The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hajime Watanabe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:154-162 [Conf]
  2. Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
    Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:348-359 [Conf]
  3. Hajime Watanabe, Takashi Kitagawa
    An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:173-183 [Conf]
  4. Hajime Watanabe, Tadao Kasami
    A secure code for recipient watermarking against conspiracy attacks by all users. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:414-423 [Conf]
  5. Madoka Hasegawa, Hajime Watanabe, Takashi Yamada, Shigeo Kato
    Watermarking method for extracting embedded data without original image. [Citation Graph (0, 0)][DBLP]
    VCIP, 2002, pp:915-922 [Conf]
  6. Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe
    A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:143-153 [Conf]
  7. Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  8. An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. [Citation Graph (, )][DBLP]


  9. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. [Citation Graph (, )][DBLP]


  10. Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP]


  11. PAKE-based mutual HTTP authentication for preventing phishing attacks. [Citation Graph (, )][DBLP]


  12. PAKE-based mutual HTTP authentication for preventing phishing attacks [Citation Graph (, )][DBLP]


  13. An improvement of discrete Tardos fingerprinting codes. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002