Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Masahiro Mambo
@article{DBLP:journals/sensors/PurnamaM24, author = {Hari Purnama and Masahiro Mambo}, title = {{IHIBE:} {A} Hierarchical and Delegated Access Control Mechanism for IoT Environments}, journal = {Sensors}, volume = {24}, number = {3}, pages = {979}, year = {2024}, url = {https://doi.org/10.3390/s24030979}, doi = {10.3390/S24030979}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/PurnamaM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KurniawanM23, author = {Hendra Kurniawan and Masahiro Mambo}, title = {A Reliable Application of {MPC} for Securing the Tri-Training Algorithm}, journal = {{IEEE} Access}, volume = {11}, pages = {34718--34735}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3264903}, doi = {10.1109/ACCESS.2023.3264903}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KurniawanM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengLM23, author = {Mingmei Zheng and Zi{-}Yuan Liu and Masahiro Mambo}, title = {A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch}, journal = {{IEEE} Access}, volume = {11}, pages = {62510--62521}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3287777}, doi = {10.1109/ACCESS.2023.3287777}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhengLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SanjoyoM22, author = {Danu Dwi Sanjoyo and Masahiro Mambo}, title = {Accountable Bootstrapping Based on Attack Resilient Public Key Infrastructure and Secure Zero Touch Provisioning}, journal = {{IEEE} Access}, volume = {10}, pages = {134086--134112}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3231015}, doi = {10.1109/ACCESS.2022.3231015}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SanjoyoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuTTMC22, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo and Yu{-}Chi Chen}, title = {Public-Key Authenticated Encryption with Keyword Search: {A} Generic Construction and Its Quantum-Resistant Instantiation}, journal = {Comput. J.}, volume = {65}, number = {10}, pages = {2828--2844}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab119}, doi = {10.1093/COMJNL/BXAB119}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuTTMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/KurniawanM22, author = {Hendra Kurniawan and Masahiro Mambo}, title = {Homomorphic Encryption-Based Federated Privacy Preservation for Deep Active Learning}, journal = {Entropy}, volume = {24}, number = {11}, pages = {1545}, year = {2022}, url = {https://doi.org/10.3390/e24111545}, doi = {10.3390/E24111545}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/KurniawanM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiuTTMC22, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo and Yu{-}Chi Chen}, title = {Quantum-resistant anonymous identity-based encryption with trable identities}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {2}, pages = {111--126}, year = {2022}, url = {https://doi.org/10.1049/ise2.12049}, doi = {10.1049/ISE2.12049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiuTTMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/WantoroM22, author = {Jan Wantoro and Masahiro Mambo}, title = {Efficient and Privacy-Preserving Certificate Activation for {V2X} Pseudonym Certificate Revocation}, journal = {J. Sens. Actuator Networks}, volume = {11}, number = {3}, pages = {51}, year = {2022}, url = {https://doi.org/10.3390/jsan11030051}, doi = {10.3390/JSAN11030051}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/WantoroM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LiuTTCM22, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Yu{-}Chi Chen and Masahiro Mambo}, title = {Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {3}, pages = {4629--4640}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2021.3103909}, doi = {10.1109/JSYST.2021.3103909}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LiuTTCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/LiuTTMC22, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo and Yu{-}Chi Chen}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {423--436}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497760}, doi = {10.1145/3488932.3497760}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/LiuTTMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/KatoSM22, author = {Takuya Kato and Hiroto Shiba and Masahiro Mambo}, title = {On the Identity Match Rate in Web Browsing History}, booktitle = {2022 Tenth International Symposium on Computing and Networking, {CANDAR} 2022 - Workshops, Himeji, Japan, November 21-24, 2022}, pages = {384--387}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CANDARW57323.2022.00075}, doi = {10.1109/CANDARW57323.2022.00075}, timestamp = {Thu, 23 Mar 2023 08:30:32 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/KatoSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuCTTM22, author = {Zi{-}Yuan Liu and Chu{-}Chieh Chien and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Public Key Encryption with Hierarchical Authorized Keyword Search}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {147--170}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_8}, doi = {10.1007/978-3-031-29371-9\_8}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuCTTM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YouLTTM22, author = {Jing{-}Shiuan You and Zi{-}Yuan Liu and Raylin Tso and Yi{-}Fan Tseng and Masahiro Mambo}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {166--186}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_9}, doi = {10.1007/978-3-031-15255-9\_9}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YouLTTM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DewantaM21, author = {Favian Dewanta and Masahiro Mambo}, title = {Corrections to "A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment"}, journal = {{IEEE} Access}, volume = {9}, pages = {143592}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3121106}, doi = {10.1109/ACCESS.2021.3121106}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DewantaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuTTM21, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo}, title = {Designated-ciphertext searchable encryption}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102709}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102709}, doi = {10.1016/J.JISA.2020.102709}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuTTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HlaingFM21, author = {Htet Htet Hlaing and Yuki Funamoto and Masahiro Mambo}, title = {Secure Content Distribution with Access Control Enforcement in Named Data Networking}, journal = {Sensors}, volume = {21}, number = {13}, pages = {4477}, year = {2021}, url = {https://doi.org/10.3390/s21134477}, doi = {10.3390/S21134477}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HlaingFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/DewantaM21, author = {Favian Dewanta and Masahiro Mambo}, title = {{BPT} Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {2}, pages = {1752--1769}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3051258}, doi = {10.1109/TVT.2021.3051258}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/DewantaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/HlaingFM21, author = {Htet Htet Hlaing and Yuki Funamoto and Masahiro Mambo}, title = {Performance Comparison of Hybrid Encryption-based Access Control Schemes in {NDN}}, booktitle = {17th International Conference on Mobility, Sensing and Networking, {MSN} 2021, Exeter, United Kingdom, December 13-15, 2021}, pages = {622--627}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MSN53354.2021.00095}, doi = {10.1109/MSN53354.2021.00095}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/msn/HlaingFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuTTMC21, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo and Yu{-}Chi Chen}, title = {Quantum-resistant Anonymous {IBE} with Traceable Identities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2021}, url = {https://eprint.iacr.org/2021/033}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuTTMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuTTCM21, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Yu{-}Chi Chen and Masahiro Mambo}, title = {Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2021}, url = {https://eprint.iacr.org/2021/337}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuTTCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuwakadoHM21, author = {Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo}, title = {White-Box Encryption Scheme Using a Quantum Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2021}, url = {https://eprint.iacr.org/2021/589}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuwakadoHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuTTMC21a, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo and Yu{-}Chi Chen}, title = {Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1008}, year = {2021}, url = {https://eprint.iacr.org/2021/1008}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuTTMC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KoHM20, author = {Kyi Thar Ko and Htet Htet Hlaing and Masahiro Mambo}, title = {A PEKS-Based {NDN} Strategy for Name Privacy}, journal = {Future Internet}, volume = {12}, number = {8}, pages = {130}, year = {2020}, url = {https://doi.org/10.3390/fi12080130}, doi = {10.3390/FI12080130}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/KoHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/KoM20, author = {Kyi Thar Ko and Masahiro Mambo}, title = {Trapdoor Assignment of PEKS-based {NDN} Strategy in Two-Tier Networks}, booktitle = {16th International Conference on Mobility, Sensing and Networking, {MSN} 2020, Tokyo, Japan, December 17-19, 2020}, pages = {607--613}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MSN50589.2020.00099}, doi = {10.1109/MSN50589.2020.00099}, timestamp = {Wed, 14 Apr 2021 11:14:58 +0200}, biburl = {https://dblp.org/rec/conf/msn/KoM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuTTM20, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo}, title = {Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2020}, url = {https://eprint.iacr.org/2020/955}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuTTM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DewantaM19, author = {Favian Dewanta and Masahiro Mambo}, title = {A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment}, journal = {{IEEE} Access}, volume = {7}, pages = {103095--103114}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931217}, doi = {10.1109/ACCESS.2019.2931217}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DewantaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/GunawanM19, author = {Dedi Gunawan and Masahiro Mambo}, title = {Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication}, journal = {Future Internet}, volume = {11}, number = {6}, pages = {138}, year = {2019}, url = {https://doi.org/10.3390/fi11060138}, doi = {10.3390/FI11060138}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/GunawanM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiuTTM19, author = {Zi{-}Yuan Liu and Raylin Tso and Yi{-}Fan Tseng and Masahiro Mambo}, title = {Signcryption from {NTRU} Lattices Without Random Oracles}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {134--141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00009}, doi = {10.1109/ASIAJCIS.2019.00009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiuTTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TakeuchiKFM19, author = {Yuma Takeuchi and Shogo Kitajima and Kazuya Fukushima and Masahiro Mambo}, title = {Privacy Risk Evaluation of Re-Identification of Pseudonyms}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {165--172}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00014}, doi = {10.1109/ASIAJCIS.2019.00014}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TakeuchiKFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/DewantaM19, author = {Favian Dewanta and Masahiro Mambo}, title = {Bidding Price-Based Transaction: Trust Establishment for Vehicular Fog Computing Service in Rural Area}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019}, pages = {882--887}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOMW.2019.8730830}, doi = {10.1109/PERCOMW.2019.8730830}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/percom/DewantaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RomanLM18, author = {Rodrigo Roman and Javier L{\'{o}}pez and Masahiro Mambo}, title = {Mobile edge computing, Fog et al.: {A} survey and analysis of security threats and challenges}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {680--698}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.11.009}, doi = {10.1016/J.FUTURE.2016.11.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/RomanLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HigashikawaKKM18, author = {So Higashikawa and Tomoaki Kosugi and Shogo Kitajima and Masahiro Mambo}, title = {Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {1}, pages = {45--52}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017MUP0012}, doi = {10.1587/TRANSINF.2017MUP0012}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HigashikawaKKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Mambo18, author = {Masahiro Mambo}, title = {Foreword}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {9}, pages = {1323}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.1323}, doi = {10.1587/TRANSFUN.E101.A.1323}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Mambo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/GunawanM18, author = {Dedi Gunawan and Masahiro Mambo}, title = {Set-valued Data Anonymization Maintaining Data Utility and Data Property}, booktitle = {Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, {IMCOM} 2018, Langkawi, Malaysia, January 05-07, 2018}, pages = {88:1--88:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3164541.3164583}, doi = {10.1145/3164541.3164583}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/GunawanM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/KuwakadoHM18, author = {Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo}, title = {Parallelizable Message Preprocessing for Merkle-Damg{\aa}rd Hash Functions}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {457--461}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664401}, doi = {10.23919/ISITA.2018.8664401}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/KuwakadoHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Mambo17, author = {Masahiro Mambo}, title = {Foreword}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1}, doi = {10.1587/TRANSFUN.E100.A.1}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Mambo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishinagaM16, author = {Toshifumi Nishinaga and Masahiro Mambo}, title = {Implementation of {\(\mathrm{\mu}\)}NaCl on 32-bit {ARM} Cortex-M0}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {8}, pages = {2056--2060}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015INP0013}, doi = {10.1587/TRANSINF.2015INP0013}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishinagaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RomanLM16, author = {Rodrigo Roman and Javier L{\'{o}}pez and Masahiro Mambo}, title = {Mobile Edge Computing, Fog et al.: {A} Survey and Analysis of Security Threats and Challenges}, journal = {CoRR}, volume = {abs/1602.00484}, year = {2016}, url = {http://arxiv.org/abs/1602.00484}, eprinttype = {arXiv}, eprint = {1602.00484}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RomanLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Mambo15, author = {Masahiro Mambo}, title = {Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society}, journal = {J. Inf. Process.}, volume = {23}, number = {5}, pages = {553}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.553}, doi = {10.2197/IPSJJIP.23.553}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/Mambo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenWTMW15, author = {Chien{-}Ming Chen and Tsu{-}Yang Wu and Raylin Tso and Masahiro Mambo and Mu{-}En Wu}, title = {On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks}, journal = {J. Univers. Comput. Sci.