The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Satoshi Hada: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Satoshi Hada
    Zero-Knowledge and Code Obfuscation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:443-457 [Conf]
  2. Michiharu Kudo, Satoshi Hada
    XML document security based on provisional authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:87-96 [Conf]
  3. Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    XML access control using static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:73-84 [Conf]
  4. Satoshi Hada, Toshiaki Tanaka
    On the Existence of 3-Round Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:408-423 [Conf]
  5. Satoshi Hada, Kouichi Sakurai
    Ciphertext-Auditable Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:308-321 [Conf]
  6. Satoshi Hada, Toshiaki Tanaka
    A Relationship between One-Wayness and Correlation Intractability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:82-96 [Conf]
  7. Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
    E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:103-109 [Conf]
  8. Satoshi Hada
    A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:2-9 [Journal]
  9. Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    XML access control using static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:292-324 [Journal]
  10. Satoshi Hada, Kouichi Sakurai
    A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:1-12 [Conf]

  11. Secure Obfuscation for Encrypted Signatures. [Citation Graph (, )][DBLP]


  12. Static vs. Dynamic Validation of BSP Conformance. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002