Search the dblp DataBase
Yuji Watanabe :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yuji Watanabe , Hideki Imai Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:80-86 [Conf ] Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:392-407 [Conf ] Yuji Watanabe , Masayuki Numao Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:85-99 [Conf ] Yuji Watanabe , Sachiko Yoshihama , Takuya Mishina , Michiharu Kudo , Hiroshi Maruyama Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:65-80 [Conf ] Akio Ishiguro , Yuji Watanabe , Toshiyuki Kondo , Yoshiki Uchikawa Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot. [Citation Graph (0, 0)][DBLP ] International Conference on Evolutionary Computation, 1996, pp:82-87 [Conf ] Yuji Watanabe , Hideki Imai Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:118-135 [Conf ] Yuji Watanabe , Masayuki Numao Conditional Cryptographic Delegation for P2P Data Sharing. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:309-321 [Conf ] Yuji Watanabe , Yoshiteru Ishida Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] KES, 2003, pp:503-510 [Conf ] Yuji Watanabe , Yoshiteru Ishida Migration Strategies of Immunity-Based Diagnostic Nodes for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP ] KES (2), 2006, pp:131-138 [Conf ] Yuji Watanabe , Shigeyuki Sato , Yoshiteru Ishida An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents. [Citation Graph (0, 0)][DBLP ] KES, 2004, pp:504-510 [Conf ] Yuji Watanabe , Shigeyuki Sato , Yoshiteru Ishida Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:72-78 [Conf ] Hirotaka Komaki , Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:225-239 [Conf ] Yuji Watanabe , Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:290-305 [Conf ] Akio Ishiguro , Toshiyuki Kondo , Yuji Watanabe , Yoshiki Uchikawa Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots. [Citation Graph (0, 0)][DBLP ] PPSN, 1996, pp:666-675 [Conf ] Yuji Watanabe , Yoshiteru Ishida Distributed credibility evaluation of an information gathering mobile agent system. [Citation Graph (0, 0)][DBLP ] Systems and Computers in Japan, 2003, v:34, n:8, pp:10-19 [Journal ] Sachiko Yoshihama , Takeo Yoshizawa , Yuji Watanabe , Michiharu Kudo , Kazuko Oyanagi Dynamic Information Flow Control Architecture for Web Applications. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:267-282 [Conf ] Christine Robson , Yuji Watanabe , Masayuki Numao Parts Traceability for Manufacturers. [Citation Graph (0, 0)][DBLP ] ICDE, 2007, pp:1212-1221 [Conf ] Yuji Watanabe , Yoshiteru Ishida Performance Evaluation of Immunity-Based Diagnosis on Complex Networks. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:846-853 [Conf ] Yasuharu Katsuno , Yuji Watanabe , Sanehiro Furuichi , Michiharu Kudo Chinese-wall process confinement for practical distributed coalitions. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:225-234 [Conf ] A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. [Citation Graph (, )][DBLP ] Layering negotiations for flexible attestation. [Citation Graph (, )][DBLP ] Checking assignments of controls to risks for internal control. [Citation Graph (, )][DBLP ] Emergent construction of a behavior arbitration mechanism based on the immune system. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs