@article{DBLP:journals/eis/NakaharaOKMK23,
author = {Masataka Nakahara and
Norihiro Okui and
Yasuaki Kobayashi and
Yutaka Miyake and
Ayumu Kubota},
title = {Malware detection for IoT devices using hybrid system of whitelist
and machine learning based on lightweight flow data},
journal = {Enterp. Inf. Syst.},
volume = {17},
number = {9},
year = {2023},
url = {https://doi.org/10.1080/17517575.2022.2142854},
doi = {10.1080/17517575.2022.2142854},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/eis/NakaharaOKMK23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PashamokhtariOMNG23,
author = {Arman Pashamokhtari and
Norihiro Okui and
Yutaka Miyake and
Masataka Nakahara and
Hassan Habibi Gharakheili},
title = {Combining Stochastic and Deterministic Modeling of {IPFIX} Records
to Infer Connected IoT Devices in Residential {ISP} Networks},
journal = {{IEEE} Internet Things J.},
volume = {10},
number = {6, March 15},
pages = {5128--5145},
year = {2023},
url = {https://doi.org/10.1109/JIOT.2022.3222116},
doi = {10.1109/JIOT.2022.3222116},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/PashamokhtariOMNG23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/SerizawaOOYSNNB22,
author = {Ayumi Serizawa and
Ryosuke Okudera and
Yumo Ouchi and
Mizuho Yoshihira and
Yuya Shiomi and
Naoya Nitta and
Masataka Nakahara and
Akira Baba and
Yutaka Miyake and
Tetsushi Ohki and
Masakatsu Nishigaki},
editor = {Leonard Barolli},
title = {Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition},
booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications
- Proceedings of the 17th International Conference on Broad-Band Wireless
Computing, Communication and Applications (BWCCA-2022), Tirana, Albania,
27-29 October 2022},
series = {Lecture Notes in Networks and Systems},
volume = {570},
pages = {125--136},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-20029-8\_12},
doi = {10.1007/978-3-031-20029-8\_12},
timestamp = {Thu, 20 Oct 2022 11:20:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/SerizawaOOYSNNB22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/OkuiNMK22,
author = {Norihiro Okui and
Masataka Nakahara and
Yutaka Miyake and
Ayumu Kubota},
editor = {Hong Va Leong and
Sahra Sedigh Sarvestani and
Yuuichi Teranishi and
Alfredo Cuzzocrea and
Hiroki Kashiwazaki and
Dave Towey and
Ji{-}Jiang Yang and
Hossain Shahriar},
title = {Identification of an IoT Device Model in the Home Domain Using {IPFIX}
Records},
booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
{COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
pages = {583--592},
publisher = {{IEEE}},
year = {2022},
url = {https://doi.org/10.1109/COMPSAC54236.2022.00104},
doi = {10.1109/COMPSAC54236.2022.00104},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/compsac/OkuiNMK22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/YoshihiraSOOSNN22,
author = {Mizuho Yoshihira and
Ayumi Serizawa and
Ryosuke Okudera and
Yumo Ouchi and
Yuya Shiomi and
Naoya Nitta and
Masataka Nakahara and
Akira Baba and
Yutaka Miyake and
Tetsushi Ohki and
Masakatsu Nishigaki},
editor = {Abbas Moallem},
title = {Improving Rank-N Identification Rate of Palmprint Identification Using
Permutation-Based Indexing},
booktitle = {{HCI} for Cybersecurity, Privacy and Trust - 4th International Conference,
{HCI-CPT} 2022, Held as Part of the 24th {HCI} International Conference,
{HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13333},
pages = {78--93},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-05563-8\_6},
doi = {10.1007/978-3-031-05563-8\_6},
timestamp = {Tue, 28 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/hci/YoshihiraSOOSNN22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/NakaharaOKM21,
author = {Masataka Nakahara and
Norihiro Okui and
Yasuaki Kobayashi and
Yutaka Miyake},
editor = {Gary B. Wills and
P{\'{e}}ter Kacsuk and
Victor Chang},
title = {Malware Detection for IoT Devices using Automatically Generated White
List and Isolation Forest},
booktitle = {Proceedings of the 6th International Conference on Internet of Things,
Big Data and Security, IoTBDS 2021, Online Streaming, April 23-25,
2021},
pages = {38--47},
publisher = {{SCITEPRESS}},
year = {2021},
url = {https://doi.org/10.5220/0010394900380047},
doi = {10.5220/0010394900380047},
timestamp = {Mon, 31 May 2021 12:07:54 +0200},
biburl = {https://dblp.org/rec/conf/iotbd/NakaharaOKM21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/PashamokhtariOM21,
author = {Arman Pashamokhtari and
Norihiro Okui and
Yutaka Miyake and
Masataka Nakahara and
Hassan Habibi Gharakheili},
title = {Inferring Connected IoT Devices from {IPFIX} Records in Residential
{ISP} Networks},
booktitle = {46th {IEEE} Conference on Local Computer Networks, {LCN} 2021, Edmonton,
AB, Canada, October 4-7, 2021},
pages = {57--64},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/LCN52139.2021.9524954},
doi = {10.1109/LCN52139.2021.9524954},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/lcn/PashamokhtariOM21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/NakanoNKOIHYMK21,
author = {Yuto Nakano and
Toru Nakamura and
Yasuaki Kobayashi and
Takashi Ozu and
Masahito Ishizaka and
Masayuki Hashimoto and
Hiroyuki Yokoyama and
Yutaka Miyake and
Shinsaku Kiyomoto},
