|
Search the dblp DataBase
Masakazu Soshi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
Evaluation of Anonymity of Practical Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:13-26 [Conf]
- Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2003, pp:89-103 [Conf]
- Masakazu Soshi, Mamoru Maekawa
A New Authorization Model and its Mechanism Using Service Paths in Open Distributed Environments. [Citation Graph (0, 0)][DBLP] DAIS, 1997, pp:- [Conf]
- Masakazu Soshi
Safety Analysis of the Dynamic-Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:106-121 [Conf]
- Masakazu Soshi, Mamoru Maekawa
The Saga Security System: A Security Architecture for Open Distributed Systems. [Citation Graph (0, 0)][DBLP] FTDCS, 1997, pp:53-58 [Conf]
- Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji
n-State Quantum Coin Flipping Protocol. [Citation Graph (0, 0)][DBLP] ITCC (2), 2005, pp:776-777 [Conf]
- Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
An Agent-Based Model of Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP] WETICE, 2001, pp:177-182 [Conf]
- Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto
The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:190-203 [Journal]
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. [Citation Graph (, )][DBLP]
Mobile Agent Security with Efficient Oblivious Transfer. [Citation Graph (, )][DBLP]
A Secure RFID Authentication Protocol with Low Communication Cost. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|