BibTeX records: Masahiro Mambo

download as .bib file

@article{DBLP:journals/sensors/PurnamaM24,
  author       = {Hari Purnama and
                  Masahiro Mambo},
  title        = {{IHIBE:} {A} Hierarchical and Delegated Access Control Mechanism for
                  IoT Environments},
  journal      = {Sensors},
  volume       = {24},
  number       = {3},
  pages        = {979},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24030979},
  doi          = {10.3390/S24030979},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/PurnamaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KurniawanM23,
  author       = {Hendra Kurniawan and
                  Masahiro Mambo},
  title        = {A Reliable Application of {MPC} for Securing the Tri-Training Algorithm},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {34718--34735},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3264903},
  doi          = {10.1109/ACCESS.2023.3264903},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KurniawanM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengLM23,
  author       = {Mingmei Zheng and
                  Zi{-}Yuan Liu and
                  Masahiro Mambo},
  title        = {A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear
                  Sketch},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {62510--62521},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3287777},
  doi          = {10.1109/ACCESS.2023.3287777},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhengLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SanjoyoM22,
  author       = {Danu Dwi Sanjoyo and
                  Masahiro Mambo},
  title        = {Accountable Bootstrapping Based on Attack Resilient Public Key Infrastructure
                  and Secure Zero Touch Provisioning},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {134086--134112},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3231015},
  doi          = {10.1109/ACCESS.2022.3231015},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SanjoyoM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuTTMC22,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo and
                  Yu{-}Chi Chen},
  title        = {Public-Key Authenticated Encryption with Keyword Search: {A} Generic
                  Construction and Its Quantum-Resistant Instantiation},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {10},
  pages        = {2828--2844},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab119},
  doi          = {10.1093/COMJNL/BXAB119},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LiuTTMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/KurniawanM22,
  author       = {Hendra Kurniawan and
                  Masahiro Mambo},
  title        = {Homomorphic Encryption-Based Federated Privacy Preservation for Deep
                  Active Learning},
  journal      = {Entropy},
  volume       = {24},
  number       = {11},
  pages        = {1545},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24111545},
  doi          = {10.3390/E24111545},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/KurniawanM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiuTTMC22,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo and
                  Yu{-}Chi Chen},
  title        = {Quantum-resistant anonymous identity-based encryption with trable
                  identities},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {111--126},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12049},
  doi          = {10.1049/ISE2.12049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiuTTMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/WantoroM22,
  author       = {Jan Wantoro and
                  Masahiro Mambo},
  title        = {Efficient and Privacy-Preserving Certificate Activation for {V2X}
                  Pseudonym Certificate Revocation},
  journal      = {J. Sens. Actuator Networks},
  volume       = {11},
  number       = {3},
  pages        = {51},
  year         = {2022},
  url          = {https://doi.org/10.3390/jsan11030051},
  doi          = {10.3390/JSAN11030051},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/WantoroM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiuTTCM22,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Yu{-}Chi Chen and
                  Masahiro Mambo},
  title        = {Identity-Certifying Authority-Aided Identity-Based Searchable Encryption
                  Framework in Cloud Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {3},
  pages        = {4629--4640},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2021.3103909},
  doi          = {10.1109/JSYST.2021.3103909},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LiuTTCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/LiuTTMC22,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo and
                  Yu{-}Chi Chen},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Public-key Authenticated Encryption with Keyword Search: Cryptanalysis,
                  Enhanced Security, and Quantum-resistant Instantiation},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {423--436},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497760},
  doi          = {10.1145/3488932.3497760},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/LiuTTMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/KatoSM22,
  author       = {Takuya Kato and
                  Hiroto Shiba and
                  Masahiro Mambo},
  title        = {On the Identity Match Rate in Web Browsing History},
  booktitle    = {2022 Tenth International Symposium on Computing and Networking, {CANDAR}
                  2022 - Workshops, Himeji, Japan, November 21-24, 2022},
  pages        = {384--387},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CANDARW57323.2022.00075},
  doi          = {10.1109/CANDARW57323.2022.00075},
  timestamp    = {Thu, 23 Mar 2023 08:30:32 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/KatoSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuCTTM22,
  author       = {Zi{-}Yuan Liu and
                  Chu{-}Chieh Chien and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Public Key Encryption with Hierarchical Authorized Keyword Search},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {147--170},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_8},
  doi          = {10.1007/978-3-031-29371-9\_8},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuCTTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YouLTTM22,
  author       = {Jing{-}Shiuan You and
                  Zi{-}Yuan Liu and
                  Raylin Tso and
                  Yi{-}Fan Tseng and
                  Masahiro Mambo},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {166--186},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_9},
  doi          = {10.1007/978-3-031-15255-9\_9},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YouLTTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DewantaM21,
  author       = {Favian Dewanta and
                  Masahiro Mambo},
  title        = {Corrections to "A Mutual Authentication Scheme for Secure Fog
                  Computing Service Handover in Vehicular Network Environment"},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {143592},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3121106},
  doi          = {10.1109/ACCESS.2021.3121106},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DewantaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuTTM21,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo},
  title        = {Designated-ciphertext searchable encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102709},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102709},
  doi          = {10.1016/J.JISA.2020.102709},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuTTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HlaingFM21,
  author       = {Htet Htet Hlaing and
                  Yuki Funamoto and
                  Masahiro Mambo},
  title        = {Secure Content Distribution with Access Control Enforcement in Named
                  Data Networking},
  journal      = {Sensors},
  volume       = {21},
  number       = {13},
  pages        = {4477},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21134477},
  doi          = {10.3390/S21134477},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HlaingFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/DewantaM21,
  author       = {Favian Dewanta and
                  Masahiro Mambo},
  title        = {{BPT} Scheme: Establishing Trusted Vehicular Fog Computing Service
                  for Rural Area Based on Blockchain Approach},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {2},
  pages        = {1752--1769},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3051258},
  doi          = {10.1109/TVT.2021.3051258},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/DewantaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/HlaingFM21,
  author       = {Htet Htet Hlaing and
                  Yuki Funamoto and
                  Masahiro Mambo},
  title        = {Performance Comparison of Hybrid Encryption-based Access Control Schemes
                  in {NDN}},
  booktitle    = {17th International Conference on Mobility, Sensing and Networking,
                  {MSN} 2021, Exeter, United Kingdom, December 13-15, 2021},
  pages        = {622--627},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSN53354.2021.00095},
  doi          = {10.1109/MSN53354.2021.00095},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/HlaingFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuTTMC21,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo and
                  Yu{-}Chi Chen},
  title        = {Quantum-resistant Anonymous {IBE} with Traceable Identities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/033},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuTTMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuTTCM21,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Yu{-}Chi Chen and
                  Masahiro Mambo},
  title        = {Identity-certifying Authority-aided Identity-based Searchable Encryption
                  Framework in Cloud System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/337},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuTTCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuwakadoHM21,
  author       = {Hidenori Kuwakado and
                  Shoichi Hirose and
                  Masahiro Mambo},
  title        = {White-Box Encryption Scheme Using a Quantum Memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/589},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuwakadoHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuTTMC21a,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo and
                  Yu{-}Chi Chen},
  title        = {Public-key Authenticated Encryption with Keyword Search: Cryptanalysis,
                  Enhanced Security, and Quantum-resistant Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1008},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1008},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuTTMC21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KoHM20,
  author       = {Kyi Thar Ko and
                  Htet Htet Hlaing and
                  Masahiro Mambo},
  title        = {A PEKS-Based {NDN} Strategy for Name Privacy},
  journal      = {Future Internet},
  volume       = {12},
  number       = {8},
  pages        = {130},
  year         = {2020},
  url          = {https://doi.org/10.3390/fi12080130},
  doi          = {10.3390/FI12080130},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/KoHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/KoM20,
  author       = {Kyi Thar Ko and
                  Masahiro Mambo},
  title        = {Trapdoor Assignment of PEKS-based {NDN} Strategy in Two-Tier Networks},
  booktitle    = {16th International Conference on Mobility, Sensing and Networking,
                  {MSN} 2020, Tokyo, Japan, December 17-19, 2020},
  pages        = {607--613},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSN50589.2020.00099},
  doi          = {10.1109/MSN50589.2020.00099},
  timestamp    = {Wed, 14 Apr 2021 11:14:58 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/KoM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuTTM20,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo},
  title        = {Quantum-resistant Public-key Authenticated Encryption with Keyword
                  Search for Industrial Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/955},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuTTM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DewantaM19,
  author       = {Favian Dewanta and
                  Masahiro Mambo},
  title        = {A Mutual Authentication Scheme for Secure Fog Computing Service Handover
                  in Vehicular Network Environment},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {103095--103114},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2931217},
  doi          = {10.1109/ACCESS.2019.2931217},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DewantaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/GunawanM19,
  author       = {Dedi Gunawan and
                  Masahiro Mambo},
  title        = {Data Anonymization for Hiding Personal Tendency in Set-Valued Database
                  Publication},
  journal      = {Future Internet},
  volume       = {11},
  number       = {6},
  pages        = {138},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11060138},
  doi          = {10.3390/FI11060138},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/GunawanM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiuTTM19,
  author       = {Zi{-}Yuan Liu and
                  Raylin Tso and
                  Yi{-}Fan Tseng and
                  Masahiro Mambo},
  title        = {Signcryption from {NTRU} Lattices Without Random Oracles},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {134--141},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00009},
  doi          = {10.1109/ASIAJCIS.2019.00009},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiuTTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakeuchiKFM19,
  author       = {Yuma Takeuchi and
                  Shogo Kitajima and
                  Kazuya Fukushima and
                  Masahiro Mambo},
  title        = {Privacy Risk Evaluation of Re-Identification of Pseudonyms},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {165--172},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00014},
  doi          = {10.1109/ASIAJCIS.2019.00014},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TakeuchiKFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/DewantaM19,
  author       = {Favian Dewanta and
                  Masahiro Mambo},
  title        = {Bidding Price-Based Transaction: Trust Establishment for Vehicular
                  Fog Computing Service in Rural Area},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019},
  pages        = {882--887},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOMW.2019.8730830},
  doi          = {10.1109/PERCOMW.2019.8730830},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/DewantaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/RomanLM18,
  author       = {Rodrigo Roman and
                  Javier L{\'{o}}pez and
                  Masahiro Mambo},
  title        = {Mobile edge computing, Fog et al.: {A} survey and analysis of security
                  threats and challenges},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {680--698},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.11.009},
  doi          = {10.1016/J.FUTURE.2016.11.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/RomanLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HigashikawaKKM18,
  author       = {So Higashikawa and
                  Tomoaki Kosugi and
                  Shogo Kitajima and
                  Masahiro Mambo},
  title        = {Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern
                  Lock},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {1},
  pages        = {45--52},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017MUP0012},
  doi          = {10.1587/TRANSINF.2017MUP0012},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HigashikawaKKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Mambo18,
  author       = {Masahiro Mambo},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {9},
  pages        = {1323},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.1323},
  doi          = {10.1587/TRANSFUN.E101.A.1323},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Mambo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/GunawanM18,
  author       = {Dedi Gunawan and
                  Masahiro Mambo},
  title        = {Set-valued Data Anonymization Maintaining Data Utility and Data Property},
  booktitle    = {Proceedings of the 12th International Conference on Ubiquitous Information
                  Management and Communication, {IMCOM} 2018, Langkawi, Malaysia, January
                  05-07, 2018},
  pages        = {88:1--88:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3164541.3164583},
  doi          = {10.1145/3164541.3164583},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/GunawanM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KuwakadoHM18,
  author       = {Hidenori Kuwakado and
                  Shoichi Hirose and
                  Masahiro Mambo},
  title        = {Parallelizable Message Preprocessing for Merkle-Damg{\aa}rd Hash Functions},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {457--461},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664401},
  doi          = {10.23919/ISITA.2018.8664401},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/KuwakadoHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Mambo17,
  author       = {Masahiro Mambo},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1},
  doi          = {10.1587/TRANSFUN.E100.A.1},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Mambo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishinagaM16,
  author       = {Toshifumi Nishinaga and
                  Masahiro Mambo},
  title        = {Implementation of {\(\mathrm{\mu}\)}NaCl on 32-bit {ARM} Cortex-M0},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {8},
  pages        = {2056--2060},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015INP0013},
  doi          = {10.1587/TRANSINF.2015INP0013},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishinagaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RomanLM16,
  author       = {Rodrigo Roman and
                  Javier L{\'{o}}pez and
                  Masahiro Mambo},
  title        = {Mobile Edge Computing, Fog et al.: {A} Survey and Analysis of Security
                  Threats and Challenges},
  journal      = {CoRR},
  volume       = {abs/1602.00484},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.00484},
  eprinttype    = {arXiv},
  eprint       = {1602.00484},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RomanLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Mambo15,
  author       = {Masahiro Mambo},
  title        = {Editor's Message to Special issue of Computer Security Technologies
                  to be Indispensable to the Society},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {5},
  pages        = {553},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.553},
  doi          = {10.2197/IPSJJIP.23.553},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/Mambo15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenWTMW15,
  author       = {Chien{-}Ming Chen and
                  Tsu{-}Yang Wu and
                  Raylin Tso and
                  Masahiro Mambo and
                  Mu{-}En Wu},
  title        = {On the Security of a User Equipment Registration Procedure in Femtocell-Enabled
                  Networks},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {21},
  number       = {3},
  pages        = {406--418},
  year         = {2015},
  url          = {http://www.jucs.org/jucs\_21\_3/on\_the\_security\_of},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenWTMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenTMHH15,
  author       = {Yu{-}Chi Chen and
                  Raylin Tso and
                  Masahiro Mambo and
                  Kaibin Huang and
                  Gwoboa Horng},
  title        = {Certificateless aggregate signature with efficient verification},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2232--2243},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1166},
  doi          = {10.1002/SEC.1166},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenTMHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KosugiHM15,
  author       = {Tomoaki Kosugi and
                  Tomoki Hayafuji and
                  Masahiro Mambo},
  title        = {On the Traceability of the Accountable Anonymous Channel},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {6--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.29},
  doi          = {10.1109/ASIAJCIS.2015.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KosugiHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/WahidSM14,
  author       = {Abdul Wahid and
                  Yasushi Sengoku and
                  Masahiro Mambo},
  editor       = {Dongsoo S. Kim and
                  Sang{-}Wook Kim and
                  Suk{-}Han Lee and
                  Lajos Hanzo and
                  Roslan Ismail},
  title        = {Toward constructing a secure online examination system},
  booktitle    = {Proceedings of the 9th International Conference on Ubiquitous Information
                  Management and Communication, {IMCOM} 2015, Bali, Indonesia, January
                  08 - 10, 2015},
  pages        = {95:1--95:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2701126.2701203},
  doi          = {10.1145/2701126.2701203},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/WahidSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanaiMTNO15,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Kazuma Tanaka and
                  Takashi Nishide and
                  Eiji Okamoto},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Another Look at Aggregate Signatures: Their Capability and Security
                  on Network Graphs},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_3},
  doi          = {10.1007/978-3-319-31550-8\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YanaiCMO14,
  author       = {Naoto Yanai and
                  Eikoh Chida and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A CDH-based Ordered Multisignature Scheme Provably Secure without
                  Random Oracles},
  journal      = {J. Inf. Process.},
  volume       = {22},
  number       = {2},
  pages        = {366--375},
  year         = {2014},
  url          = {https://doi.org/10.2197/ipsjjip.22.366},
  doi          = {10.2197/IPSJJIP.22.366},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/YanaiCMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/YanaiMO14,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A CDH-based ordered multisignature scheme in the standard model with
                  better efficiency},
  booktitle    = {International Symposium on Information Theory and its Applications,
                  {ISITA} 2014, Melbourne, Australia, October 26-29, 2014},
  pages        = {236--240},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6979839/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/YanaiMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangSCMYW13,
  author       = {Lihua Wang and
                  Jun Shao and
                  Zhenfu Cao and
                  Masahiro Mambo and
                  Akihiro Yamamura and
                  Licheng Wang},
  title        = {Certificate-based proxy decryption systems with revocability in the
                  standard model},
  journal      = {Inf. Sci.},
  volume       = {247},
  pages        = {188--201},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2013.06.026},
  doi          = {10.1016/J.INS.2013.06.026},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangSCMYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13,
  author       = {Hiroya Takahashi and
                  Kenji Yasunaga and
                  Masahiro Mambo and
                  Kwangjo Kim and
                  Heung Youl Youm},
  title        = {Preventing Abuse of Cookies Stolen by {XSS}},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {85--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.20},
  doi          = {10.1109/ASIAJCIS.2013.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TakahashiYMKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YanaiMO13,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Yvo Desmedt},
  title        = {An Ordered Multisignature Scheme Under the {CDH} Assumption Without
                  Random Oracles},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {367--377},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_26},
  doi          = {10.1007/978-3-319-27659-5\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/YanaiMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWMO12,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
                  Confidentialities},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {70--88},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.70},
  doi          = {10.1587/TRANSFUN.E95.A.70},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YanaiTMO12,
  author       = {Naoto Yanai and
                  Raylin Tso and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A Certificateless Ordered Sequential Aggregate Signature Scheme Secure
                  against Super Adverssaries},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {30--54},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.030},
  doi          = {10.22667/JOWUA.2012.03.31.030},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YanaiTMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YanaiCM11,
  author       = {Naoto Yanai and
                  Eikoh Chida and
                  Masahiro Mambo},
  title        = {A Secure Structured Multisignature Scheme Based on a Non-commutative
                  Ring Homomorphism},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1346--1355},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1346},
  doi          = {10.1587/TRANSFUN.E94.A.1346},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/YanaiCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/YanaiTMO11,
  author       = {Naoto Yanai and
                  Raylin Tso and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Certificateless Ordered Sequential Aggregate Signature Scheme},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {662--667},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.60},
  doi          = {10.1109/INCOS.2011.60},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/YanaiTMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BeuchatDFIIKKMOOSSSTVY10,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} implementations of the eta\({}_{\mbox{T}}\) pairing
                  in characteristic three},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {73--87},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.05.001},
  doi          = {10.1016/J.COMPELECENG.2009.05.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/BeuchatDFIIKKMOOSSSTVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeePMKW10,
  author       = {Yunho Lee and
                  Sangjoon Park and
                  Masahiro Mambo and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Towards trustworthy e-voting using paper receipts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {32},
  number       = {5-6},
  pages        = {305--311},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.csi.2010.03.001},
  doi          = {10.1016/J.CSI.2010.03.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LeePMKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangWMO10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
                  Confidentialities},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {383--400},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_27},
  doi          = {10.1007/978-3-642-17650-0\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangWMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/YanaiCM10,
  author       = {Naoto Yanai and
                  Eikoh Chida and
                  Masahiro Mambo},
  title        = {A structured aggregate signature scheme},
  booktitle    = {Proceedings of the International Symposium on Information Theory and
                  its Applications, {ISITA} 2010, 17-20 October 2010, Taichung, Taiwan},
  pages        = {795--800},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISITA.2010.5649617},
  doi          = {10.1109/ISITA.2010.5649617},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/YanaiCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/WangWMO10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion
                  Attacks},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {327--346},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_21},
  doi          = {10.1007/978-3-642-17455-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/WangWMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3},
  doi          = {10.1007/978-3-642-04846-3},
  isbn         = {978-3-642-04845-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RahmanNIOMO08,
  author       = {Sk. Md. Mizanur Rahman and
                  Nidal Nasser and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Anonymous authentication and secure communication protocol for wireless
                  mobile \emph{ad hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {2},
  pages        = {179--189},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.4},
  doi          = {10.1002/SEC.4},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RahmanNIOMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IsobeKMS07,
  author       = {Shuji Isobe and
                  Wataru Kumagai and
                  Masahiro Mambo and
                  Hiroki Shizuya},
  title        = {Toward Separating Integer Factoring from Discrete Logarithm mod \emph{p}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {48--53},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.48},
  doi          = {10.1093/IETFEC/E90-A.1.48},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IsobeKMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangSCMY07,
  author       = {Lihua Wang and
                  Jun Shao and
                  Zhenfu Cao and
                  Masahiro Mambo and
                  Akihiro Yamamura},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption
                  Power},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_22},
  doi          = {10.1007/978-3-540-77026-8\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WangSCMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apscc/2007,
  editor       = {Jie Li and
                  Minyi Guo and
                  Qun Jin and
                  Yongbing Zhang and
                  Liang{-}Jie Zhang and
                  Hai Jin and
                  Masahiro Mambo and
                  Jiro Tanaka and
                  Hiromu Hayashi},
  title        = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4414425/proceeding},
  isbn         = {0-7695-3051-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apscc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2007,
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1},
  doi          = {10.1007/978-3-540-75496-1},
  isbn         = {978-3-540-75495-4},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MamboSOK06,
  author       = {Masahiro Mambo and
                  Mois{\'{e}}s Salinas{-}Rosales and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Problems on the {MR} micropayment schemes},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {363},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128879},
  doi          = {10.1145/1128817.1128879},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MamboSOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuct/RahmanIOMO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Frank Stajano and
                  Hyoung Joong Kim and
                  Jong{-}Suk Chae and
                  Seong{-}Dong Kim},
  title        = {Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks},
  booktitle    = {Ubiquitous Convergence Technology, First International Conference,
                  {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4412},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71789-8\_15},
  doi          = {10.1007/978-3-540-71789-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icuct/RahmanIOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/RahmanMIO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Masahiro Mambo and