title = {Automatic Security Inspection Framework for Trustworthy Supply Chain},
booktitle = {19th {IEEE/ACIS} International Conference on Software Engineering
Research, Management and Applications, {SERA} 2021, Kanazawa, Japan,
June 20-22, 2021},
pages = {45--50},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/SERA51205.2021.9509040},
doi = {10.1109/SERA51205.2021.9509040},
timestamp = {Fri, 13 Aug 2021 10:40:52 +0200},
biburl = {https://dblp.org/rec/conf/sera/NakanoNKOIHYMK21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/NakanoNKIHYMK20,
author = {Yuto Nakano and
Toru Nakamura and
Yasuaki Kobayashi and
Masahito Ishizaka and
Masayuki Hashimoto and
Hiroyuki Yokoyama and
Yutaka Miyake and
Shinsaku Kiyomoto},
title = {Consideration on Data Conformance Toward Building Trust in Supply
Chain},
booktitle = {2020 European Conference on Networks and Communications, EuCNC 2020,
Dubrovnik, Croatia, June 15-18, 2020},
pages = {128--132},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/EuCNC48522.2020.9200933},
doi = {10.1109/EUCNC48522.2020.9200933},
timestamp = {Tue, 29 Sep 2020 14:45:05 +0200},
biburl = {https://dblp.org/rec/conf/eucnc/NakanoNKIHYMK20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihsi/SugimotoSBOOMN20,
author = {Ayaka Sugimoto and
Yuya Shiomi and
Akira Baba and
Norihiro Okui and
Tetsushi Ohki and
Yutaka Miyake and
Masakatsu Nishigaki},
editor = {Tareq Z. Ahram and
Waldemar Karwowski and
Alberto Vergnano and
Francesco Leali and
Redha Ta{\"{\i}}ar},
title = {A Liveness Detection Method for Palmprint Authentication},
booktitle = {Intelligent Human Systems Integration 2020 - Proceedings of the 3rd
International Conference on Intelligent Human Systems Integration
{(IHSI} 2020): Integrating People and Intelligent Systems, February
19-21, 2020, Modena, Italy},
series = {Advances in Intelligent Systems and Computing},
volume = {1131},
pages = {385--391},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-39512-4\_60},
doi = {10.1007/978-3-030-39512-4\_60},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ihsi/SugimotoSBOOMN20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/NakaharaOKM20,
author = {Masataka Nakahara and
Norihiro Okui and
Yasuaki Kobayashi and
Yutaka Miyake},
editor = {Gary B. Wills and
P{\'{e}}ter Kacsuk and
Victor Chang},
title = {Machine Learning based Malware Traffic Detection on IoT Devices using
Summarized Packet Data},
booktitle = {Proceedings of the 5th International Conference on Internet of Things,
Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9,
2020},
pages = {78--87},
publisher = {{SCITEPRESS}},
year = {2020},
url = {https://doi.org/10.5220/0009345300780087},
doi = {10.5220/0009345300780087},
timestamp = {Tue, 29 Sep 2020 09:39:42 +0200},
biburl = {https://dblp.org/rec/conf/iotbd/NakaharaOKM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HashimotoHM18,
author = {Masaki Hashimoto and
Yoshiaki Hori and
Yutaka Miyake},
editor = {Sorel Reisman and
Sheikh Iqbal Ahamed and
Claudio Demartini and
Thomas M. Conte and
Ling Liu and
William R. Claycomb and
Motonori Nakamura and
Edmundo Tovar and
Stelvio Cimato and
Chung{-}Horng Lung and
Hiroki Takakura and
Ji{-}Jiang Yang and
Toyokazu Akiyama and
Zhiyong Zhang and
Md. Kamrul Hasan},
title = {Message from the {NETSAP} 2018 Workshop Organizers},
booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
{COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
pages = {652},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/COMPSAC.2018.10312},
doi = {10.1109/COMPSAC.2018.10312},
timestamp = {Mon, 19 Aug 2024 08:42:01 +0200},
biburl = {https://dblp.org/rec/conf/compsac/HashimotoHM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/MasiniGSZDLWKLL17,
author = {Gino Masini and
Craig Gunther and
Jonathan Segev and
Yuan Zhang and
Huan Deng and
Gyu Myoung Lee and
Dong Wang and
Emil Kowalczyk and
Kangchan Lee and
Leo Lehmann and
Tom Huber and
Steve S. Gorshe and
Stephen Shew and
Stefano Ruffini and
Silvana Rodrigues and
Heung Youl Youm and
Yutaka Miyake and
Arnaud Taddei},
title = {Standards News},
journal = {{IEEE} Commun. Stand. Mag.},
volume = {1},
number = {4},
pages = {16--21},
year = {2017},
url = {https://doi.org/10.1109/MCOMSTD.2017.8258593},
doi = {10.1109/MCOMSTD.2017.8258593},
timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/csm/MasiniGSZDLWKLL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/YuanCKMT16,
author = {Ye Yuan and
Chen{-}Mou Cheng and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tsuyoshi Takagi},
title = {Portable Implementation of Lattice-based Cryptography using JavaScript},
journal = {Int. J. Netw. Comput.},
volume = {6},
number = {2},
pages = {309--327},
year = {2016},
url = {http://www.ijnc.org/index.php/ijnc/article/view/130},
timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijnc/YuanCKMT16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/IidaMYYB16,
author = {Katsuyoshi Iida and
Yutaka Miyake and
Chung Huang Yang and
Bian Yang and
Julien Bringer},
title = {Message from the {NETSAP} and {SIMICE} Workshop Organizers},
booktitle = {40th {IEEE} Annual Computer Software and Applications Conference,
{COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
pages = {552},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/COMPSAC.2016.286},
doi = {10.1109/COMPSAC.2016.286},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/compsac/IidaMYYB16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasuCVCKSM15,
author = {Anirban Basu and
Juan Camilo Corena and
Jaideep Vaidya and
Jon Crowcroft and
Shinsaku Kiyomoto and
Yung Shin Van Der Sype and
Yutaka Miyake},
editor = {Feng Bao and
Steven Miller and
Jianying Zhou and
Gail{-}Joon Ahn},
title = {Practical Private One-way Anonymous Message Routing},
booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
2015},
pages = {665},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2714576.2714641},
doi = {10.1145/2714576.2714641},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/BasuCVCKSM15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HoriMY15,
author = {Yoshiaki Hori and
Yutaka Miyake and
Chung Huang Yang},
editor = {Sheikh Iqbal Ahamed and
Carl K. Chang and
William C. Chu and
Ivica Crnkovic and
Pao{-}Ann Hsiung and
Gang Huang and
Jingwei Yang},
title = {Message from the {NETSAP} 2015 Workshop Organizers},
booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC}
Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
pages = {248},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/COMPSAC.2015.304},
doi = {10.1109/COMPSAC.2015.304},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/compsac/HoriMY15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YuanCKMT15,
author = {Ye Yuan and
Chen{-}Mou Cheng and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tsuyoshi Takagi},
title = {Portable Implementation of Lattice-Based Cryptography Using JavaScript},
booktitle = {Third International Symposium on Computing and Networking, {CANDAR}
2015, Sapporo, Hokkaido, Japan, December 8-11, 2015},
pages = {58--67},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/CANDAR.2015.36},
doi = {10.1109/CANDAR.2015.36},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ic-nc/YuanCKMT15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KiyomotoNM15,
author = {Shinsaku Kiyomoto and
Toru Nakamura and
Yutaka Miyake},
title = {Towards Tracing of k-Anonymized Datasets},
booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
2015, Volume 1},
pages = {1237--1242},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/Trustcom.2015.511},
doi = {10.1109/TRUSTCOM.2015.511},
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
biburl = {https://dblp.org/rec/conf/trustcom/KiyomotoNM15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/NeisseBSMKB15,
author = {Ricardo Neisse and
Gianmarco Baldini and
Gary Steri and
Yutaka Miyake and
Shinsaku Kiyomoto and
Abdur Rahim Biswas},
title = {An agent-based framework for Informed Consent in the internet of things},
booktitle = {2nd {IEEE} World Forum on Internet of Things, WF-IoT 2015, Milan,
Italy, December 14-16, 2015},
pages = {789--794},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/WF-IoT.2015.7389154},
doi = {10.1109/WF-IOT.2015.7389154},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wf-iot/NeisseBSMKB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoFKIMTS14,
author = {Yuto Nakano and
Kazuhide Fukushima and
Shinsaku Kiyomoto and
Tsukasa Ishiguro and
Yutaka Miyake and
Toshiaki Tanaka and
Kouichi Sakurai},
title = {Fast Implementation of KCipher-2 for Software and Hardware},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {97-D},
number = {1},
pages = {43--52},
year = {2014},
url = {https://doi.org/10.1587/transinf.E97.D.43},
doi = {10.1587/TRANSINF.E97.D.43},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HibikiHNFKMA14,
author = {Takafumi Hibiki and
Naofumi Homma and
Yuto Nakano and
Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake and
Takafumi Aoki},
title = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based
Countermeasure},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {97-A},
number = {1},
pages = {157--166},
year = {2014},
url = {https://doi.org/10.1587/transfun.E97.A.157},
doi = {10.1587/TRANSFUN.E97.A.157},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoKMS14,
author = {Yuto Nakano and
Shinsaku Kiyomoto and
Yutaka Miyake and
Kouichi Sakurai},
title = {Comparison of Access Pattern Protection Schemes and Proposals for
Efficient Implementation},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {97-D},
number = {10},
pages = {2576--2585},
year = {2014},
url = {https://doi.org/10.1587/transinf.2013THP0007},
doi = {10.1587/TRANSINF.2013THP0007},
timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/NakanoKMS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KiyomotoFM14,
author = {Shinsaku Kiyomoto and
Kazuhide Fukushima and
Yutaka Miyake},
title = {Security issues on {IT} systems during disasters: a survey},
journal = {J. Ambient Intell. Humaniz. Comput.},
volume = {5},
number = {2},
pages = {173--185},
year = {2014},
url = {https://doi.org/10.1007/s12652-013-0177-8},
doi = {10.1007/S12652-013-0177-8},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jaihc/KiyomotoFM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoM14,
author = {Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Stephanie Teufel and
A Min Tjoa and
Ilsun You and
Edgar R. Weippl},
title = {PrivacyFrost2: {A} Efficient Data Anonymization Tool Based on Scoring
Functions},
booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP}
{WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
