュウ フォン
    • Industrial Property Rights Holder
      NICT
    • Industrial Property Rights Type
      特許
    • Filing Date
      2017
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] 決定木へのk-匿名性とl-多様性の適用2024

    • Author(s)
      伊藤 優策,王 立華,野島 良,早稲田 篤志
    • Organizer
      2024年暗号と情報セキュリティシンポジウム(SCIS2024)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 敵対的生成ネットワークを用いた水平型連合学習における欠損データ補完2024

    • Author(s)
      松並 駿, 王 立華, 井上 広明, 小澤 誠一
    • Organizer
      第68回 システム制御情報学会 研究発表講演会(SCI'24)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 継続学習型連合学習モデルにおける効率的なリプレイデータの選択2024

    • Author(s)
      北野 優斗,王 立華,小澤 誠一
    • Organizer
      IEICE Technical Report, ISEC2023-95 (2024-03)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] AIにおけるプライバシー保護を強化した連合学習2024

    • Author(s)
      王 立華
    • Organizer
      2023年度 第5回EMM研究会
    • Invited
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 匿名化において差分プライバシーは十分に安全な指標になっているか?2023

    • Author(s)
      野島 良, 王 立華,菊池 浩明
    • Organizer
      コンピュータセキュリティシンポジウム2023 (CSS2023)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] BFL-Boost: Blockchain-based Federated Learning for Gradient Boosting to Enhance Security in Model Training2023

    • Author(s)
      Asrori Septiviana Savitri、Wang Lihua、Ozawa Seiichi
    • Organizer
      2023年暗号と情報セキュリティシンポジウム(SCIS 2023)、1D2-2(Jan. 2023)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 決定木と(k-)匿名化の関係について2023

    • Author(s)
      若林 亮輔、王 立華、野島 良、早稲田 篤志
    • Organizer
      2023年暗号と情報セキュリティシンポジウム(SCIS 2023)、1B1-4(Jan. 2023)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 動的サンプリングを使用した勾配ブースティング決定木の連合追加学習2022

    • Author(s)
      三浦 啓吾、王 立華、小澤 誠一
    • Organizer
      2022年暗号と情報セキュリティシンポジウム(SCIS2022)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 動的サンプリングを使用した勾配ブースティング決定木の連合追加学習2022

    • Author(s)
      三浦 啓吾、井上 広明、金 相旭、王 立華、小澤 誠一
    • Organizer
      第30回インテリジェント・システム・シンポジウム(FAN 2022)、pp.235-239(Sept. 2022)
    • Data Source
      KAKENHI-PROJECT-20K11826
  • [Presentation] 三層ニューラルネットワークにおけるRing-LWEベース準同型暗号を用いた効率的なプライバシー保護推論処理2019

    • Author(s)
      手塚 雄大, 王 立華, 林 卓也, Kim Sangwook, 為井 智也, 大森 敏明, 小澤 誠一
    • Organizer
      人工知能学会全国大会JSAI2019
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] An Efficiently Secure Comparison Scheme Using Homomorphic Encryption2019

    • Author(s)
      Wang Lihua、Hayashi Takuya、Saha Tushar Kanti、Aono Yoshinori、Koshiba Takeshi、Moriai Shiho
    • Organizer
      2019年暗号と情報セキュリティシンポジウム(SCIS2019)
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] Ring-LWEを用いたセキュアな行列乗算のためのパッキング方法2018

    • Author(s)
      王 立華, プラディイプ クマル ミシュラ, 青野 良範, レ チュウ フォン, 安田 雅哉
    • Organizer
      2018年暗号と情報セキュリティシンポジウム(SCIS2018)
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] Ring-LWEを用いたセキュアな行列乗算のためのパッキング方法,2018

    • Author(s)
      王 立華, プラディイプ クマル ミシュラ, 青野 良範, レ チュウ フォン, 安田 雅哉
    • Organizer
      SCIS2018 暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] 効率的な準同型内積演算の一般的構成2017

