dblp.uni-trier.dewww.uni-trier.de

Ryôichi Sasaki

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2005
11 Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan Springer 2005
10EEKunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Transactions 88-A(1): 239-246 (2005)
2002
9EERyôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh: Combinatorial Optimization of Countermeasures against Illegal Copying. Security Protocols Workshop 2002: 128-144
8EEHiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki: Legally Authorized and Unauthorized Digital Evidence. Security Protocols Workshop 2002: 67-73
2001
7EEHiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki: A Multi-OS Approach to Trusted Computer Systems. Security Protocols Workshop 2001: 107-114
2000
6EESatoru Tezuka, Ryôichi Sasaki, Masanori Kataoka: Seamless Object Authentication in Different Security Policy Domains. HICSS 2000
5EEHiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki: Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. Security Protocols Workshop 2000: 238-248
1999
4 Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka: INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. Security Protocols Workshop 1999: 195-207
1998
3EEHiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi: Secure Fingerprinting Using Public-Key Cryptography (Position Paper). Security Protocols Workshop 1998: 83-89
2EERyôichi Sasaki: Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion). Security Protocols Workshop 1998: 90-94
1991
1 Tsutomu Nakamura, Nobuyuki Fujikura, Ryôichi Sasaki, Hiroshi Morita, Masat Hayashi, Satoru Nishino, Hiroaki Takahashi, Akio Matsuura: Development and Performance Evaluation of Point to Multipoint Communication Control Scheme Via Satellite. Perform. Eval. 12(3): 169-179 (1991)

Coauthor Index

1Nobuyuki Fujikura [1]
2Masat Hayashi [1]
3Hideki Imai [10]
4Shinji Itoh [7] [8] [9]
5Mitsuru Iwamura [10]
6Masanori Kataoka [6]
7Chikako Kurita [5]
8Tsutomu Matsumoto [10]
9Akio Matsuura [1]
10Kunihiko Miyazaki [7] [8] [10]
11Hiroshi Morita [1]
12Yasuhiko Nagai [4]
13Tsutomu Nakamura [1]
14Satoru Nishino [1]
15Eiji Okamoto [11]
16Sihan Qing [11]
17Tsukasa Saitoh [4] [5]
18Takaaki Shigematsu [5]
19Seiichi Susaki [4] [5]
20Hiroaki Takahashi [1]
21Kazuo Takaragi [3] [7] [8]
22Satoru Tezuka [4] [5] [6] [10]
23Hisashi Toyoshima [4] [5]
24Hiroshi Yoshiura [3] [4] [5] [7] [8] [9] [10] [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)