Satoshi Hada

According to our database1, Satoshi Hada authored at least 12 papers between 1998 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Secure Obfuscation for Encrypted Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Static vs. Dynamic Validation of BSP Conformance.
Proceedings of the IEEE International Conference on Web Services, 2009

2007
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Zero-Knowledge and Correlation Intractability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Ciphertext-Auditable Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2006

2004
A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
XML access control using static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
E-P3P privacy policies and privacy authorization.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

2000
XML document security based on provisional authorization.
Proceedings of the CCS 2000, 2000

Zero-Knowledge and Code Obfuscation.
Proceedings of the Advances in Cryptology, 2000

1999
A Relationship between One-Wayness and Correlation Intractability.
Proceedings of the Public Key Cryptography, 1999

1998
On the Existence of 3-Round Zero-Knowledge Protocols.
Proceedings of the Advances in Cryptology, 1998


  Loading...