Ken Mano

According to our database1, Ken Mano authored at least 24 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Quality and Quantity Pair as Trust Metric.
IEICE Trans. Inf. Syst., February, 2023

2020
Foreword.
IEICE Trans. Inf. Syst., 2020

2017
Trust Trust Me (The Additivity).
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

2016
On compositional reasoning about anonymity and privacy in epistemic logic.
Ann. Math. Artif. Intell., 2016

2014
Evaluating data utility of privacy-preserving pseudonymized location datasets.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems.
Proceedings of the Information and Communication Technology, 2014

Pseudonym exchange for privacy-preserving publishing of trajectory data set.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
An Epistemic Approach to Compositional Reasoning about Anonymity and Privacy.
Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013

Protecting location privacy with k-confusing paths based on dynamic pseudonyms.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2010
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach.
Trans. Data Priv., 2010

Role Interchange for Anonymity and Privacy of Voting.
J. Log. Comput., 2010

2008
On Backward-Style Anonymity Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Theorem-proving anonymity of infinite-state systems.
Inf. Process. Lett., 2007

2005
Name creation implements restriction in the pi-calculus.
Syst. Comput. Jpn., 2005

Verifying Trace Equivalence of a Shared-Memory-Style Communication System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Name-passing style GUI programming in the <i>pi</i>-calculus-based language Nepi.
Proceedings of the 6th AMAST Workshop on Real-Time Systems, 2004

The Nepi Network Programming System: A Programming Environment for Distributed Systems.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

2001
Unique normal form property of compatible term rewriting systems: a new proof of Chew's theorem.
Theor. Comput. Sci., 2001

2000
The Nepi<sup>2</sup> Programming System: A pi-Calculus-Based Approach to Agent-Based Programming.
Proceedings of the Formal Approaches to Agent-Based Systems, First International Workshop, 2000

On Formal Modeling of Agent Computations.
Proceedings of the Formal Approaches to Agent-Based Systems, First International Workshop, 2000

1997
Nepi²: A Two-Level Calculus for Network Programming Based on the pi-Calculus.
Proceedings of the Advances in Computing Science, 1997

1996
Nepi: A Network Programming Language Based on the pi-Calculus.
Proceedings of the Coordination Languages and Models, First International Conference, 1996

Unique Normal Form Property of Higher-Order Rewriting Systems.
Proceedings of the Algebraic and Logic Programming, 5th International Conference, 1996


  Loading...