2007 |
11 | EE | Satoshi Hada,
Kouichi Sakurai:
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
IWSEC 2007: 1-12 |
2006 |
10 | EE | Satoshi Hada,
Kouichi Sakurai:
Ciphertext-Auditable Public Key Encryption.
IWSEC 2006: 308-321 |
9 | EE | Makoto Murata,
Akihiko Tozawa,
Michiharu Kudo,
Satoshi Hada:
XML access control using static analysis.
ACM Trans. Inf. Syst. Secur. 9(3): 292-324 (2006) |
8 | EE | Satoshi Hada,
Toshiaki Tanaka:
Zero-Knowledge and Correlation Intractability.
IEICE Transactions 89-A(10): 2894-2905 (2006) |
2004 |
7 | EE | Satoshi Hada:
A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity.
IEICE Transactions 87-A(1): 2-9 (2004) |
2003 |
6 | EE | Makoto Murata,
Akihiko Tozawa,
Michiharu Kudo,
Satoshi Hada:
XML access control using static analysis.
ACM Conference on Computer and Communications Security 2003: 73-84 |
2002 |
5 | EE | Paul Ashley,
Satoshi Hada,
Günter Karjoth,
Matthias Schunter:
E-P3P privacy policies and privacy authorization.
WPES 2002: 103-109 |
2000 |
4 | EE | Michiharu Kudo,
Satoshi Hada:
XML document security based on provisional authorization.
ACM Conference on Computer and Communications Security 2000: 87-96 |
3 | EE | Satoshi Hada:
Zero-Knowledge and Code Obfuscation.
ASIACRYPT 2000: 443-457 |
1999 |
2 | EE | Satoshi Hada,
Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability.
Public Key Cryptography 1999: 82-96 |
1998 |
1 | EE | Satoshi Hada,
Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols.
CRYPTO 1998: 408-423 |