| 2007 |
| 11 | EE | Satoshi Hada,
Kouichi Sakurai:
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
IWSEC 2007: 1-12 |
| 2006 |
| 10 | EE | Satoshi Hada,
Kouichi Sakurai:
Ciphertext-Auditable Public Key Encryption.
IWSEC 2006: 308-321 |
| 9 | EE | Makoto Murata,
Akihiko Tozawa,
Michiharu Kudo,
Satoshi Hada:
XML access control using static analysis.
ACM Trans. Inf. Syst. Secur. 9(3): 292-324 (2006) |
| 8 | EE | Satoshi Hada,
Toshiaki Tanaka:
Zero-Knowledge and Correlation Intractability.
IEICE Transactions 89-A(10): 2894-2905 (2006) |
| 2004 |
| 7 | EE | Satoshi Hada:
A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity.
IEICE Transactions 87-A(1): 2-9 (2004) |
| 2003 |
| 6 | EE | Makoto Murata,
Akihiko Tozawa,
Michiharu Kudo,
Satoshi Hada:
XML access control using static analysis.
ACM Conference on Computer and Communications Security 2003: 73-84 |
| 2002 |
| 5 | EE | Paul Ashley,
Satoshi Hada,
Günter Karjoth,
Matthias Schunter:
E-P3P privacy policies and privacy authorization.
WPES 2002: 103-109 |
| 2000 |
| 4 | EE | Michiharu Kudo,
Satoshi Hada:
XML document security based on provisional authorization.
ACM Conference on Computer and Communications Security 2000: 87-96 |
| 3 | EE | Satoshi Hada:
Zero-Knowledge and Code Obfuscation.
ASIACRYPT 2000: 443-457 |
| 1999 |
| 2 | EE | Satoshi Hada,
Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability.
Public Key Cryptography 1999: 82-96 |
| 1998 |
| 1 | EE | Satoshi Hada,
Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols.
CRYPTO 1998: 408-423 |