The SCEAS System
Navigation Menu

Search the dblp DataBase


Kazue Sako: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Isamu Teranishi, Jun Furukawa, Kazue Sako
    k-Times Anonymous Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:308-322 [Conf]
  2. Kazue Sako
    Implementation of a Digital Lottery Server on WWW. [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:101-108 [Conf]
  3. Jun Furukawa, Kazue Sako
    An Efficient Scheme for Proving a Shuffle. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:368-387 [Conf]
  4. Kazue Sako, Joe Kilian
    Secure Voting Using Partially Compatible Homomorphisms. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:411-424 [Conf]
  5. Toshiyuki Isshiki, Kengo Mori, Kazue Sako, Isamu Teranishi, Shoko Yonezawa
    Using group signatures for identity management and its implementation. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2006, pp:73-78 [Conf]
  6. Martin Hirt, Kazue Sako
    Efficient Receipt-Free Voting Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:539-556 [Conf]
  7. Markus Jakobsson, Kazue Sako, Russell Impagliazzo
    Designated Verifier Proofs and Their Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:143-154 [Conf]
  8. Kazue Sako, Joe Kilian
    Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:393-403 [Conf]
  9. Jun Furukawa, Hiroshi Miyauchi, Kengo Mori, Satoshi Obana, Kazue Sako
    An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:16-30 [Conf]
  10. Jun Furukawa, Kazue Sako
    An Efficient Publicly Verifiable Mix-Net for Long Inputs. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:111-125 [Conf]
  11. Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani
    Fault tolerant anonymous channel. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:440-444 [Conf]
  12. Kazue Sako
    An Auction Protocol Which Hides Bids of Losers. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:422-432 [Conf]
  13. Isamu Teranishi, Kazue Sako
    k-Times Anonymous Authentication with a Constant Proving Cost. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:525-542 [Conf]

  14. IC card-based single sign-on system that remains secure under card analysis. [Citation Graph (, )][DBLP]

  15. RLCPS Preface. [Citation Graph (, )][DBLP]

  16. An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002