|
Search the dblp DataBase
Koutarou Suzuki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:415-432 [Conf]
- Makoto Yokoo, Koutarou Suzuki
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. [Citation Graph (0, 0)][DBLP] AAMAS, 2002, pp:112-119 [Conf]
- Makoto Yokoo, Koutarou Suzuki, Katsutoshi Hirayama
Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information. [Citation Graph (0, 0)][DBLP] CP, 2002, pp:387-401 [Conf]
- Makoto Yokoo, Koutarou Suzuki
Secure Generalized Vickrey Auction without Third-party Servers. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2004, pp:132-146 [Conf]
- Koutarou Suzuki, Makoto Yokoo
Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:44-56 [Conf]
- Koutarou Suzuki, Makoto Yokoo
Secure Generalized Vickrey Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2003, pp:239-249 [Conf]
- Koutarou Suzuki, Makoto Yokoo
Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:333-335 [Conf]
- Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita
Efficient Sealed-Bid Auction Using Hash Chain. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:183-191 [Conf]
- Masayuki Abe, Koutarou Suzuki
Receipt-Free Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:191-199 [Conf]
- Masayuki Abe, Koutarou Suzuki
M+1-st Price Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:115-124 [Conf]
- Koutarou Suzuki, Makoto Yokoo
Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:306-317 [Conf]
- Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:328-342 [Conf]
- Makoto Yokoo, Koutarou Suzuki, Katsutoshi Hirayama
Secure distributed constraint satisfaction: reaching agreement without revealing private information. [Citation Graph (0, 0)][DBLP] Artif. Intell., 2005, v:161, n:1-2, pp:229-245 [Journal]
- Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita
RFID privacy issues and technical challenges. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:9, pp:66-71 [Journal]
- Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:131-140 [Journal]
- Makoto Yokoo, Koutarou Suzuki
Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:255-261 [Journal]
- Eiichiro Fujisaki, Koutarou Suzuki
Traceable Ring Signature. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:181-200 [Conf]
Relinkable Ring Signature. [Citation Graph (, )][DBLP]
Secure Keyword Auction: Preserving Privacy of Bidding Prices and CTRs. [Citation Graph (, )][DBLP]
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. [Citation Graph (, )][DBLP]
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|