Satoshi Obana
Orcid: 0000-0003-4795-4779
According to our database1,
Satoshi Obana
authored at least 41 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of Work-in-Progress in Hardware and Software for Location Computation (WIPHAL 2023), 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
2022
On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS.
Proceedings of the 2022 International Conference on Localization and GNSS, 2022
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
2021
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021
2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings.
Proceedings of the Advances in Information and Computer Security, 2015
2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
IACR Cryptol. ePrint Arch., 2013
New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
Proceedings of the 2013 BIOSIG, 2013
2011
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
2009
Proceedings of the 5th Workshop on Digital Identity Management, 2009
2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution.
Proceedings of the Advances in Cryptology, 2006
2004
IACR Cryptol. ePrint Arch., 2004
2002
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Bounds and Combinatorial Structure of Multi-Receiver-Codes.
Des. Codes Cryptogr., 2001
Combinatorial Bounds on Authentication Codes with Arbitration.
Des. Codes Cryptogr., 2001
2000
Combinatorial Classification of Optimal Authentication Codes with Arbitration.
Des. Codes Cryptogr., 2000
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
1995
Proceedings of the Advances in Cryptology, 1995