![]() | ![]() |
2008 | ||
---|---|---|
5 | EE | Yoshinobu Kawabe, Hideki Sakurada: An Adversary Model for Simulation-Based Anonymity Proof. IEICE Transactions 91-A(4): 1112-1120 (2008) |
4 | EE | Yoshinobu Kawabe, Ken Mano, Hideki Sakurada, Yasuyuki Tsukada: On Backward-Style Anonymity Verification. IEICE Transactions 91-A(9): 2597-2606 (2008) |
2007 | ||
3 | EE | Yoshinobu Kawabe, Hideki Sakurada: A Formal Approach to Designing Anonymous Software. SERA 2007: 203-212 |
2 | EE | Yoshinobu Kawabe, Ken Mano, Hideki Sakurada, Yasuyuki Tsukada: Theorem-proving anonymity of infinite-state systems. Inf. Process. Lett. 101(1): 46-51 (2007) |
2001 | ||
1 | Hideki Sakurada, Yasuyuki Tsukada: A Role-Based Specification of the SET Payment Transaction Protocol. Network Security 2001: 1-15 |
1 | Yoshinobu Kawabe | [2] [3] [4] [5] |
2 | Ken Mano | [2] [4] |
3 | Yasuyuki Tsukada | [1] [2] [4] |