Hideki Sakurada

According to our database1, Hideki Sakurada authored at least 23 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: Directions and Issues in Formal Verification of Payment Protocols.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Quality and Quantity Pair as Trust Metric.
IEICE Trans. Inf. Syst., February, 2023

2017
Trust Trust Me (The Additivity).
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

2016
Semi-automated verification of security proofs of quantum cryptographic protocols.
J. Symb. Comput., 2016

On compositional reasoning about anonymity and privacy in epistemic logic.
Ann. Math. Artif. Intell., 2016

Analyzing and Fixing the QACCE Security of QUIC.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2013
An Epistemic Approach to Compositional Reasoning about Anonymity and Privacy.
Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013

Automated Verification of Equivalence on Quantum Cryptographic Protocols.
Proceedings of the 5th International Symposium on Symbolic Computation in Software Science, 2013

Computational Soundness of Symbolic Blind Signatures under Active Attacker.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012

Computational Soundness of Indistinguishability Properties without Computable Parsing.
Proceedings of the Information Security Practice and Experience, 2012

Computationally Complete Symbolic Attacker in Action.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2012

2011
Automatic verification of anonymity of protocols.
JSIAM Lett., 2011

2010
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach.
Trans. Data Priv., 2010

Probabilistic anonymity via coalgebraic simulations.
Theor. Comput. Sci., 2010

Role Interchange for Anonymity and Privacy of Voting.
J. Log. Comput., 2010

2009
Computational and Symbolic Anonymity in an Unbounded Network.
JSIAM Lett., 2009

Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption.
Proceedings of the Formal to Practical Security, 2009

2008
An Adversary Model for Simulation-Based Anonymity Proof.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

On Backward-Style Anonymity Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Theorem-proving anonymity of infinite-state systems.
Inf. Process. Lett., 2007

A Formal Approach to Designing Anonymous Software.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

2001
A Role-Based Specification of the SET Payment Transaction Protocol.
Proceedings of the Advances in Network and Distributed Systems Security, 2001


  Loading...