|
Search the dblp DataBase
Masahiro Mambo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hiroshi Doi, Masahiro Mambo, Eiji Okamoto
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:352-367 [Conf]
- Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:145-158 [Conf]
- Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai
Protection of Data and Delegated Keys in Digital Distribution. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:271-282 [Conf]
- Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo
A User Identification System Using Signature Written with Mouse. [Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:403-414 [Conf]
- Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1996, pp:322-333 [Conf]
- Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro
Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:363- [Conf]
- Masahiro Mambo, Keisuke Usuda, Eiji Okamoto
Proxy Signatures for Delegating Signing Operation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:48-57 [Conf]
- Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:227-243 [Conf]
- Masahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka
Simple and Secure Mobile Access under the Flexible Organization Management. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:456-462 [Conf]
- Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo
Proposal of user identification scheme using mouse. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:144-148 [Conf]
- Shigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo
Improvement of Secure Access Control Agent for Distributed Files. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:185-0 [Conf]
- Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:114-127 [Conf]
- Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya
Spending Offline Divisible Coins with Combining Capability. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:339-353 [Conf]
- Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park
On the Difficulty of Key Recovery Systems. [Citation Graph (0, 0)][DBLP] ISW, 1999, pp:207-224 [Conf]
- Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:82-96 [Conf]
- Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo
The Application of ID-Based Key Distribution Systems to an Elliptic Curve. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:335-344 [Conf]
- Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji
A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:466-483 [Conf]
- Masahiro Mambo, Hiroki Shizuya
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:258-262 [Conf]
- Sk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] SAINT, 2006, pp:300-306 [Conf]
- Chisato Konoma, Masahiro Mambo, Hiroki Shizuya
The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:81-88 [Journal]
- Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] ICUCT, 2006, pp:140-149 [Conf]
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|