2008 |
9 | EE | Stuart Haber,
Yasuo Hatano,
Yoshinori Honda,
William Horne,
Kunihiko Miyazaki,
Tomas Sander,
Satoru Tezoku,
Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
ASIACCS 2008: 353-362 |
8 | EE | Yasuo Hatano,
Kunihiko Miyazaki,
Toshinobu Kaneko:
Cryptographic Approch for Workflow Systems.
II3E 2008: 75-86 |
7 | EE | Kunihiko Miyazaki,
Goichiro Hanaoka,
Hideki Imai:
Invisibly Sanitizable Digital Signature Scheme.
IEICE Transactions 91-A(1): 392-402 (2008) |
2007 |
6 | EE | David A. Basin,
Hironobu Kuruma,
Kunihiko Miyazaki,
Kazuo Takaragi,
Burkhart Wolff:
Verifying a signature architecture: a comparative case study.
Formal Asp. Comput. 19(1): 63-91 (2007) |
2006 |
5 | EE | Kunihiko Miyazaki,
Goichiro Hanaoka,
Hideki Imai:
Digitally signed document sanitizing scheme based on bilinear maps.
ASIACCS 2006: 343-354 |
2005 |
4 | EE | Kunihiko Miyazaki,
Mitsuru Iwamura,
Tsutomu Matsumoto,
Ryôichi Sasaki,
Hiroshi Yoshiura,
Satoru Tezuka,
Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Transactions 88-A(1): 239-246 (2005) |
2002 |
3 | EE | Hiroshi Yoshiura,
Kunihiko Miyazaki,
Shinji Itoh,
Kazuo Takaragi,
Ryôichi Sasaki:
Legally Authorized and Unauthorized Digital Evidence.
Security Protocols Workshop 2002: 67-73 |
2001 |
2 | EE | Katsuyuki Okeya,
Kunihiko Miyazaki,
Kouichi Sakurai:
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
ICISC 2001: 428-439 |
1 | EE | Hiroshi Yoshiura,
Kunihiko Miyazaki,
Shinji Itoh,
Kazuo Takaragi,
Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems.
Security Protocols Workshop 2001: 107-114 |