Kazue Sako

According to our database1, Kazue Sako authored at least 40 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
LSTM-Based GNSS Spoofing Detection for Drone Formation Flights.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Ledger-based Points Transfer System in LPWAN: From Disaster Management Aspect.
Proceedings of the International Conference on Information and Communication Technologies for Disaster Management, 2021

2019
A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2018
A Proposal on an Electricity Trading Platform Using Blockchain.
Proceedings of the Transdisciplinary Engineering Methods for Social Innovation of Industry 4.0, 2018

2011
Verifiable Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Semantic Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Public Key Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Probabilistic Public-Key Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nyberg-Rueppel Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Goldwasser-Micali Encryption Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Electronic Voting Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Digital Signature Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011

2010
An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

RLCPS Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
<i>k</i>-Times Anonymous Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

IC card-based single sign-on system that remains secure under card analysis.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2007
An Efficient Publicly Verifiable Mix-Net for Long Inputs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
<i>k</i>-Times Anonymous Authentication with a Constant Proving Cost.
Proceedings of the Public Key Cryptography, 2006

Using group signatures for identity management and its implementation.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

2005
Verifiable Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Semantic Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Public Key Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Probabilistic Public-Key Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Nyberg-Rueppel Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Goldwasser-Micali Encryption Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Voting Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

digital signature schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
k-Times Anonymous Authentication (Extended Abstract).
Proceedings of the Advances in Cryptology, 2004

2002
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
An Efficient Scheme for Proving a Shuffle.
Proceedings of the Advances in Cryptology, 2001

2000
An Auction Protocol Which Hides Bids of Losers.
Proceedings of the Public Key Cryptography, 2000

Efficient Receipt-Free Voting Based on Homomorphic Encryption.
Proceedings of the Advances in Cryptology, 2000

1999
Implementation of a Digital Lottery Server on WWW.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1997
Fault tolerant anonymous channel.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Designated Verifier Proofs and Their Applications.
Proceedings of the Advances in Cryptology, 1996

1995
Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth.
Proceedings of the Advances in Cryptology, 1995

1994
Secure Voting Using Partially Compatible Homomorphisms.
Proceedings of the Advances in Cryptology, 1994


  Loading...