Name
Papers
Collaborators
KAZUE SAKO
29
76
Citations 
PageRank 
Referers 
1197
80.51
1535
Referees 
References 
230
233
Search Limit
1001000
Title
Citations
PageRank
Year
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure00.342022
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I.00.342021
Ledger-based Points Transfer System in LPWAN: From Disaster Management Aspect00.342021
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II.00.342021
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I.00.342019
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II.00.342019
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II.00.342019
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I.00.342019
A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain00.342019
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers.00.342018
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers161.532012
An implementation of a mix-net based network voting scheme and its use in a private organization70.512010
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers222.192010
RLCPS preface00.342010
K-Times Anonymous Authentication221.072009
IC card-based single sign-on system that remains secure under card analysis10.362009
Special Section on Cryptography and Information Security00.342008
An Efficient Publicly Verifiable Mix-Net for Long Inputs60.532007
k-times anonymous authentication with a constant proving cost261.142006
Using group signatures for identity management and its implementation110.562006
k-Times Anonymous Authentication (Extended Abstract)642.432004
An implementation of a universally verifiable electronic voting scheme based on shuffling251.222002
Efficient receipt-free voting based on homomorphic encryption2099.602000
An Auction Protocol Which Hides Bids of Losers613.612000
Implementation of a Digital Lottery Server on WWW80.651999
Fault tolerant anonymous channel576.311997
Designated verifier proofs and their applications39922.571996
Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth19814.131995
Secure Voting Using Partially Compatible Homomorphisms658.061994