Остановите войну!
for scientists:
default search action
Masahiro Mambo
- > Home > Persons > Masahiro Mambo
Publications
- 2015
- [c30]Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. INTRUST 2015: 32-48 - 2014
- [j16]Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto:
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles. J. Inf. Process. 22(2): 366-375 (2014) - [c29]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
A CDH-based ordered multisignature scheme in the standard model with better efficiency. ISITA 2014: 236-240 - 2013
- [c27]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. ISC 2013: 367-377 - 2012
- [j14]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 70-88 (2012) - [j13]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54 (2012) - 2011
- [c26]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. INCoS 2011: 662-667 - 2010
- [j11]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [c25]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. ICICS 2010: 383-400 - [c23]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. Pairing 2010: 327-346 - 2008
- [j8]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Secur. Commun. Networks 1(2): 179-189 (2008) - [i3]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2008: 280 (2008) - 2006
- [c20]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149 - [c19]Sk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto:
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306 - [i2]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2006: 328 (2006) - [i1]Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. IACR Cryptol. ePrint Arch. 2006: 344 (2006) - 2002
- [c17]Masahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka:
Simple and Secure Mobile Access under the Flexible Organization Management. DEXA Workshops 2002: 456-462 - 2000
- [c13]Hiroshi Doi, Masahiro Mambo, Eiji Okamoto:
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. ACISP 2000: 352-367 - [c11]Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji:
A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483 - 1999
- [c10]Shigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo:
Improvement of Secure Access Control Agent for Distributed Files. ICPP Workshops 1999: 185-191 - 1998
- [c8]Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo:
A User Identification System Using Signature Written with Mouse. ACISP 1998: 403-414 - [e1]Eiji Okamoto, George I. Davida, Masahiro Mambo:
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1396, Springer 1998, ISBN 3-540-64382-6 [contents] - 1997
- [c6]Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai:
Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282 - [c5]Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo:
Proposal of user identification scheme using mouse. ICICS 1997: 144-148 - [c4]Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo:
The Application of ID-Based Key Distribution Systems to an Elliptic Curve. ISW 1997: 335-344 - [c3]Masahiro Mambo, Takanori Murayama, Eiji Okamoto:
A tentative approach to constructing tamper-resistant software. NSPW 1997: 23-33 - 1996
- [c2]Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto:
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333 - [c1]Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
Proxy Signatures for Delegating Signing Operation. CCS 1996: 48-57 - 1995
- [j2]Eiji Okamoto, Tomohiko Uyematsu, Masahiro Mambo:
Permutation Cipher Scheme Using Polynomials over a Field. IEICE Trans. Inf. Syst. 78-D(2): 138-142 (1995)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint