2008 |
29 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
28 | EE | Sk. Md. Mizanur Rahman,
Nidal Nasser,
Atsuo Inomata,
Takeshi Okamoto,
Masahiro Mambo,
Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks.
Security and Communication Networks 1(2): 179-189 (2008) |
2007 |
27 | | Juan A. Garay,
Arjen K. Lenstra,
Masahiro Mambo,
René Peralta:
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings
Springer 2007 |
26 | EE | Lihua Wang,
Jun Shao,
Zhenfu Cao,
Masahiro Mambo,
Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
INDOCRYPT 2007: 297-311 |
25 | EE | Shuji Isobe,
Wataru Kumagai,
Masahiro Mambo,
Hiroki Shizuya:
Toward Separating Integer Factoring from Discrete Logarithm mod p.
IEICE Transactions 90-A(1): 48-53 (2007) |
2006 |
24 | EE | Masahiro Mambo,
Moises Rosales Salinas,
Kazuo Ohta,
Noboru Kunihiro:
Problems on the MR micropayment schemes.
ASIACCS 2006: 363 |
23 | EE | Sk. Md. Mizanur Rahman,
Atsuo Inomata,
Takeshi Okamoto,
Masahiro Mambo,
Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks.
ICUCT 2006: 140-149 |
22 | EE | Sk. Md. Mizanur Rahman,
Masahiro Mambo,
Atsuo Inomata,
Eiji Okamoto:
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks.
SAINT 2006: 300-306 |
2005 |
21 | EE | Chisato Konoma,
Masahiro Mambo,
Hiroki Shizuya:
The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem.
IEICE Transactions 88-A(1): 81-88 (2005) |
20 | EE | Shuji Isobe,
Tetsuo Kuriyama,
Masahiro Mambo,
Hiroki Shizuya:
On the Polynomial Time Computability of Abstract Ray-Tracing Problems.
IEICE Transactions 88-A(5): 1209-1213 (2005) |
2003 |
19 | EE | Seungjoo Kim,
Masahiro Mambo,
Yuliang Zheng:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption.
CT-RSA 2003: 227-243 |
2002 |
18 | EE | Masahiro Mambo,
Eiji Okamoto,
Yasushi Sengoku,
Takashi Tanaka:
Simple and Secure Mobile Access under the Flexible Organization Management.
DEXA Workshops 2002: 456-462 |
17 | EE | Eikoh Chida,
Yosuke Kasai,
Masahiro Mambo,
Hiroki Shizuya:
Spending Offline Divisible Coins with Combining Capability.
INDOCRYPT 2002: 339-353 |
2001 |
16 | EE | Hideaki Goto,
Masahiro Mambo,
Hiroki Shizuya,
Yasuyoshi Watanabe:
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules.
ACISP 2001: 145-158 |
15 | EE | Seungjoo Kim,
Jung Hee Cheon,
Marc Joye,
Seongan Lim,
Masahiro Mambo,
Dongho Won,
Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
IMA Int. Conf. 2001: 114-127 |
2000 |
14 | | Hiroshi Doi,
Masahiro Mambo,
Eiji Okamoto:
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.
ACISP 2000: 352-367 |
13 | EE | Hideaki Goto,
Masahiro Mambo,
Kenjiro Matsumura,
Hiroki Shizuya:
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.
ISW 2000: 82-96 |
12 | | Mike Burmester,
Yvo Desmedt,
Hiroshi Doi,
Masahiro Mambo,
Eiji Okamoto,
Mitsuru Tada,
Yuko Yoshifuji:
A Structured ElGamal-Type Multisignature Scheme.
Public Key Cryptography 2000: 466-483 |
1999 |
11 | | Masahiro Mambo,
Yuliang Zheng:
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings
Springer 1999 |
10 | EE | Shigeki Kitazawa,
Xun Yi,
Eiji Okamoto,
Masahiro Mambo:
Improvement of Secure Access Control Agent for Distributed Files.
ICPP Workshops 1999: 185- |
9 | EE | Seungjoo Kim,
Insoo Lee,
Masahiro Mambo,
Sungjun Park:
On the Difficulty of Key Recovery Systems.
ISW 1999: 207-224 |
1998 |
8 | | Eiji Okamoto,
George I. Davida,
Masahiro Mambo:
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings
Springer 1998 |
7 | EE | Agus Fanar Syukri,
Eiji Okamoto,
Masahiro Mambo:
A User Identification System Using Signature Written with Mouse.
ACISP 1998: 403-414 |
6 | EE | Masahiro Mambo,
Hiroki Shizuya:
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme.
Public Key Cryptography 1998: 258-262 |
1997 |
5 | | Masahiro Mambo,
Eiji Okamoto,
Kouichi Sakurai:
Protection of Data and Delegated Keys in Digital Distribution.
ACISP 1997: 271-282 |
4 | | Kenichi Hayashi,
Eiji Okamoto,
Masahiro Mambo:
Proposal of user identification scheme using mouse.
ICICS 1997: 144-148 |
3 | | Hisao Sakazaki,
Eiji Okamoto,
Masahiro Mambo:
The Application of ID-Based Key Distribution Systems to an Elliptic Curve.
ISW 1997: 335-344 |
1996 |
2 | EE | Masahiro Mambo,
Keisuke Usuda,
Eiji Okamoto:
Proxy Signatures for Delegating Signing Operation.
ACM Conference on Computer and Communications Security 1996: 48-57 |
1 | | Masahiro Mambo,
Kouichi Sakurai,
Eiji Okamoto:
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
ASIACRYPT 1996: 322-333 |