}, volume = {21}, number = {3}, pages = {406--418}, year = {2015}, url = {http://www.jucs.org/jucs\_21\_3/on\_the\_security\_of}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenWTMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenTMHH15, author = {Yu{-}Chi Chen and Raylin Tso and Masahiro Mambo and Kaibin Huang and Gwoboa Horng}, title = {Certificateless aggregate signature with efficient verification}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2232--2243}, year = {2015}, url = {https://doi.org/10.1002/sec.1166}, doi = {10.1002/SEC.1166}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenTMHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KosugiHM15, author = {Tomoaki Kosugi and Tomoki Hayafuji and Masahiro Mambo}, title = {On the Traceability of the Accountable Anonymous Channel}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {6--11}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.29}, doi = {10.1109/ASIAJCIS.2015.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KosugiHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/WahidSM14, author = {Abdul Wahid and Yasushi Sengoku and Masahiro Mambo}, editor = {Dongsoo S. Kim and Sang{-}Wook Kim and Suk{-}Han Lee and Lajos Hanzo and Roslan Ismail}, title = {Toward constructing a secure online examination system}, booktitle = {Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, {IMCOM} 2015, Bali, Indonesia, January 08 - 10, 2015}, pages = {95:1--95:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2701126.2701203}, doi = {10.1145/2701126.2701203}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/WahidSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YanaiMTNO15, author = {Naoto Yanai and Masahiro Mambo and Kazuma Tanaka and Takashi Nishide and Eiji Okamoto}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {32--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_3}, doi = {10.1007/978-3-319-31550-8\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YanaiCMO14, author = {Naoto Yanai and Eikoh Chida and Masahiro Mambo and Eiji Okamoto}, title = {A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles}, journal = {J. Inf. Process.}, volume = {22}, number = {2}, pages = {366--375}, year = {2014}, url = {https://doi.org/10.2197/ipsjjip.22.366}, doi = {10.2197/IPSJJIP.22.366}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YanaiCMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/YanaiMO14, author = {Naoto Yanai and Masahiro Mambo and Eiji Okamoto}, title = {A CDH-based ordered multisignature scheme in the standard model with better efficiency}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {236--240}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979839/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/YanaiMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangSCMYW13, author = {Lihua Wang and Jun Shao and Zhenfu Cao and Masahiro Mambo and Akihiro Yamamura and Licheng Wang}, title = {Certificate-based proxy decryption systems with revocability in the standard model}, journal = {Inf. Sci.}, volume = {247}, pages = {188--201}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2013.06.026}, doi = {10.1016/J.INS.2013.06.026}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangSCMYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13, author = {Hiroya Takahashi and Kenji Yasunaga and Masahiro Mambo and Kwangjo Kim and Heung Youl Youm}, title = {Preventing Abuse of Cookies Stolen by {XSS}}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {85--89}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.20}, doi = {10.1109/ASIAJCIS.2013.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TakahashiYMKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YanaiMO13, author = {Naoto Yanai and Masahiro Mambo and Eiji Okamoto}, editor = {Yvo Desmedt}, title = {An Ordered Multisignature Scheme Under the {CDH} Assumption Without Random Oracles}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {367--377}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_26}, doi = {10.1007/978-3-319-27659-5\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/YanaiMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWMO12, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, title = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {70--88}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.70}, doi = {10.1587/TRANSFUN.E95.A.70}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YanaiTMO12, author = {Naoto Yanai and Raylin Tso and Masahiro Mambo and Eiji Okamoto}, title = {A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {30--54}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.030}, doi = {10.22667/JOWUA.2012.03.31.030}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YanaiTMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YanaiCM11, author = {Naoto Yanai and Eikoh Chida and Masahiro Mambo}, title = {A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1346--1355}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1346}, doi = {10.1587/TRANSFUN.E94.A.1346}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/YanaiCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/YanaiTMO11, author = {Naoto Yanai and Raylin Tso and Masahiro Mambo and Eiji Okamoto}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Certificateless Ordered Sequential Aggregate Signature Scheme}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {662--667}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.60}, doi = {10.1109/INCOS.2011.60}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/YanaiTMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BeuchatDFIIKKMOOSSSTVY10, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} implementations of the eta\({}_{\mbox{T}}\) pairing in characteristic three}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {73--87}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.05.001}, doi = {10.1016/J.COMPELECENG.2009.05.