The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ryôichi Sasaki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Satoru Tezuka, Ryôichi Sasaki, Masanori Kataoka
    Seamless Object Authentication in Different Security Policy Domains. [Citation Graph (0, 0)][DBLP]
    HICSS, 2000, pp:- [Conf]
  2. Ryôichi Sasaki
    Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:90-94 [Conf]
  3. Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh
    Combinatorial Optimization of Countermeasures against Illegal Copying. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:128-144 [Conf]
  4. Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki
    Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:238-248 [Conf]
  5. Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka
    INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:195-207 [Conf]
  6. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
    A Multi-OS Approach to Trusted Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:107-114 [Conf]
  7. Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi
    Secure Fingerprinting Using Public-Key Cryptography (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:83-89 [Conf]
  8. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
    Legally Authorized and Unauthorized Digital Evidence. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:67-73 [Conf]
  9. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
    Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
  10. Tsutomu Nakamura, Nobuyuki Fujikura, Ryôichi Sasaki, Hiroshi Morita, Masat Hayashi, Satoru Nishino, Hiroaki Takahashi, Akio Matsuura
    Development and Performance Evaluation of Point to Multipoint Communication Control Scheme Via Satellite. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 1991, v:12, n:3, pp:169-179 [Journal]
  11. Hiroshi Yajima, Tomohiro Watanabe, Ryoichi Sasaki
    Evaluation of the Participant-Support Method for Information Acquisition in the "Multiplex Risk Communicator". [Citation Graph (0, 0)][DBLP]
    HCI (9), 2007, pp:195-203 [Conf]
  12. Hiroshi Yajima, Shinichi Matsumoto, Ryoichi Sasaki
    Proposal of Risk Communications Supporting Method in Multiplex Risk Communicator. [Citation Graph (0, 0)][DBLP]
    ETFA, 2006, pp:255-260 [Conf]

  13. Development Concept for and Trial Application of a "Mulutiplex Risk Communicator". [Citation Graph (, )][DBLP]


  14. Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail. [Citation Graph (, )][DBLP]


Search in 0.025secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002