Search the dblp DataBase
Kazue Sako :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Isamu Teranishi , Jun Furukawa , Kazue Sako k-Times Anonymous Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:308-322 [Conf ] Kazue Sako Implementation of a Digital Lottery Server on WWW. [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:101-108 [Conf ] Jun Furukawa , Kazue Sako An Efficient Scheme for Proving a Shuffle. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:368-387 [Conf ] Kazue Sako , Joe Kilian Secure Voting Using Partially Compatible Homomorphisms. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:411-424 [Conf ] Toshiyuki Isshiki , Kengo Mori , Kazue Sako , Isamu Teranishi , Shoko Yonezawa Using group signatures for identity management and its implementation. [Citation Graph (0, 0)][DBLP ] Digital Identity Management, 2006, pp:73-78 [Conf ] Martin Hirt , Kazue Sako Efficient Receipt-Free Voting Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:539-556 [Conf ] Markus Jakobsson , Kazue Sako , Russell Impagliazzo Designated Verifier Proofs and Their Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:143-154 [Conf ] Kazue Sako , Joe Kilian Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:393-403 [Conf ] Jun Furukawa , Hiroshi Miyauchi , Kengo Mori , Satoshi Obana , Kazue Sako An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:16-30 [Conf ] Jun Furukawa , Kazue Sako An Efficient Publicly Verifiable Mix-Net for Long Inputs. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:111-125 [Conf ] Wakaha Ogata , Kaoru Kurosawa , Kazue Sako , Kazunori Takatani Fault tolerant anonymous channel. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:440-444 [Conf ] Kazue Sako An Auction Protocol Which Hides Bids of Losers. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:422-432 [Conf ] Isamu Teranishi , Kazue Sako k -Times Anonymous Authentication with a Constant Proving Cost. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:525-542 [Conf ] IC card-based single sign-on system that remains secure under card analysis. [Citation Graph (, )][DBLP ] RLCPS Preface. [Citation Graph (, )][DBLP ] An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs