|
JAIST Repository >
著者: "Soshi, Masakazu"
20 著者名表示.
発行日 | タイトル |
著者 |
22-Mar-2000 | 匿名通信を記述するためのフレームワークについて | 北澤, 繁樹; 双紙, 正和; 宮地, 充子; KITAZAWA, Shigeki; SOSHI, Masakazu; MIYAJI, Atsuko |
10-May-2000 | 匿名通信フレームワークとその評価 | 北澤, 繁樹; 双紙, 正和; 宮地, 充子; KITAZAWA, Shigeki; SOSHI, Masakazu; MIYAJI, Atsuko |
Aug-2000 | オープンネットワークにおける安全な暗号方式の更新に関する考察 | 山田, 竜也; 宮地, 充子; 双紙, 正和; YAMADA, TATSUYA; MIYAJI, ATSUKO; SOSHI, MASAKAZU |
Aug-2000 | 初等的な環状経路を用いた匿名通信方式 | 北澤, 繁樹; 長野, 悟; 双紙, 正和; 宮地, 充子; KITAZAWA, SHIGEKI; NAGANO, SATORU; SOSHI, MASAKAZU; MIYAJI, ATSUKO |
2003 | Evaluation of Anonymity of Practical Anonymous Communication Networks | Kitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko |
2003 | Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents | Sakabe, Yusuke; Soshi, Masakazu; Miyaji, Atsuko |
Jan-2003 | Software Obfuscation on a Theoretical Basis and Its Implementation | OGISO, Toshio; SAKABE, Yusuke; SOSHI, Masakazu; MIYAJI, Atsuko |
Aug-2004 | Pushback機構の一提案とそのモデル化に向けて | 寺田, 剛陽; 双紙, 正和; 宮地, 充子; Terada, Takeaki; Soshi, Masakazu; Miyaji, Atsuko |
Aug-2004 | On Anonymity Metrics for Practical Anonymous Communication Protocols | Kitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko |
Apr-2005 | n 次元量子状態を使用した量子コイン投げプロトコル | 早稲田, 篤志; 双紙, 正和; 宮地, 充子; Waseda, Atsushi; Soshi, Masakazu; Miyaji, Atsuko |
Aug-2005 | Java Obfuscation - Approaches to Construct Tamper-Resistant Object-Oriented Programs | Sakabe, Yusuke; Soshi, Masakazu; Miyaji, Atsuko |
2007 | Mobile agent security with efficient oblivious transfer | Hasegawa, Wataru; Soshi, Masakazu; Miyaji, Atsuko |
Jul-2007 | 量子複数秘密分散に関する考察 | 早稲田, 篤志; 双紙, 正和; 宮地, 充子; Waseda, Atsushi; Soshi, Masakazu; Miyaji, Atsuko |
2009 | A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Omote, Kazumasa; Soshi, Masakazu |
Mar-2009 | A Secure RFID Authentication Protocol with Low Communication Cost | Rahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko |
2-Jul-2010 | A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu |
2011 | Hidden Credential Retrieval Without Random Oracles | Miyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu |
Sep-2011 | Efficient and Low-Cost RFID Authentication Schemes | Miyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu |
1-Nov-2011 | Ideal Secret Sharing Schemes with Share Selectability | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Rahman, Mohammad Shahriar; Soshi, Masakazu |
2012 | A Novel Hybrid IP Traceback Scheme with Packet Counters | Tomoyuki Karasawa; Soshi, Masakazu; Miyaji, Atsuko |
|