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/BeuchatDFIIKKMOOSSSTVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeePMKW10, author = {Yunho Lee and Sangjoon Park and Masahiro Mambo and Seungjoo Kim and Dongho Won}, title = {Towards trustworthy e-voting using paper receipts}, journal = {Comput. Stand. Interfaces}, volume = {32}, number = {5-6}, pages = {305--311}, year = {2010}, url = {https://doi.org/10.1016/j.csi.2010.03.001}, doi = {10.1016/J.CSI.2010.03.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LeePMKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangWMO10, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {383--400}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_27}, doi = {10.1007/978-3-642-17650-0\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangWMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/YanaiCM10, author = {Naoto Yanai and Eikoh Chida and Masahiro Mambo}, title = {A structured aggregate signature scheme}, booktitle = {Proceedings of the International Symposium on Information Theory and its Applications, {ISITA} 2010, 17-20 October 2010, Taichung, Taiwan}, pages = {795--800}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISITA.2010.5649617}, doi = {10.1109/ISITA.2010.5649617}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isita/YanaiCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/WangWMO10, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {327--346}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_21}, doi = {10.1007/978-3-642-17455-1\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/WangWMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2009, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3}, doi = {10.1007/978-3-642-04846-3}, isbn = {978-3-642-04845-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RahmanNIOMO08, author = {Sk. Md. Mizanur Rahman and Nidal Nasser and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {Anonymous authentication and secure communication protocol for wireless mobile \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {1}, number = {2}, pages = {179--189}, year = {2008}, url = {https://doi.org/10.1002/sec.4}, doi = {10.1002/SEC.4}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RahmanNIOMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2008}, url = {http://eprint.iacr.org/2008/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IsobeKMS07, author = {Shuji Isobe and Wataru Kumagai and Masahiro Mambo and Hiroki Shizuya}, title = {Toward Separating Integer Factoring from Discrete Logarithm mod \emph{p}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {48--53}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.48}, doi = {10.1093/IETFEC/E90-A.1.48}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IsobeKMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WangSCMY07, author = {Lihua Wang and Jun Shao and Zhenfu Cao and Masahiro Mambo and Akihiro Yamamura}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {297--311}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_22}, doi = {10.1007/978-3-540-77026-8\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WangSCMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apscc/2007, editor = {Jie Li and Minyi Guo and Qun Jin and Yongbing Zhang and Liang{-}Jie Zhang and Hai Jin and Masahiro Mambo and Jiro Tanaka and Hiromu Hayashi}, title = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4414425/proceeding}, isbn = {0-7695-3051-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apscc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2007, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1}, doi = {10.1007/978-3-540-75496-1}, isbn = {978-3-540-75495-4}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MamboSOK06, author = {Masahiro Mambo and Mois{\'{e}}s Salinas{-}Rosales and Kazuo Ohta and Noboru Kunihiro}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Problems on the {MR} micropayment schemes}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {363}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128879}, doi = {10.1145/1128817.1128879}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MamboSOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuct/RahmanIOMO06, author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, editor = {Frank Stajano and Hyoung Joong Kim and Jong{-}Suk Chae and Seong{-}Dong Kim}, title = {Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks}, booktitle = {Ubiquitous Convergence Technology, First International Conference, {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4412}, pages = {140--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71789-8\_15}, doi = {10.1007/978-3-540-71789-8\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/icuct/RahmanIOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/RahmanMIO06, author = {Sk. Md. Mizanur Rahman and Masahiro Mambo and Atsuo Inomata and Eiji Okamoto}, title = {An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks}, booktitle = {2006 International Symposium on Applications and the Internet {(SAINT} 2006), 23-27 January 2006, Phoenix, Arizona, {USA}}, pages = {300--306}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SAINT.2006.13}, doi = {10.1109/SAINT.2006.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/RahmanMIO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RahmanIOMO06, author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2006}, url = {http://eprint.iacr.org/2006/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RahmanIOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangOMO06, author = {Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2006}, url = {http://eprint.iacr.org/2006/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KonomaMS05, author = {Chisato Konoma and Masahiro Mambo and Hiroki Shizuya}, title = {The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {81--88}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_81\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KonomaMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IsobeKMS05, author = {Shuji Isobe and Tetsuo Kuriyama and Masahiro Mambo and Hiroki Shizuya}, title = {On the Polynomial Time Computability of Abstract Ray-Tracing Problems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {5}, pages = {1209--1213}, year = {2005}, url = {https://doi.org/10.1093/ietfec/e88-a.5.1206}, doi = {10.1093/IETFEC/E88-A.5.1206}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IsobeKMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/ItagakiMS03, author = {Shintaro Itagaki and Masahiro Mambo and Hiroki Shizuya}, title = {On the Strength of the Strong {RSA} Assumption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {5}, pages = {1164--1170}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_5\_1164}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/ItagakiMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OhMSW03, author = {Soohyun Oh and Masahiro Mambo and Hiroki Shizuya and Dongho Won}, title = {On the Security of Girault Key Agreement Protocols against Active Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {5}, pages = {1181--1189}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_5\_1181}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OhMSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KimMZ03, author = {Seungjoo Kim and Masahiro Mambo and Yuliang Zheng}, editor = {Marc Joye}, title = {Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {227--243}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_16}, doi = {10.1007/3-540-36563-X\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KimMZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/MamboOST02, author = {Masahiro Mambo and Eiji Okamoto and Yasushi Sengoku and Takashi Tanaka}, title = {Simple and Secure Mobile Access under the Flexible Organization Management}, booktitle = {13th International Workshop on Database and Expert Systems Applications {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France}, pages = {456--462}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DEXA.2002.1045940}, doi = {10.1109/DEXA.2002.1045940}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/MamboOST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChidaKMS02, author = {Eikoh Chida and Yosuke Kasai and Masahiro Mambo and Hiroki Shizuya}, editor = {Alfred Menezes and Palash Sarkar}, title = {Spending Offline Divisible Coins with Combining Capability}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {339--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_27}, doi = {10.1007/3-540-36231-2\_27}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ChidaKMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GotoMSW01, author = {Hideaki Goto and Masahiro Mambo and Hiroki Shizuya and Yasuyoshi Watanabe}, editor = {Vijay Varadharajan and Yi Mu}, title = {Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {145--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_13}, doi = {10.1007/3-540-47719-5\_13}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GotoMSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KimCJLMWZ01, author = {Seungjoo Kim and Jung Hee Cheon and Marc Joye and Seongan Lim and Masahiro Mambo and Dongho Won and Yuliang Zheng}, editor = {Bahram Honary}, title = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {114--127}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_11}, doi = {10.1007/3-540-45325-3\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/KimCJLMWZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DoiMO00, author = {Hiroshi Doi and Masahiro Mambo and Eiji Okamoto}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {On the Security of the RSA-Based Multisignature Scheme for Various Group Structures}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {352--367}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_29}, doi = {10.1007/10718964\_29}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DoiMO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GotoMMS00, author = {Hideaki Goto and Masahiro Mambo and Kenjiro Matsumura and Hiroki Shizuya}, editor = {Josef Pieprzyk and Eiji Okamoto and Jennifer Seberry}, title = {An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software}, booktitle = {Information Security, Third International Workshop, {ISW} 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1975}, pages = {82--96}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44456-4\_7}, doi = {10.1007/3-540-44456-4\_7}, timestamp = {Sun, 02 Jun 2019 21:14:19 +0200}, biburl = {https://dblp.org/rec/conf/isw/GotoMMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00, author = {Mike Burmester and Yvo Desmedt and Hiroshi Doi and Masahiro Mambo and Eiji Okamoto and Mitsuru Tada and Yuko Yoshifuji}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Structured ElGamal-Type Multisignature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {466--483}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_31}, doi = {10.1007/978-3-540-46588-1\_31}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/KitazawaYOM99, author = {Shigeki Kitazawa and Xun Yi and Eiji Okamoto and Masahiro Mambo}, title = {Improvement of Secure Access Control Agent for Distributed Files}, booktitle = {Proceedings of the 1999 International Conference on Parallel Processing Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999}, pages = {185--191}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICPPW.1999.800060}, doi = {10.1109/ICPPW.1999.800060}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/KitazawaYOM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KimLMP99, author = {Seungjoo Kim and Insoo Lee and Masahiro Mambo and Sungjun Park}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {On the Difficulty of Key Recovery Systems}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {207--224}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_18}, doi = {10.1007/3-540-47790-X\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KimLMP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/1999, editor = {Masahiro Mambo and Yuliang Zheng}, title = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X}, doi = {10.1007/3-540-47790-X}, isbn = {3-540-66695-8}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SyukriOM98, author = {Agus Fanar Syukri and Eiji Okamoto and Masahiro Mambo}, editor = {Colin Boyd and Ed Dawson}, title = {A User Identification System Using Signature Written with Mouse}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {403--414}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053751}, doi = {10.1007/BFB0053751}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SyukriOM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MamboS98, author = {Masahiro Mambo and Hiroki Shizuya}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {258--262}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054031}, doi = {10.1007/BFB0054031}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MamboS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/1997, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0030404}, doi = {10.1007/BFB0030404}, isbn = {3-540-64382-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MamboOS97, author = {Masahiro Mambo and Eiji Okamoto and Kouichi Sakurai}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Protection of Data and Delegated Keys in Digital Distribution}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {271--282}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027934}, doi = {10.1007/BFB0027934}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MamboOS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HayashiOM97, author = {Kenichi Hayashi and Eiji Okamoto and Masahiro Mambo}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Proposal of user identification scheme using mouse}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {144--148}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028470}, doi = {10.1007/BFB0028470}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/HayashiOM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SakazakiOM97, author = {Hisao Sakazaki and Eiji Okamoto and Masahiro Mambo}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {The Application of ID-Based Key Distribution Systems to an Elliptic Curve}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {335--344}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030434}, doi = {10.1007/BFB0030434}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/SakazakiOM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MamboMO97, author = {Masahiro Mambo and Takanori Murayama and Eiji Okamoto}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {A tentative approach to constructing tamper-resistant software}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {23--33}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283736}, doi = {10.1145/283699.283736}, timestamp = {Thu, 09 Sep 2021 18:23:55 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MamboMO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MamboSO96, author = {Masahiro Mambo and Kouichi Sakurai and Eiji Okamoto}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {322--333}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034858}, doi = {10.1007/BFB0034858}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MamboSO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MamboUO96, author = {Masahiro Mambo and Keisuke Usuda and Eiji Okamoto}, editor = {Li Gong and Jacques Stearn}, title = {Proxy Signatures for Delegating Signing Operation}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {48--57}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238185}, doi = {10.1145/238168.238185}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MamboUO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoUM95, author = {Eiji Okamoto and Tomohiko Uyematsu and Masahiro Mambo}, title = {Permutation Cipher Scheme Using Polynomials over a Field}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {78-D}, number = {2}, pages = {138--142}, year = {1995}, url = {http://search.ieice.org/bin/summary.php?id=e78-d\_2\_138}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoUM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/MamboKT92, author = {Masahiro Mambo and Hirotsugu Kinoshita and Shigeo Tsujii}, title = {Communication protocols with untraceability of sender and receiver}, journal = {Syst. Comput. Jpn.}, volume = {23}, number = {9}, pages = {11--18}, year = {1992}, url = {https://doi.org/10.1002/scj.4690230902}, doi = {10.1002/SCJ.4690230902}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/MamboKT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.