2014 and 4th International Workshop on Security and Cognitive Informatics
for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
8-12, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8708},
pages = {211--225},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-10975-6\_16},
doi = {10.1007/978-3-319-10975-6\_16},
timestamp = {Tue, 14 May 2019 10:00:49 +0200},
biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/CorenaBKMO14,
author = {Juan Camilo Corena and
Anirban Basu and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tomoaki Ohtsuki},
title = {{XOR} network coding pollution prevention without homomorphic functions},
booktitle = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC}
2014, Las Vegas, NV, USA, January 10-13, 2014},
pages = {293--300},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/CCNC.2014.6866586},
doi = {10.1109/CCNC.2014.6866586},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccnc/CorenaBKMO14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/BasuCMPGKVM14,
author = {Anirban Basu and
Juan Camilo Corena and
Anna Monreale and
Dino Pedreschi and
Fosca Giannotti and
Shinsaku Kiyomoto and
Jaideep Vaidya and
Yutaka Miyake},
title = {CF-inspired Privacy-Preserving Prediction of Next Location in the
Cloud},
booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology
and Science, CloudCom 2014, Singapore, December 15-18, 2014},
pages = {731--734},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/CloudCom.2014.114},
doi = {10.1109/CLOUDCOM.2014.114},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cloudcom/BasuCMPGKVM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/CorenaBNKM14,
author = {Juan Camilo Corena and
Anirban Basu and
Yuto Nakano and
Shinsaku Kiyomoto and
Yutaka Miyake},
title = {Data Storage on the Cloud under User Control},
booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology
and Science, CloudCom 2014, Singapore, December 15-18, 2014},
pages = {739--742},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/CloudCom.2014.113},
doi = {10.1109/CLOUDCOM.2014.113},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cloudcom/CorenaBNKM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/NakanoBKM14,
author = {Yuto Nakano and
Anirban Basu and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Javier L{\'{o}}pez and
Indrajit Ray and
Bruno Crispo},
title = {Key Extraction Attack Using Statistical Analysis of Memory Dump Data},
booktitle = {Risks and Security of Internet and Systems - 9th International Conference,
CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8924},
pages = {239--246},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-17127-2\_17},
doi = {10.1007/978-3-319-17127-2\_17},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/crisis/NakanoBKM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CorenaBKMO14,
author = {Juan Camilo Corena and
Anirban Basu and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tomoaki Ohtsuki},
title = {Beyond proofs of data possession: Finding defective blocks in outsourced
storage},
booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
TX, USA, December 8-12, 2014},
pages = {2381--2386},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/GLOCOM.2014.7037164},
doi = {10.1109/GLOCOM.2014.7037164},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/globecom/CorenaBKMO14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuMCGPKMYT14,
author = {Anirban Basu and
Anna Monreale and
Juan Camilo Corena and
Fosca Giannotti and
Dino Pedreschi and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tadashi Yanagihara and
Roberto Trasarti},
editor = {Jianying Zhou and
Nurit Gal{-}Oz and
Jie Zhang and
Ehud Gudes},
title = {A Privacy Risk Model for Trajectory Data},
booktitle = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference,
{IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {430},
pages = {125--140},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-662-43813-8\_9},
doi = {10.1007/978-3-662-43813-8\_9},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ifiptm/BasuMCGPKMYT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/KiyomotoM14,
author = {Shinsaku Kiyomoto and
Yutaka Miyake},
title = {How to Find an Appropriate {K} for K-Anonymization},
booktitle = {Eighth International Conference on Innovative Mobile and Internet
Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United
Kingdom, 2-4 July, 2014},
pages = {273--279},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/IMIS.2014.34},
doi = {10.1109/IMIS.2014.34},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/imis/KiyomotoM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshiguroKMT14,
author = {Tsukasa Ishiguro and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tsuyoshi Takagi},
editor = {Hugo Krawczyk},
title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a
128-Dimensional Ideal Lattice},
booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
March 26-28, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8383},
pages = {411--428},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-642-54631-0\_24},
doi = {10.1007/978-3-642-54631-0\_24},
timestamp = {Fri, 01 May 2020 18:32:25 +0200},
biburl = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BasuCKVMM14,