    • Author(s)
      林 卓也、青野 良範、レ チュウ フォン、王 立華
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市西3-2-1)
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] New Reflection on Delegatable Computation for a Secure Cloud Storage and Data Mining with Privacy-Protection2016

    • Author(s)
      Lihua Wang
    • Organizer
      A3 Foresight Program: Annual Workshop in Korea
    • Place of Presentation
      Holiday Inn Resort Alpensia Pyeongchang (325 Solbong-ro Daegwallyeong-myon, Pyeongchang-gun, Gangwon-do, Korea)
    • Year and Date
      2016-07-10
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] A Study on the Security Evaluation Methods of Proxy Re-Encryption Applied to Cloud Environments2016

    • Author(s)
      Lihua Wang, Licheng Wang, Masahiro Mambo
    • Organizer
      SCIS2016暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本県熊本市中央区東阿弥陀寺町2番地)
    • Year and Date
      2016-01-19
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] New Reflection on Classification & Security Reduction of Proxy Re-Encryption Applied to Cloud Environments2016

    • Author(s)
      Lihua Wang
    • Organizer
      日中韓フォーサイト事業A3 annual workshop
    • Place of Presentation
      沖縄県市町村自治会館 (沖縄県那覇市旭町116-37)
    • Year and Date
      2016-02-17
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00028
  • [Presentation] PRINCESS : プロキシ再暗号化技術を活用したセキュアなストレージシステム2014

    • Author(s)
      王 立華, 早稲田 篤志, 野島 良, 盛合 志帆
    • Organizer
      2014年暗号と情報セキュリティシンポジウム SCIS2014
    • Place of Presentation
      鹿児島県鹿児島市城山観光ホテル
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] PRINCESS:プロキシ再暗号化技術を活用したセキュアなストレージシステム2014

    • Author(s)
      王 立華, 早稲田 篤志, 野島 良, 盛合 志帆
    • Organizer
      2014年暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      鹿児島県鹿児島市城山観光ホテル
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] A CCA Secure Threshold KEM Scheme2012

    • Author(s)
      Yuanju Gan, Lihua Wang, Ping Pan, Licheng Wang, and Yixian Yang
    • Organizer
      2012年暗号と情報セキュリティシンポジウム(SCIS2012)
    • Place of Presentation
      石川県金沢エクセルホテル東急
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] A CCA Secure Threshold KEM Scheme2012

    • Author(s)
      Yuanju Gan, Lihua Wang, Ping Pan, Licheng Wang, and Yixian Yang
    • Organizer
      2012年暗号と情報セキュリティシンポジウム SCIS2012
    • Place of Presentation
      石川県金沢市金沢エクセルホテル東急
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] Study on CSP-based Cryptography2012

    • Author(s)
      王 立華
    • Organizer
      代数系および計算機科学基礎研究集会
    • Place of Presentation
      京都府京都市京都大学数理解析研究所
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] Study on CSP-based Cryptography2012

    • Author(s)
      王 立華
    • Organizer
      代数系および計算機科学基礎研究集会
    • Place of Presentation
      京都府京都大学数理解析研究所
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウム(SITA2011)
    • Place of Presentation
      岩手県ホテル森の風鶯宿
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウムSITA2011
    • Place of Presentation
      岩手県岩手郡鶯宿ホテル森の風鶯宿
    • Data Source
      KAKENHI-PROJECT-23500031
  • 1.  MAMBO Masahiro (60251972)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 2 results
  • 2.  AONO Yoshinori (50611125)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 8 results
  • 3.  LE Trieu Phong (40583191)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 4 results
  • 4.  WANG Licheng
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 20 results
  • 5.  TANAKA Hidema (30328570)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 5 results
  • 6.  WASEDA Atsushi (10455454)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 7.  NOJIMA Ryo (40446597)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 8.  MORIAI Shiho (80636192)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 9.  林 卓也 (70739995)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 10.  小澤 誠一 (70214129)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 7 results
  • 11.  CAO Zhenfu
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 12.  SHAO Jun
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 13.  BOYEN Xavier
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 14.  董 冕雄
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi