Satoshi Hada

According to our database1, Satoshi Hada authored at least 12 papers between 1999 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Secure Obfuscation for Encrypted Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Static vs. Dynamic Validation of BSP Conformance.
Proceedings of the IEEE International Conference on Web Services, 2009

2007
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2007

2006
XML access control using static analysis.
ACM Trans. Inf. Syst. Secur., 2006

Zero-Knowledge and Correlation Intractability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Ciphertext-Auditable Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2006

2004
A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2002
E-P3P privacy policies and privacy authorization.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

2000
XML document security based on provisional authorization.
Proceedings of the CCS 2000, 2000

Zero-Knowledge and Code Obfuscation.
Proceedings of the Advances in Cryptology, 2000

1999
A Relationship between One-Wayness and Correlation Intractability.
IACR Cryptol. ePrint Arch., 1999

On the Existence of 3-Round Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 1999


  Loading...