The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuji Watanabe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuji Watanabe, Hideki Imai
    Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:80-86 [Conf]
  2. Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:392-407 [Conf]
  3. Yuji Watanabe, Masayuki Numao
    Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:85-99 [Conf]
  4. Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
    Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:65-80 [Conf]
  5. Akio Ishiguro, Yuji Watanabe, Toshiyuki Kondo, Yoshiki Uchikawa
    Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot. [Citation Graph (0, 0)][DBLP]
    International Conference on Evolutionary Computation, 1996, pp:82-87 [Conf]
  6. Yuji Watanabe, Hideki Imai
    Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:118-135 [Conf]
  7. Yuji Watanabe, Masayuki Numao
    Conditional Cryptographic Delegation for P2P Data Sharing. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:309-321 [Conf]
  8. Yuji Watanabe, Yoshiteru Ishida
    Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:503-510 [Conf]
  9. Yuji Watanabe, Yoshiteru Ishida
    Migration Strategies of Immunity-Based Diagnostic Nodes for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:131-138 [Conf]
  10. Yuji Watanabe, Shigeyuki Sato, Yoshiteru Ishida
    An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:504-510 [Conf]
  11. Yuji Watanabe, Shigeyuki Sato, Yoshiteru Ishida
    Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:72-78 [Conf]
  12. Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:225-239 [Conf]
  13. Yuji Watanabe, Hideki Imai
    Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:290-305 [Conf]
  14. Akio Ishiguro, Toshiyuki Kondo, Yuji Watanabe, Yoshiki Uchikawa
    Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots. [Citation Graph (0, 0)][DBLP]
    PPSN, 1996, pp:666-675 [Conf]
  15. Yuji Watanabe, Yoshiteru Ishida
    Distributed credibility evaluation of an information gathering mobile agent system. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2003, v:34, n:8, pp:10-19 [Journal]
  16. Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi
    Dynamic Information Flow Control Architecture for Web Applications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:267-282 [Conf]
  17. Christine Robson, Yuji Watanabe, Masayuki Numao
    Parts Traceability for Manufacturers. [Citation Graph (0, 0)][DBLP]
    ICDE, 2007, pp:1212-1221 [Conf]
  18. Yuji Watanabe, Yoshiteru Ishida
    Performance Evaluation of Immunity-Based Diagnosis on Complex Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:846-853 [Conf]
  19. Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo
    Chinese-wall process confinement for practical distributed coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:225-234 [Conf]

  20. A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. [Citation Graph (, )][DBLP]


  21. Layering negotiations for flexible attestation. [Citation Graph (, )][DBLP]


  22. Checking assignments of controls to risks for internal control. [Citation Graph (, )][DBLP]


  23. Emergent construction of a behavior arbitration mechanism based on the immune system. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002