Name
Papers
Collaborators
SHIN'ICHIRO MATSUO
31
71
Citations 
PageRank 
Referers 
116
16.05
325
Referees 
References 
577
303
Search Limit
100577
Title
Citations
PageRank
Year
log*-Round Game-Theoretically-Fair Leader Election.00.342022
Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers.00.342021
Proof of No-Work - How to Incentivize Individuals to Stay at Home.00.342020
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers.00.342020
A Non-Repudiable Negotiation Protocol For Security Service Level Agreements00.342015
Relations Among Notions Of Privacy For Rfid Authentication Protocols60.492014
Tailored Security: Building Nonrepudiable Security Service-Level Agreements60.532014
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.00.342014
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme00.342014
A Forward Privacy Model for RFID Authentication Protocols.10.352013
Risk visualization and alerting system: architecture and proof-of-concept implementation70.502013
Accountable security mechanism based on security service level agreement00.342013
Toward Practical Searchable Symmetric Encryption.60.512013
PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.60.432013
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?00.342012
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates211.632012
Multifactor authenticated key renewal00.342011
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication30.362011
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII.222.302010
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility.00.342010
Leakage-resilient RFID authentication with forward-privacy10.362010
Leakage resilient strong key-insulated signatures in public channel10.352010
Prototyping platform for performance evaluation of SHA-3 candidates90.892010
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC90.522010
Classification of Hash Functions Suitable for Real-Life Systems00.342008
Efficient Divisible Voting Scheme.00.342005
On Universal Composable Security of Time-Stamping Protocols140.692005
Efficient Divisible Voting Scheme00.342005
Electronic Ticket Scheme For Its30.442003
Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer00.342003
Matching Oblivious Transfer: How To Exchange Valuable Data10.632003