A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, A Nomura, K Omote, M Soshi Information Security Practice and Experience: 5th International Conference …, 2009 | 399 | 2009 |
Software obfuscation on a theoretical basis and its implementation T Ogiso, Y Sakabe, M Soshi, A Miyaji IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2003 | 155 | 2003 |
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, K Omote, A Nomura, M Soshi International Journal of Applied Cryptography 2 (1), 46-59, 2010 | 46 | 2010 |
Java obfuscation with a theoretical basis for building secure mobile agents Y Sakabe, M Soshi, A Miyaji Communications and Multimedia Security. Advanced Techniques for Network and …, 2003 | 37 | 2003 |
Software tamper resistance based on the difficulty of interprocedural analysis T Ogiso, Y Sakabe, M Soshi, A Miyaji 3rd Workshop on Information Security Applications (WISA 2002), Korea, 2002 | 37 | 2002 |
Safety analysis of the dynamic-typed access matrix model M Soshi Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000 | 33 | 2000 |
The dynamic-typed access matrix model and decidability of the safety problem M Soshi, M Maekawa, E Okamoto IEICE transactions on fundamentals of electronics, communications and …, 2004 | 21 | 2004 |
Java obfuscation approaches to construct tamper-resistant object-oriented programs Y Sakabe, M Soshi, A Miyaji IPSJ Digital Courier 1, 349-361, 2005 | 18 | 2005 |
A secure RFID authentication protocol with low communication cost MS Rahman, M Soshi, A Miyaji 2009 International Conference on Complex, Intelligent and Software Intensive …, 2009 | 14 | 2009 |
Consideration for multi-threshold multi-secret sharing schemes A Waseda, M Soshi 2012 International Symposium on Information Theory and its Applications, 265-269, 2012 | 13 | 2012 |
The Saga Security system: A security Architecture for open Distributed systems M Soshi, M Maekawa Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of …, 1997 | 12 | 1997 |
Anonymous communication with elementary cyclic routes S Kitazawa, S Nagano, M Soshi, A Miyaji IPSJ Journal 41 (8), 2148-2160, 2000 | 8 | 2000 |
A novel hash chain construction for simple and efficient authentication Y Kurihara, M Soshi 2016 14th Annual Conference on Privacy, Security and Trust (PST), 539-542, 2016 | 7 | 2016 |
Java obfuscation approaches to construct tamper-resistant object-oriented programs Y Sakabe, M Soshi, A Miyaji Information and Media Technologies 1 (1), 134-146, 2006 | 7 | 2006 |
On digital signature schemes for mobile agents R Otomura, M Soshi, A Miyaji Proc. of SCIS2001, 851-855, 2001 | 7 | 2001 |
Efficient and low-cost rfid authentication schemes A Miyaji, MS Rahman, M Soshi arXiv preprint arXiv:1209.5076, 2012 | 6 | 2012 |
A novel hybrid IP traceback scheme with packet counters T Karasawa, M Soshi, A Miyaji International Conference on Internet and Distributed Computing Systems, 71-84, 2012 | 5 | 2012 |
Hidden credential retrieval without random oracles A Miyaji, MS Rahman, M Soshi Information Security Applications: 11th International Workshop, WISA 2010 …, 2011 | 4 | 2011 |
Ideal secret sharing schemes with share selectability K Emura, A Miyaji, A Nomura, MS Rahman, M Soshi Information and Communications Security: 13th International Conference …, 2011 | 4 | 2011 |
Quantum secret sharing between multiparty and multiparty against the attacks with single photons or EPR-pair A Waseda, T Takagi, M Soshi, A Miyaji 2008 International Symposium on Information Theory and Its Applications, 1-4, 2008 | 4 | 2008 |