dblp.uni-trier.dewww.uni-trier.de

Masahiro Mambo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
29 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
28EESk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Security and Communication Networks 1(2): 179-189 (2008)
2007
27 Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings Springer 2007
26EELihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura: A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311
25EEShuji Isobe, Wataru Kumagai, Masahiro Mambo, Hiroki Shizuya: Toward Separating Integer Factoring from Discrete Logarithm mod p. IEICE Transactions 90-A(1): 48-53 (2007)
2006
24EEMasahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro: Problems on the MR micropayment schemes. ASIACCS 2006: 363
23EESk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149
22EESk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto: An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306
2005
21EEChisato Konoma, Masahiro Mambo, Hiroki Shizuya: The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem. IEICE Transactions 88-A(1): 81-88 (2005)
20EEShuji Isobe, Tetsuo Kuriyama, Masahiro Mambo, Hiroki Shizuya: On the Polynomial Time Computability of Abstract Ray-Tracing Problems. IEICE Transactions 88-A(5): 1209-1213 (2005)
2003
19EESeungjoo Kim, Masahiro Mambo, Yuliang Zheng: Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243
2002
18EEMasahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka: Simple and Secure Mobile Access under the Flexible Organization Management. DEXA Workshops 2002: 456-462
17EEEikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya: Spending Offline Divisible Coins with Combining Capability. INDOCRYPT 2002: 339-353
2001
16EEHideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe: Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. ACISP 2001: 145-158
15EESeungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMA Int. Conf. 2001: 114-127
2000
14 Hiroshi Doi, Masahiro Mambo, Eiji Okamoto: On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. ACISP 2000: 352-367
13EEHideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya: An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. ISW 2000: 82-96
12 Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji: A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483
1999
11 Masahiro Mambo, Yuliang Zheng: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings Springer 1999
10EEShigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo: Improvement of Secure Access Control Agent for Distributed Files. ICPP Workshops 1999: 185-
9EESeungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park: On the Difficulty of Key Recovery Systems. ISW 1999: 207-224
1998
8 Eiji Okamoto, George I. Davida, Masahiro Mambo: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings Springer 1998
7EEAgus Fanar Syukri, Eiji Okamoto, Masahiro Mambo: A User Identification System Using Signature Written with Mouse. ACISP 1998: 403-414
6EEMasahiro Mambo, Hiroki Shizuya: A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. Public Key Cryptography 1998: 258-262
1997
5 Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai: Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282
4 Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo: Proposal of user identification scheme using mouse. ICICS 1997: 144-148
3 Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo: The Application of ID-Based Key Distribution Systems to an Elliptic Curve. ISW 1997: 335-344
1996
2EEMasahiro Mambo, Keisuke Usuda, Eiji Okamoto: Proxy Signatures for Delegating Signing Operation. ACM Conference on Computer and Communications Security 1996: 48-57
1 Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto: How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333

Coauthor Index

1Mike Burmester [12]
2Zhenfu Cao [26]
3Liqun Chen [29]
4Jung Hee Cheon [15]
5Eikoh Chida [17]
6George I. Davida [8]
7Ed Dawson [29]
8Yvo Desmedt [12]
9Hiroshi Doi [12] [14]
10Juan A. Garay [27]
11Hideaki Goto [13] [16]
12Kenichi Hayashi [4]
13Atsuo Inomata [22] [23] [28]
14Shuji Isobe [20] [25]
15Marc Joye [15]
16Yosuke Kasai [17]
17Seungjoo Kim [9] [15] [19]
18Shigeki Kitazawa [10]
19Chisato Konoma [21]
20Wataru Kumagai [25]
21Noboru Kunihiro [24]
22Tetsuo Kuriyama [20]
23Xuejia Lai [29]
24Insoo Lee [9]
25Arjen K. Lenstra [27]
26Seongan Lim [15]
27Kenjiro Matsumura [13]
28Atsuko Miyaji [29]
29Yi Mu [29]
30Nidal Nasser [28]
31Kazuo Ohta [24]
32Eiji Okamoto [1] [2] [3] [4] [5] [7] [8] [10] [12] [14] [18] [22] [23] [28]
33Takeshi Okamoto [23] [28]
34Sungjun Park [9]
35René Peralta [27]
36David Pointcheval [29]
37Bart Preneel [29]
38Sk. Md. Mizanur Rahman [22] [23] [28]
39Hisao Sakazaki [3]
40Kouichi Sakurai [1] [5]
41Moises Rosales Salinas [24]
42Yasushi Sengoku [18]
43Jun Shao [26]
44Hiroki Shizuya [6] [13] [16] [17] [20] [21] [25]
45Nigel P. Smart [29]
46Willy Susilo [29]
47Agus Fanar Syukri [7]
48Mitsuru Tada [12]
49Takashi Tanaka [18]
50Keisuke Usuda [2]
51Huaxiong Wang [29]
52Lihua Wang [26]
53Yasuyoshi Watanabe [16]
54Dongho Won [15]
55Duncan S. Wong [29]
56Akihiro Yamamura [26]
57Xun Yi [10]
58Yuko Yoshifuji [12]
59Yuliang Zheng [11] [15] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)