Masakazu Soshi

According to our database1, Masakazu Soshi authored at least 20 papers between 1997 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A novel toolpath force prediction algorithm using CAM volumetric data for optimizing robotic arthroplasty.
Int. J. Comput. Assist. Radiol. Surg., 2016

A novel hash chain construction for simple and efficient authentication.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2014
An Efficient and Adaptive IP Traceback Scheme.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

2012
Consideration for multi-threshold multi-secret sharing schemes.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

A Novel Hybrid IP Traceback Scheme with Packet Counters.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Efficient and Low-Cost RFID Authentication Schemes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Ideal Secret Sharing Schemes with Share Selectability.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010

Hidden Credential Retrieval without Random Oracles.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

2009
A Secure RFID Authentication Protocol with Low Communication Cost.
Proceedings of the 2009 International Conference on Complex, 2009

2007
Mobile Agent Security with Efficient Oblivious Transfer.
Proceedings of the SECRYPT 2007, 2007

2005
n-State Quantum Coin Flipping Protocol.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
Software Obfuscation on a Theoretical Basis and Its Implementation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.
Proceedings of the Communications and Multimedia Security, 2003

Evaluation of Anonymity of Practical Anonymous Communication Networks.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2001
An Agent-Based Model of Anonymous Communication Protocols.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

2000
Safety Analysis of the Dynamic-Typed Access Matrix Model.
Proceedings of the Computer Security, 2000

1997
The Saga Security System: A Security Architecture for Open Distributed Systems.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

A New Authorization Model and its Mechanism Using Service Paths in Open Distributed Environments.
Proceedings of the Distributed Applications and Interoperable Systems, Proceedings IFIP TC 6.1 Working Conference DAIS'97, Cottbus, Germany, September 30, 1997


  Loading...