The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Masahiro Mambo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hiroshi Doi, Masahiro Mambo, Eiji Okamoto
    On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:352-367 [Conf]
  2. Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe
    Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:145-158 [Conf]
  3. Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai
    Protection of Data and Delegated Keys in Digital Distribution. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:271-282 [Conf]
  4. Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo
    A User Identification System Using Signature Written with Mouse. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:403-414 [Conf]
  5. Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto
    How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:322-333 [Conf]
  6. Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro
    Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:363- [Conf]
  7. Masahiro Mambo, Keisuke Usuda, Eiji Okamoto
    Proxy Signatures for Delegating Signing Operation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:48-57 [Conf]
  8. Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
    Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:227-243 [Conf]
  9. Masahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka
    Simple and Secure Mobile Access under the Flexible Organization Management. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:456-462 [Conf]
  10. Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo
    Proposal of user identification scheme using mouse. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:144-148 [Conf]
  11. Shigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo
    Improvement of Secure Access Control Agent for Distributed Files. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:185-0 [Conf]
  12. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  13. Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya
    Spending Offline Divisible Coins with Combining Capability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:339-353 [Conf]
  14. Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park
    On the Difficulty of Key Recovery Systems. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:207-224 [Conf]
  15. Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya
    An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:82-96 [Conf]
  16. Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo
    The Application of ID-Based Key Distribution Systems to an Elliptic Curve. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:335-344 [Conf]
  17. Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji
    A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:466-483 [Conf]
  18. Masahiro Mambo, Hiroki Shizuya
    A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:258-262 [Conf]
  19. Sk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto
    An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2006, pp:300-306 [Conf]
  20. Chisato Konoma, Masahiro Mambo, Hiroki Shizuya
    The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:81-88 [Journal]
  21. Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
    Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICUCT, 2006, pp:140-149 [Conf]

  22. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002