The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kazuto Ogawa: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai
    Separating Encryption and Key Issuance in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:365-376 [Conf]
  2. Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai
    Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:123-135 [Conf]
  3. Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura
    Flexible License Transfer System Using Mobile Terminal. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:397-404 [Conf]
  4. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai
    Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal]
  5. Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
    Anonymous Authentication Scheme for Subscription Services. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:975-983 [Conf]
  6. Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai
    Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:984-991 [Conf]

  7. An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. [Citation Graph (, )][DBLP]


  8. An Efficient Strong Key-Insulated Signature Scheme and Its Application. [Citation Graph (, )][DBLP]


  9. Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP]


  10. Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP]


  11. Anonymous Prepaid Content Viewing System with Mobile Terminal. [Citation Graph (, )][DBLP]


  12. On the Theoretical Gap between Group Signatures with and without Unlinkability. [Citation Graph (, )][DBLP]


  13. A Secure Traitor Tracing Scheme against Key Exposure [Citation Graph (, )][DBLP]


  14. An improvement of discrete Tardos fingerprinting codes. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002