The SCEAS System
Navigation Menu

Search the dblp DataBase


Kanta Matsuura: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
    Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:183-192 [Conf]
  2. Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
    Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:348-359 [Conf]
  3. Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura
    Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:395-406 [Conf]
  4. Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo
    An Analysis of Detailed Electronic Time-Stamping Using Digital TV. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:277-284 [Conf]
  5. Kanta Matsuura
    Robustness of Entrusted Data-Analysis in e-Science Research Collaboration. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:373-378 [Conf]
  6. Jose Luis Lacson, Kanta Matsuura
    The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas. [Citation Graph (0, 0)][DBLP]
    EGOV, 2004, pp:547-548 [Conf]
  7. Manabu Ando, Kanta Matsuura, Michiharu Kudo, Akira Baba
    An Architecture of a Secure Database for Networked Collaborative Activities. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2003, pp:3-10 [Conf]
  8. Kanta Matsuura, Hideki Imai
    Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2002, pp:962-967 [Conf]
  9. Shouichi Hirose, Kanta Matsuura
    Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:169-182 [Conf]
  10. Kanta Matsuura
    A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:90-94 [Conf]
  11. Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
    An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:48-62 [Conf]
  12. Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
    Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    LATIN, 2006, pp:130-141 [Conf]
  13. Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki
    Towards Modeling Wireless Location Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:59-77 [Conf]
  14. Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki
    Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:165-180 [Conf]
  15. Kanta Matsuura, Yuliang Zheng, Hideki Imai
    Compact and Flexible Resolution of CBT Multicast Key-Distribution. [Citation Graph (0, 0)][DBLP]
    WWCA, 1998, pp:190-205 [Conf]
  16. Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:366-384 [Conf]
  17. Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A Practical Provider Authentication System for Bidirectional Broadcast Service. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:967-974 [Conf]
  18. Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai
    Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:984-991 [Conf]
  19. Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:68-84 [Conf]

  20. Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. [Citation Graph (, )][DBLP]

  21. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. [Citation Graph (, )][DBLP]

  22. Fingerprinting Attack on the Tor Anonymity System. [Citation Graph (, )][DBLP]

  23. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP]

  24. Efficient Constructions of Signcryption Schemes and Signcryption Composability. [Citation Graph (, )][DBLP]

  25. An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. [Citation Graph (, )][DBLP]

  26. Generic Construction of Stateful Identity Based Encryption. [Citation Graph (, )][DBLP]

  27. A Generic Construction of Timed-Release Encryption with Pre-open Capability. [Citation Graph (, )][DBLP]

  28. Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. [Citation Graph (, )][DBLP]

  29. Proxy Signatures Secure Against Proxy Key Exposure. [Citation Graph (, )][DBLP]

  30. Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002