Kenji Imamoto

According to our database1, Kenji Imamoto authored at least 14 papers between 2000 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Achieving evenhandedness in certified email system for contract signing.
Int. J. Inf. Sec., 2008

2006
Enhanced Privacy in Key-Exchange Protocols by One-time ID.
Proceedings of the Second International Workshop on Security, 2006

Off-line verification of one-time ID in distributed environment.
Proceedings of the 2006 International Conference on Privacy, 2006

2005
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005

Some Remarks on Security of Receipt-Free E-auction.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An Evenhanded Certified Email System for Contract Signing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Reassignment Scheme of an RFID Tag's Key for Owner Transfer.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Analysis and Design for Private Message Board Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Key-Exchange Protocol Using Pre-agreed Session-ID.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Certified E-mail Systems Using Public Notice Board.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority.
Proceedings of the Progress in Cryptology, 2002

2000
Virtual object manipulation on a table-top AR environment.
Proceedings of the IEEE and ACM International Symposium on Augmented Reality, 2000


  Loading...