Publications

If you need a copy of my paper, please send me an email.

  • Books:
    1. XML and Java: Developing Web Applications.Hiroshi Maruyama, Kent Tamura, Naohiko Uramoto, Makoto Murata, Andy Clark, Yuhichi Nakamura, Ryo Neyama, Kazuya Kosaka, and Satoshi Hada, Addison-Wesley, 2002.
  • Journal Papers:
    1. XML Access Control Using Static Analysis.Makoto Murata, Akihiko Tozawa, Michiharu Kudo and Satoshi Hada.ACM Transactions on Information and System Security (TISSEC), Volume 9, Issue 3, 2006.
    2. Zero-Knowledge and Correlation Intractability.Satoshi Hada and Toshiaki Tanaka.IEICE Trans. Fundamentals, Vol. E89-A, No.10, 2006.This is the final version of the PKC’99 paper entitled by “A Relationship between One-Wayness and Correlation Intractability.”
    3. A Formal Treatment of Non-repudiation Protocols.Satoshi Hada.IEICE Trans. Fundamentals, Vol. E87-A, No.2, 2004.
    4. A Note on Transformations of Interactive Proofs that Preserve the Prover’s Complexity.Satoshi Hada.IEICE Trans. Fundamentals, Vol. E87-A, No.1, 2004.
    5. Access Control Model with Provisional Actions.Michiharu Kudo and Satoshi Hada.IEICE Trans. Fundamentals, Vol. E84-A, No.1, 2001.
    6. A New Approach to Constructing a Provably Secure Variant of Schnorr’s Identification Scheme.Satoshi Hada and Hatsukazu Tanaka.IEICE Trans. Fundamentals, Vol. E78-A, No.9, 1995.
  • International Conference Papers:
    1. Secure Obfuscation for Encrypted Signatures.Satoshi Hada.Eurocrypt 2010
    2. Static vs. Dynamic Validation of BSP Conformance.Stefan Prennsch・z-Sch・zenau, Nirmal Mukhi, Satoshi Hada, Naoto Sato, Fumiko Satoh, Naohiko Uramoto.IEEE International Conference on Web Services, ICWS 2009
    3. Towards Separation of Duties for Services.Christopher Giblin and Satoshi Hada.6th Int. Workshop on SOA & Web Services Best Practices Committee, OOPSLA, October 19, 2008, Nashville
    4. A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.Satoshi Hada and Kouichi Sakurai.International Workshop on Security (IWSEC 2007)
    5. Ciphertext-Auditable Public Key Encryption.Satoshi Hada and Kouichi Sakurai.International Workshop on Security (IWSEC 2006)
    6. XML Access Control Using Static Analysis.Makoto Murata, Akihiko Tozawa, Michiharu Kudo and Satoshi Hada.ACM Conference on Computer and Communication Security (CCS 2003)
    7. E-P3P privacy policies and privacy authorization.Paul Ashley, Satoshi Hada, Guenter Karjoth, Matthias Schunter.Proceeding of the ACM workshop on Privacy in the Electronic Society, 2002.
    8. Zero-Knowledge and Code Obfuscation.Satoshi Hada.ASIACRYPT 2000.
    9. XML Document Security based on Provisional Authorization.Michiharu Kudo and Satoshi Hada.ACM Conference on Computer and Communication Security (CCS 2000)
    10. A Relationship between One-Wayness and Correlation Intractability.Satoshi Hada and Toshiaki Tanaka.PKC’99.A revised version is available at Cryptology ePrint Archive: Report 1999/010.
    11. On the Existence of 3-Round Zero-Knowledge Protocols.Satoshi Hada and Toshiaki Tanaka.CRYPTO’98.A revised version is available at Cryptology ePrint Archive: Report 1999/009.
  • Standardization:
    1. SOAP Security Extensions: Digital Signature.Allen Brown, Barbara Fox, Satoshi Hada, Brian LaMacchia, and Hiroshi Maruyama.W3C NOTE.
    2. Enterprise Privacy Authorization Language.Paul Ashley, Satoshi Hada, Gunter Karjoth, Calvin Powers, and Matthias Schunter.W3C Member Submission.
  • IBM Research Reports and developerWorks Articles:
    1. Web Services Security (WS-Security).Bob Atkinson et. al.Now it is an OASIS standard.
    2. SOAP security extensions: digital signature.Satoshi Hada
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s