Segui
Masakazu Soshi
Masakazu Soshi
Hiroshima City University
Email verificata su hiroshima-cu.ac.jp - Home page
Titolo
Citata da
Citata da
Anno
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
Information Security Practice and Experience: 5th International Conference …, 2009
3992009
Software obfuscation on a theoretical basis and its implementation
T Ogiso, Y Sakabe, M Soshi, A Miyaji
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2003
1552003
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied Cryptography 2 (1), 46-59, 2010
462010
Java obfuscation with a theoretical basis for building secure mobile agents
Y Sakabe, M Soshi, A Miyaji
Communications and Multimedia Security. Advanced Techniques for Network and …, 2003
372003
Software tamper resistance based on the difficulty of interprocedural analysis
T Ogiso, Y Sakabe, M Soshi, A Miyaji
3rd Workshop on Information Security Applications (WISA 2002), Korea, 2002
372002
Safety analysis of the dynamic-typed access matrix model
M Soshi
Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000
332000
The dynamic-typed access matrix model and decidability of the safety problem
M Soshi, M Maekawa, E Okamoto
IEICE transactions on fundamentals of electronics, communications and …, 2004
212004
Java obfuscation approaches to construct tamper-resistant object-oriented programs
Y Sakabe, M Soshi, A Miyaji
IPSJ Digital Courier 1, 349-361, 2005
182005
A secure RFID authentication protocol with low communication cost
MS Rahman, M Soshi, A Miyaji
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
142009
Consideration for multi-threshold multi-secret sharing schemes
A Waseda, M Soshi
2012 International Symposium on Information Theory and its Applications, 265-269, 2012
132012
The Saga Security system: A security Architecture for open Distributed systems
M Soshi, M Maekawa
Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of …, 1997
121997
Anonymous communication with elementary cyclic routes
S Kitazawa, S Nagano, M Soshi, A Miyaji
IPSJ Journal 41 (8), 2148-2160, 2000
82000
A novel hash chain construction for simple and efficient authentication
Y Kurihara, M Soshi
2016 14th Annual Conference on Privacy, Security and Trust (PST), 539-542, 2016
72016
Java obfuscation approaches to construct tamper-resistant object-oriented programs
Y Sakabe, M Soshi, A Miyaji
Information and Media Technologies 1 (1), 134-146, 2006
72006
On digital signature schemes for mobile agents
R Otomura, M Soshi, A Miyaji
Proc. of SCIS2001, 851-855, 2001
72001
Efficient and low-cost rfid authentication schemes
A Miyaji, MS Rahman, M Soshi
arXiv preprint arXiv:1209.5076, 2012
62012
A novel hybrid IP traceback scheme with packet counters
T Karasawa, M Soshi, A Miyaji
International Conference on Internet and Distributed Computing Systems, 71-84, 2012
52012
Hidden credential retrieval without random oracles
A Miyaji, MS Rahman, M Soshi
Information Security Applications: 11th International Workshop, WISA 2010 …, 2011
42011
Ideal secret sharing schemes with share selectability
K Emura, A Miyaji, A Nomura, MS Rahman, M Soshi
Information and Communications Security: 13th International Conference …, 2011
42011
Quantum secret sharing between multiparty and multiparty against the attacks with single photons or EPR-pair
A Waseda, T Takagi, M Soshi, A Miyaji
2008 International Symposium on Information Theory and Its Applications, 1-4, 2008
42008
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20