The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Koutarou Suzuki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:415-432 [Conf]
  2. Makoto Yokoo, Koutarou Suzuki
    Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2002, pp:112-119 [Conf]
  3. Makoto Yokoo, Koutarou Suzuki, Katsutoshi Hirayama
    Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information. [Citation Graph (0, 0)][DBLP]
    CP, 2002, pp:387-401 [Conf]
  4. Makoto Yokoo, Koutarou Suzuki
    Secure Generalized Vickrey Auction without Third-party Servers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:132-146 [Conf]
  5. Koutarou Suzuki, Makoto Yokoo
    Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:44-56 [Conf]
  6. Koutarou Suzuki, Makoto Yokoo
    Secure Generalized Vickrey Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:239-249 [Conf]
  7. Koutarou Suzuki, Makoto Yokoo
    Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:333-335 [Conf]
  8. Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita
    Efficient Sealed-Bid Auction Using Hash Chain. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:183-191 [Conf]
  9. Masayuki Abe, Koutarou Suzuki
    Receipt-Free Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:191-199 [Conf]
  10. Masayuki Abe, Koutarou Suzuki
    M+1-st Price Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:115-124 [Conf]
  11. Koutarou Suzuki, Makoto Yokoo
    Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:306-317 [Conf]
  12. Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama
    Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:328-342 [Conf]
  13. Makoto Yokoo, Koutarou Suzuki, Katsutoshi Hirayama
    Secure distributed constraint satisfaction: reaching agreement without revealing private information. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2005, v:161, n:1-2, pp:229-245 [Journal]
  14. Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita
    RFID privacy issues and technical challenges. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:9, pp:66-71 [Journal]
  15. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:131-140 [Journal]
  16. Makoto Yokoo, Koutarou Suzuki
    Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:255-261 [Journal]
  17. Eiichiro Fujisaki, Koutarou Suzuki
    Traceable Ring Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:181-200 [Conf]

  18. Relinkable Ring Signature. [Citation Graph (, )][DBLP]


  19. Secure Keyword Auction: Preserving Privacy of Bidding Prices and CTRs. [Citation Graph (, )][DBLP]


  20. Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. [Citation Graph (, )][DBLP]


  21. Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. [Citation Graph (, )][DBLP]


Search in 0.049secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002