                  Atsuo Inomata and
                  Eiji Okamoto},
  title        = {An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks},
  booktitle    = {2006 International Symposium on Applications and the Internet {(SAINT}
                  2006), 23-27 January 2006, Phoenix, Arizona, {USA}},
  pages        = {300--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SAINT.2006.13},
  doi          = {10.1109/SAINT.2006.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/RahmanMIO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RahmanIOMO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RahmanIOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangOMO06,
  author       = {Lihua Wang and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A Subject-Delegated Decryption Scheme with "Tightly" Limited
                  Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KonomaMS05,
  author       = {Chisato Konoma and
                  Masahiro Mambo and
                  Hiroki Shizuya},
  title        = {The Computational Difficulty of Solving Cryptographic Primitive Problems
                  Related to the Discrete Logarithm Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {81--88},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_81\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KonomaMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IsobeKMS05,
  author       = {Shuji Isobe and
                  Tetsuo Kuriyama and
                  Masahiro Mambo and
                  Hiroki Shizuya},
  title        = {On the Polynomial Time Computability of Abstract Ray-Tracing Problems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {5},
  pages        = {1209--1213},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietfec/e88-a.5.1206},
  doi          = {10.1093/IETFEC/E88-A.5.1206},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IsobeKMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/ItagakiMS03,
  author       = {Shintaro Itagaki and
                  Masahiro Mambo and
                  Hiroki Shizuya},
  title        = {On the Strength of the Strong {RSA} Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {5},
  pages        = {1164--1170},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_5\_1164},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/ItagakiMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OhMSW03,
  author       = {Soohyun Oh and
                  Masahiro Mambo and
                  Hiroki Shizuya and
                  Dongho Won},
  title        = {On the Security of Girault Key Agreement Protocols against Active
                  Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {5},
  pages        = {1181--1189},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_5\_1181},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OhMSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KimMZ03,
  author       = {Seungjoo Kim and
                  Masahiro Mambo and
                  Yuliang Zheng},
  editor       = {Marc Joye},
  title        = {Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_16},
  doi          = {10.1007/3-540-36563-X\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KimMZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/MamboOST02,
  author       = {Masahiro Mambo and
                  Eiji Okamoto and
                  Yasushi Sengoku and
                  Takashi Tanaka},
  title        = {Simple and Secure Mobile Access under the Flexible Organization Management},
  booktitle    = {13th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France},
  pages        = {456--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DEXA.2002.1045940},
  doi          = {10.1109/DEXA.2002.1045940},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/MamboOST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChidaKMS02,
  author       = {Eikoh Chida and
                  Yosuke Kasai and
                  Masahiro Mambo and
                  Hiroki Shizuya},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Spending Offline Divisible Coins with Combining Capability},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_27},
  doi          = {10.1007/3-540-36231-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChidaKMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GotoMSW01,
  author       = {Hideaki Goto and
                  Masahiro Mambo and
                  Hiroki Shizuya and
                  Yasuyoshi Watanabe},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Evaluation of Tamper-Resistant Software Deviating from Structured
                  Programming Rules},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_13},
  doi          = {10.1007/3-540-47719-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GotoMSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KimCJLMWZ01,
  author       = {Seungjoo Kim and
                  Jung Hee Cheon and
                  Marc Joye and
                  Seongan Lim and
                  Masahiro Mambo and
                  Dongho Won and
                  Yuliang Zheng},
  editor       = {Bahram Honary},
  title        = {Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The
                  Importance of the Order of Decryption and Validation)},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_11},
  doi          = {10.1007/3-540-45325-3\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/KimCJLMWZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DoiMO00,
  author       = {Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {On the Security of the RSA-Based Multisignature Scheme for Various
                  Group Structures},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {352--367},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_29},
  doi          = {10.1007/10718964\_29},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DoiMO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GotoMMS00,
  author       = {Hideaki Goto and
                  Masahiro Mambo and
                  Kenjiro Matsumura and
                  Hiroki Shizuya},
  editor       = {Josef Pieprzyk and
                  Eiji Okamoto and
                  Jennifer Seberry},
  title        = {An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant
                  Software},
  booktitle    = {Information Security, Third International Workshop, {ISW} 2000, Wollongong,
                  NSW, Australia, December 20-21, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1975},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44456-4\_7},
  doi          = {10.1007/3-540-44456-4\_7},
  timestamp    = {Sun, 02 Jun 2019 21:14:19 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GotoMMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Mitsuru Tada and
                  Yuko Yoshifuji},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Structured ElGamal-Type Multisignature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_31},
  doi          = {10.1007/978-3-540-46588-1\_31},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/KitazawaYOM99,
  author       = {Shigeki Kitazawa and
                  Xun Yi and
                  Eiji Okamoto and
                  Masahiro Mambo},
  title        = {Improvement of Secure Access Control Agent for Distributed Files},
  booktitle    = {Proceedings of the 1999 International Conference on Parallel Processing
                  Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages        = {185--191},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICPPW.1999.800060},
  doi          = {10.1109/ICPPW.1999.800060},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/KitazawaYOM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KimLMP99,
  author       = {Seungjoo Kim and
                  Insoo Lee and
                  Masahiro Mambo and
                  Sungjun Park},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {On the Difficulty of Key Recovery Systems},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_18},
  doi          = {10.1007/3-540-47790-X\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KimLMP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/1999,
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X},
  doi          = {10.1007/3-540-47790-X},
  isbn         = {3-540-66695-8},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SyukriOM98,
  author       = {Agus Fanar Syukri and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A User Identification System Using Signature Written with Mouse},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {403--414},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053751},
  doi          = {10.1007/BFB0053751},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SyukriOM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MamboS98,
  author       = {Masahiro Mambo and
                  Hiroki Shizuya},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange
                  Scheme},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {258--262},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054031},
  doi          = {10.1007/BFB0054031},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MamboS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/1997,
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0030404},
  doi          = {10.1007/BFB0030404},
  isbn         = {3-540-64382-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MamboOS97,
  author       = {Masahiro Mambo and
                  Eiji Okamoto and
                  Kouichi Sakurai},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Protection of Data and Delegated Keys in Digital Distribution},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027934},
  doi          = {10.1007/BFB0027934},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MamboOS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HayashiOM97,
  author       = {Kenichi Hayashi and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Proposal of user identification scheme using mouse},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {144--148},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028470},
  doi          = {10.1007/BFB0028470},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HayashiOM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SakazakiOM97,
  author       = {Hisao Sakazaki and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {The Application of ID-Based Key Distribution Systems to an Elliptic
                  Curve},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030434},
  doi          = {10.1007/BFB0030434},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/SakazakiOM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MamboMO97,
  author       = {Masahiro Mambo and
                  Takanori Murayama and
                  Eiji Okamoto},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {A tentative approach to constructing tamper-resistant software},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283736},
  doi          = {10.1145/283699.283736},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MamboMO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MamboSO96,
  author       = {Masahiro Mambo and
                  Kouichi Sakurai and
                  Eiji Okamoto},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {How to Utilize the Transformability of Digital Signatures for Solving
                  the Oracle Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {322--333},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034858},
  doi          = {10.1007/BFB0034858},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MamboSO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MamboUO96,
  author       = {Masahiro Mambo and
                  Keisuke Usuda and
                  Eiji Okamoto},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Proxy Signatures for Delegating Signing Operation},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {48--57},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238185},
  doi          = {10.1145/238168.238185},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MamboUO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoUM95,
  author       = {Eiji Okamoto and
                  Tomohiko Uyematsu and
                  Masahiro Mambo},
  title        = {Permutation Cipher Scheme Using Polynomials over a Field},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {78-D},
  number       = {2},
  pages        = {138--142},
  year         = {1995},
  url          = {http://search.ieice.org/bin/summary.php?id=e78-d\_2\_138},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoUM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/MamboKT92,
  author       = {Masahiro Mambo and
                  Hirotsugu Kinoshita and
                  Shigeo Tsujii},
  title        = {Communication protocols with untraceability of sender and receiver},
  journal      = {Syst. Comput. Jpn.},
  volume       = {23},
  number       = {9},
  pages        = {11--18},
  year         = {1992},
  url          = {https://doi.org/10.1002/scj.4690230902},
  doi          = {10.1002/SCJ.4690230902},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/MamboKT92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics