Hiroaki Anada, Shunsuke Tsumori, Samiran Bag, Masakazu Soshi, Atsushi Waseda, and Kouichi Sakurai. Short Merkle one-time signatures (poster). In The 12th International Workshop on Security (IWSEC), 2017.
Yuta Kurihara and Masakazu Soshi. A Novel Hash Chain Construction for Simple and Efficient Authentication. In 14th Annual Conference on Privacy, Security and Trust, PST 2016, December 2016.
Kayoko Iwamoto, Masakazu Soshi, and Takashi Satoh. An efficient and adaptive IP traceback scheme. In IEEE International Workshop on Internet of Things Services (IoTS), pp. 235-240, November 2014.
Tomoyuki Karasawa, Masakazu Soshi, and Atsuko Miyaji. A novel hybrid IP traceback scheme with packet counters. In The 5th International Conference on Internet and Dsitributed Computing Systems (IDCS 2012), volume 7646 of Lecture Notes in Computer Science, pp.71-84. Springer-Verlag, 2012.
Atsushi Waseda and Masakazu Soshi. Consideration for multi-threshold multi-secret sharing schemes. In International Symposium on Information Theory and Applications (ISITA 2012), pp. 265-269, August 2012.
双紙正和, 早稲田篤志. One time signature の効率的な構成の検討. 情報処理学会研究報告,2012-CSEC-56, No.35, 2012年3月.
Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi. Ideal secret sharing schemes with share selectability. In The 13th International Conference on Information and Communications Security (ICICS 2011), volume 7043 of Lecture Notes in Computer Science, pp. 143-157. Springer-Verlag, 2011.
Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi. Efficient and low-cost RFID authentication schemes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 2, No. 3, pp. 4-25, 2011.
Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi. Hidden credential retrieval without random oracles. In The 11th International Workshop on Information Security Applications (WISA 2010), volume 6513 of Lecture Notes in Computer Science, pp.160-174. Springer-Verlag, 2010.
Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, and Masakazu Soshi. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. International Journal of Applied Cryptography (IJACT), Vol. 2, No. 1, pp.46-59, 2010.
Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, and Masakazu Soshi. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In The 5th Information Security Practice and Experience Conference (ISPEC 2009), volume 5451 of Lecture Notes in Computer Science, pp.13-23. Springer-Verlag, April 2009.
Rahman Mohammad Shahriar, Masakazu Soshi, and Atsuko Miyaji. A secure RFID authentication protocol with low communication cost. In The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009), pp.559-564, March 2009.
Atsushi Waseda, Takayuki Takagi, Masakazu Soshi, and Atsuko Miyaji. Quantum secret sharing between multiparty and multiparty against the attacks with single photons or EPR-pair. In International Symposium on Information Theory and Applications (ISITA 2008), December 2008.
Wataru Hasegawa, Masakazu Soshi, and Atsuko Miyaji. Mobile agent security with efficient oblivious transfer. In International Conference on Security and Cryptography (SECRYPT 2007), pp.299-304, July 2007.
早稲田篤志, 双紙正和, 宮地充子. 量子複数秘密分散に関する考察. 情報処理学会論文誌, 第48巻7号, pp.2447-2464, 2007年7月.
Takeaki Terada, Masakazu Soshi, and Atsuko Miyaji. An IP traceback scheme with variably probabilistic packet marking. In International Symposium on Information Theory and Applications (ISITA 2006), October 2006.
早稲田篤志, 双紙正和, 宮地充子. n 次元量子状態を使用した量子コイン投げプロトコル. 情報処理学会論文誌, 第46巻8号, 1903-1911ページ, 2005年8月.
Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. Java obfuscation - approaches to construct tamper-resistant object-oriented programs. IPSJ Journal, Vol.46, No.8, pp.2107-2119, August 2005.
Atsushi Waseda, Masakazu Soshi, and Atsuko Miyaji. n-state quantum coin flipping protocol. In International Conference on Information Technology (ITCC), volume II, pp.776-777, 2005.
Takeaki Terada, Masakazu Soshi, and Atsuko Miyaji. A new pushback mechanism resistant to DDoS attacks. In 2004 International Symposium on Information Theory and Applications (ISITA 2004), October 2004.
Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji. On anonymity metrics for practical anonymous communication protocols. IPSJ Journal, Vol.45, No.8, pp.1887-1897, August 2004.
寺田剛陽, 双紙正和, 宮地充子. Pushback機構の一提案とそのモデル化に向けて. 情報処理学会論文誌, 第45巻8号, 1948-1953ページ, 2004年8月.
Atsushi Waseda, Masakazu Soshi, and Atsuko Miyaji. A proposal of quantum coin tossing using n-states. Technical Report of IEICE, ISEC 2004-10 (2004-05), pp. 65-68, May 2004.
Masakazu Soshi, Mamoru Maekawa, and Eiji Okamoto. The dynamic-typed access matrix model and decidability of the safety problem. IEICE Transactions on Fundamentals, Vol.E87-A, No.1, pp.190-203, January 2004.
Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. Java obfuscation with a theoretical basis for building secure mobile agents. In Antonio Lioy and Daniele Mazzocchi, editors, Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS'03), volume 2828 of Lecture Notes in Computer Science, pp.89-103. Springer-Verlag, October 2003.
Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji. Evaluation of anonymity of practical anonymous communication networks. In Rei Safavi-Naini and Jennifer Seberry, editors, The Eighth Australasian Conference on Information Security and Privacy - ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pp.13-26. Springer-Verlag, July 2003.
Sayaka Fukuda, Masakazu Soshi, and Atsuko Miyaji. A Consideration for the Bias of Quantum Coin Flipping - Extension to 4 States Protocol from 3 States. Technical Report of IEICE, ISEC 2003-4, pp.21-24, May 2003.
Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. Software obfuscation on a theoretical basis and its implementation. IEICE Transactions on Fundamentals, Vol.E86-A, No.1, pp.176-186, January 2003.
Hiroyuki Nishikawa, Atsuko Miyaji, Masakazu Soshi, and Toshio Omote. A secure and flexible digital contents building system. In 2002 International Symposium on Information Theory and Applications (ISITA 2002), October 2002, S6-1-4, pp.223-226.
Masakazu Soshi and Atsuko Miyaji. Labeled certificate: Flexible trust management of public key infrastructures. In 2002 International Symposium on Information Theory and Applications (ISITA 2002), October 2002, S6-1-2, pp.215-218.
Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. Software tamper resistance based on the difficulty of interprocedural analysis. In The Third International Workshop on Information Security Applications (WISA 2002), pp. 437-452, August 2002.
Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji: An agent-based model of anonymous communication protocols. Sixth International Workshop on Enterprise Security, 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, 2001.
Masakazu Soshi: Safety analysis of the dynamic-typed access matrix model. In Frederic Cuppens, Yves Deswarte, Dieter Gollmann, and Michael Waidner, editors, Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, volume 1895 of Lecture Notes in Computer Science, pp.106-121. Springer-Verlag, October 2000.
北澤繁樹, 長野悟, 双紙正和, 宮地充子. 初等的な環状経路を用いた匿名通信方式. 情報処理学会論文誌, 第41巻8号2148-2160ページ, 2000年8月.
山田竜也, 宮地充子, 双紙正和. オープンネットワークにおける安全な暗号方式の更新に関する考察. 情報処理学会論文誌, 第41巻8号2102-2109ページ, 2000年8月.
双紙正和, 加藤丈治, 前川守. デュアルラベルを利用したアクセス制御モデル. 情報処理学会論文誌, 第40巻3号1305-1314ページ, 1999年3月.
双紙正和, 加藤丈治, 前川守. 分散環境における、プロクシを利用した柔軟なセキュリティ制御. 情報処理学会論文誌, 第39巻3号810-817ページ, 1998年3月.
Masakazu Soshi and Mamoru Maekawa. A new authorization model and its mechanism using service paths in open distributed environments. Proceedings of IFIP TC6 WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems (DAIS '97), pp.251-264, 1997.
Masakazu Soshi and Mamoru Maekawa. The Saga security system-a security architecture for open distributed systems. Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems, pp. 53-58, 1997.