author = {Anirban Basu and
Juan Camilo Corena and
Shinsaku Kiyomoto and
Jaideep Vaidya and
Stephen Marsh and
Yutaka Miyake},
editor = {Yookun Cho and
Sung Y. Shin and
Sang{-}Wook Kim and
Chih{-}Cheng Hung and
Jiman Hong},
title = {PrefRank: fair aggregation of subjective user preferences},
booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
Korea - March 24 - 28, 2014},
pages = {287--288},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2554850.2555084},
doi = {10.1145/2554850.2555084},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sac/BasuCKVMM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BasuCKMVG0M14,
author = {Anirban Basu and
Juan Camilo Corena and
Shinsaku Kiyomoto and
Stephen Marsh and
Jaideep Vaidya and
Guibing Guo and
Jie Zhang and
Yutaka Miyake},
editor = {Yookun Cho and
Sung Y. Shin and
Sang{-}Wook Kim and
Chih{-}Cheng Hung and
Jiman Hong},
title = {Privacy preserving trusted social feedback},
booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
Korea - March 24 - 28, 2014},
pages = {1706--1711},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2554850.2554860},
doi = {10.1145/2554850.2554860},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sac/BasuCKMVG0M14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14,
author = {Juan Camilo Corena and
Anirban Basu and
Yuto Nakano and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Mohammad S. Obaidat and
Andreas Holzinger and
Pierangela Samarati},
title = {A Multiple-server Efficient Reusable Proof of Data Possesion from
Private Information Retrieval Techniques},
booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
pages = {307--314},
publisher = {SciTePress},
year = {2014},
url = {https://doi.org/10.5220/0005049803070314},
doi = {10.5220/0005049803070314},
timestamp = {Thu, 18 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
author = {Yuto Nakano and
Youssef Souissi and
Robert Nguyen and
Laurent Sauvage and
Jean{-}Luc Danger and
Sylvain Guilley and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {David Naccache and
Damien Sauveron},
title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
booktitle = {Information Security Theory and Practice. Securing the Internet of
Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8501},
pages = {76--91},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-662-43826-8\_6},
doi = {10.1007/978-3-662-43826-8\_6},
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/OtaAWIMA13,
author = {Haruki Ota and
Shoichiro Aoyama and
Ryu Watanabe and
Koichi Ito and
Yutaka Miyake and
Takafumi Aoki},
title = {Implementation and evaluation of a remote authentication system using
touchless palmprint recognition},
journal = {Multim. Syst.},
volume = {19},
number = {2},
pages = {117--129},
year = {2013},
url = {https://doi.org/10.1007/s00530-012-0283-z},
doi = {10.1007/S00530-012-0283-Z},
timestamp = {Mon, 11 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/mms/OtaAWIMA13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTWM13,
author = {Shinsaku Kiyomoto and
Toru Nakamura and
Haruo Takasaki and
Ryu Watanabe and
Yutaka Miyake},
editor = {Alfredo Cuzzocrea and
Christian Kittl and
Dimitris E. Simos and
Edgar R. Weippl and
Lida Xu},
title = {{PPM:} Privacy Policy Manager for Personalized Services},
booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8128},
pages = {377--392},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-40588-4\_26},
doi = {10.1007/978-3-642-40588-4\_26},
timestamp = {Tue, 14 May 2019 10:00:49 +0200},
biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTWM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13,
author = {Takafumi Hibiki and
Naofumi Homma and
Yuto Nakano and
Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake and
Takafumi Aoki},
editor = {Emmanuel Prouff},
title = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure},
booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International
Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
Papers},
series = {Lecture Notes in Computer Science},
volume = {7864},
pages = {169--183},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-40026-1\_11},
doi = {10.1007/978-3-642-40026-1\_11},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JiaAFBSFKM13,
author = {Limin Jia and
Jassim Aljuraidan and
Elli Fragkaki and
Lujo Bauer and
Michael Stroucken and
Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Jason Crampton and
Sushil Jajodia and
Keith Mayes},
title = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended
Abstract)},
booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8134},
pages = {775--792},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-40203-6\_43},
doi = {10.1007/978-3-642-40203-6\_43},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/KanekoNTMN13,
author = {Takuya Kaneko and
Takumi Nagaya and
Keisuke Takemori and
Yutaka Miyake and
Masakatsu Nishigaki},
editor = {Leonard Barolli and
Tomoya Enokido and
Fatos Xhafa and
Makoto Takizawa and
James J. Park},
title = {A Proposal for the Deterrence of Information Leakage Using Anti-virus
Software},
booktitle = {16th International Conference on Network-Based Information Systems,
NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013},
pages = {90--96},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/NBiS.2013.17},
doi = {10.1109/NBIS.2013.17},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/nbis/KanekoNTMN13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IshiguroKM13,
author = {Tsukasa Ishiguro and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Pierangela Samarati},
title = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments},
booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July,
2013},
pages = {51--61},
publisher = {SciTePress},
year = {2013},
url = {https://ieeexplore.ieee.org/document/7223155/},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/IshiguroKM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13,
author = {Shinsaku Kiyomoto and
Andre Rein and
Yuto Nakano and
Carsten Rudolph and
Yutaka Miyake},
editor = {Pierangela Samarati},
title = {{LMM} - {A} Common Component for Software License Management on Cloud},
booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July,
2013},
pages = {284--295},
publisher = {SciTePress},
year = {2013},
url = {https://ieeexplore.ieee.org/document/7223177/},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NakamuraKWM13,
author = {Toru Nakamura and
Shinsaku Kiyomoto and
Ryu Watanabe and
Yutaka Miyake},
title = {{P3MCF:} Practical Privacy-Preserving Multi-domain Collaborative Filtering},
booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
Symposium on Parallel and Distributed Processing with Applications,
{ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
pages = {354--361},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/TrustCom.2013.271},
doi = {10.1109/TRUSTCOM.2013.271},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/NakamuraKWM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshiguroKMT13,
author = {Tsukasa Ishiguro and
Shinsaku Kiyomoto and
Yutaka Miyake and
Tsuyoshi Takagi},
title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} in the Ideal Lattice
of 128 dimensions},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {388},
year = {2013},
url = {http://eprint.iacr.org/2013/388},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/IshiguroKMT13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKM12,
author = {Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake},
title = {Software Protection Combined with Tamper-Proof Device},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {95-A},
number = {1},
pages = {213--222},
year = {2012},
url = {https://doi.org/10.1587/transfun.E95.A.213},
doi = {10.1587/TRANSFUN.E95.A.213},
timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiyomotoFM12,
author = {Shinsaku Kiyomoto and
Kazuhide Fukushima and
Yutaka Miyake},
title = {Design of Categorization Mechanism for Disaster-Information-Gathering
System},
journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
volume = {3},
number = {4},
pages = {21--34},
year = {2012},
url = {https://doi.org/10.22667/JOWUA.2012.12.31.021},
doi = {10.22667/JOWUA.2012.12.31.021},
timestamp = {Sun, 17 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoFM12,
author = {Shinsaku Kiyomoto and
Kazuhide Fukushima and
Yutaka Miyake},
editor = {Gerald Quirchmayr and
Josef Basl and
Ilsun You and
Lida Xu and
Edgar R. Weippl},
title = {Security-and-Privacy-Related Issues on {IT} Systems During Disasters},
booktitle = {Multidisciplinary Research and Practice for Information Systems -
{IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and
Workshop on Availability, Reliability, and Security, {CD-ARES} 2012,
Prague, Czech Republic, August 20-24, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7465},
pages = {445--459},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-32498-7\_33},
doi = {10.1007/978-3-642-32498-7\_33},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoFM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/NakanoCKM12,
author = {Yuto Nakano and
Carlos Cid and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Stefan Mangard},
title = {Memory Access Pattern Protection for Resource-Constrained Devices},
booktitle = {Smart Card Research and Advanced Applications - 11th International
Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {7771},
pages = {188--202},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-37288-9\_13},
doi = {10.1007/978-3-642-37288-9\_13},
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
biburl = {https://dblp.org/rec/conf/cardis/NakanoCKM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KiyomotoMT12,
author = {Shinsaku Kiyomoto and
Yutaka Miyake and
Toshiaki Tanaka},
editor = {Geyong Min and
Yulei Wu and
Lei (Chris) Liu and
Xiaolong Jin and
Stephen A. Jarvis and
Ahmed Yassin Al{-}Dubai},
title = {On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering
System for Disasters},
booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2012, Liverpool, United
Kingdom, June 25-27, 2012},
pages = {1755--1762},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/TrustCom.2012.214},
doi = {10.1109/TRUSTCOM.2012.214},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/KiyomotoMT12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoFM12,
author = {Shinsaku Kiyomoto and
Kazuhide Fukushima and
Yutaka Miyake},
editor = {Ioannis G. Askoxylakis and
Henrich Christopher P{\"{o}}hls and
Joachim Posegga},
title = {Privacy Preservation of User History Graph},
booktitle = {Information Security Theory and Practice. Security, Privacy and Trust
in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
{WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7322},
pages = {87--96},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-30955-7\_9},
doi = {10.1007/978-3-642-30955-7\_9},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Miyake11,
author = {Yutaka Miyake},
title = {Foreword},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {94-D},
number = {11},
pages = {2067--2068},
year = {2011},
url = {https://doi.org/10.1587/transinf.E94.D.2067},
doi = {10.1587/TRANSINF.E94.D.2067},
timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/Miyake11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/YamadaMM11,
author = {Akira Yamada and
Hara Masanori and
Yutaka Miyake},
title = {Web Tracking Site Detection Based on Temporal Link Analysis and Automatic
Blacklist Generation},
journal = {Inf. Media Technol.},
volume = {6},
number = {2},
pages = {560--571},
year = {2011},
url = {https://doi.org/10.11185/imt.6.560},
doi = {10.11185/IMT.6.560},
timestamp = {Sat, 31 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/imt/YamadaMM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/TakemoriSNM11,
author = {Keisuke Takemori and
Takahiro Sakai and
Masakatsu Nishigaki and
Yutaka Miyake},
title = {Detection of Bot Infected {PC} Using Destination-based {IP} Address
and Domain Name Whitelists},
journal = {Inf. Media Technol.},
volume = {6},
number = {2},
pages = {649--659},
year = {2011},
url = {https://doi.org/10.11185/imt.6.649},
doi = {10.11185/IMT.6.649},
timestamp = {Sat, 31 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/imt/TakemoriSNM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YamadaMM11,
author = {Akira Yamada and
Hara Masanori and
Yutaka Miyake},
title = {Web Tracking Site Detection Based on Temporal Link Analysis and Automatic
Blacklist Generation},
journal = {J. Inf. Process.},
volume = {19},
pages = {62--73},
year = {2011},
url = {https://doi.org/10.2197/ipsjjip.19.62},
doi = {10.2197/IPSJJIP.19.62},
timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jip/YamadaMM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TakemoriSNM11,
author = {Keisuke Takemori and
Takahiro Sakai and
Masakatsu Nishigaki and
Yutaka Miyake},
title = {Detection of Bot Infected {PC} Using Destination-based {IP} Address
and Domain Name Whitelists},
journal = {J. Inf. Process.},
volume = {19},
pages = {169--179},
year = {2011},
url = {https://doi.org/10.2197/ipsjjip.19.169},
doi = {10.2197/IPSJJIP.19.169},
timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jip/TakemoriSNM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/FukushimaKM11,
author = {Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake},
title = {Towards Secure Cloud Computing Architecture - {A} Solution Based on
Software Protection Mechanism},
journal = {J. Internet Serv. Inf. Secur.},
volume = {1},
number = {1},
pages = {4--17},
year = {2011},
url = {https://doi.org/10.22667/JISIS.2011.05.31.004},
doi = {10.22667/JISIS.2011.05.31.004},
timestamp = {Thu, 23 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jisis/FukushimaKM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ShinFKM11,
author = {Wook Shin and
Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake},
title = {{AMY:} Use your cell phone to create a protected personal network
over devices},
journal = {{IEEE} Trans. Consumer Electron.},
volume = {57},
number = {1},
pages = {99--104},
year = {2011},
url = {https://doi.org/10.1109/TCE.2011.5735487},
doi = {10.1109/TCE.2011.5735487},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tce/ShinFKM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoMT11,
author = {Shinsaku Kiyomoto and
Yutaka Miyake and
Toshiaki Tanaka},
title = {Privacy Frost: {A} User-Oriented Data Anonymization Tool},
booktitle = {Sixth International Conference on Availability, Reliability and Security,
{ARES} 2011, Vienna, Austria, August 22-26, 2011},
pages = {442--447},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/ARES.2011.68},
doi = {10.1109/ARES.2011.68},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoMT11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KiyomotoFM11,
author = {Shinsaku Kiyomoto and
Kazuhide Fukushima and
Yutaka Miyake},
editor = {Tai{-}Hoon Kim and
Hojjat Adeli and
Wai{-}Chi Fang and
L. Javier Garc{\'{\i}}a{-}Villalba and
Kirk P. Arnett and
Muhammad Khurram Khan},
title = {Data Anonymity in Multi-Party Service Model},
booktitle = {Security Technology - International Conference, SecTech 2011, Held
as Part of the Future Generation Information Technology Conference,
{FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December
8-10, 2011. Proceedings},
series = {Communications in Computer and Information Science},
volume = {259},
pages = {21--30},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-27189-2\_3},
doi = {10.1007/978-3-642-27189-2\_3},
timestamp = {Sat, 30 Sep 2023 09:41:06 +0200},
biburl = {https://dblp.org/rec/conf/fgit/KiyomotoFM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FukushimaKMS11,
author = {Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake and
Kouichi Sakurai},
editor = {Mohammad S. Obaidat and
Jos{\'{e}} Luis Sevillano and
Joaquim Filipe},
title = {Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast
Encryption Scheme},
booktitle = {E-Business and Telecommunications - International Joint Conference,
{ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers},
series = {Communications in Computer and Information Science},
volume = {314},
pages = {233--248},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-35755-8\_17},
doi = {10.1007/978-3-642-35755-8\_17},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icete/FukushimaKMS11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/IshiguroKM11,
author = {Tsukasa Ishiguro and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Sihan Qing and
Willy Susilo and
Guilin Wang and
Dongmei Liu},
title = {Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha},
booktitle = {Information and Communications Security - 13th International Conference,
{ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7043},
pages = {255--266},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-25243-3\_21},
doi = {10.1007/978-3-642-25243-3\_21},
timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icics/IshiguroKM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/MizoguchiTMHS11,
author = {Seiichiro Mizoguchi and
Keisuke Takemori and
Yutaka Miyake and
Yoshiaki Hori and
Kouichi Sakurai},
editor = {Ilsun You and
Leonard Barolli and
Feilong Tang and
Fatos Xhafa},
title = {Traceback Framework against Botmaster by Sharing Network Communication
Pattern Information},
booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile
and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
Korea, June 30-July 02, 2011},
pages = {639--644},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/IMIS.2011.152},
doi = {10.1109/IMIS.2011.152},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/imis/MizoguchiTMHS11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/KiyomotoM11,
author = {Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Fatos Xhafa and
Leonard Barolli and
Mario K{\"{o}}ppen},
title = {On Data Importance Analysis},
booktitle = {2011 Third International Conference on Intelligent Networking and
Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
2, 2011},
pages = {628--633},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/INCoS.2011.127},
doi = {10.1109/INCOS.2011.127},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/incos/KiyomotoM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/OtaKM11,
author = {Haruki Ota and
Shinsaku Kiyomoto and
Yutaka Miyake},
editor = {Pierangela Samarati and
Sara Foresti and
Jiankun Hu and
Giovanni Livraga},
title = {Automatic security verification for 3-party authentication and key
exchange protocols},
booktitle = {5th International Conference on Network and System Security, {NSS}
2011, Milan, Italy, September 6-8, 2011},
pages = {254--258},
publisher = {{IEEE}},
year = {2011},
url = {https://doi.org/10.1109/ICNSS.2011.6060010},
doi = {10.1109/ICNSS.2011.6060010},
timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
biburl = {https://dblp.org/rec/conf/nss/OtaKM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/SawayaKM11,
author = {Yukiko Sawaya and
Ayumu Kubota and
Yutaka Miyake},
title = {Detection of Attackers in Services Using Anomalous Host Behavior Based
on Traffic Flow Statistics},
booktitle = {11th Annual International Symposium on Applications and the Internet,
{SAINT} 2011, Munich, Germany, 18-21 July, 2011, Proceedings},
pages = {353--359},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/SAINT.2011.68},
doi = {10.1109/SAINT.2011.68},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/saint/SawayaKM11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11,
author = {Kazuhide Fukushima and
Shinsaku Kiyomoto and
Yutaka Miyake and
Kouichi Sakurai},
editor = {Javier L{\'{o}}pez and
Pierangela Samarati},
title = {Towards Optimal Revocation and Tracing Schemes - The Power of the
Ternary Tree},
booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
part of {ICETE} - The International Joint Conference on e-Business
and Telecommunications},
pages = {37--49},
publisher = {SciTePress},
year = {2011},
timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IsoharaTMQP10,
author = {Takamasa Isohara and
Keisuke Takemori and
Yutaka Miyake and
Ning Qu and
Adrian Perrig},
title = {LSM-Based Secure System Monitoring Using Kernel Protection Schemes},
booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability
and Security, 15-18 February 2010, Krakow, Poland},
pages = {591--596},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/ARES.2010.48},
doi = {10.1109/ARES.2010.48},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEares/IsoharaTMQP10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YamadaMM10,
author = {Akira Yamada and
Hara Masanori and
Yutaka Miyake},
title = {Web Tracking Site Detection Based on Temporal Link Analysis},
booktitle = {24th {IEEE} International Conference on Advanced Information Networking
and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13
April 2010},
pages = {626--631},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/WAINA.2010.134},
doi = {10.1109/WAINA.2010.134},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/aina/YamadaMM10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/TakemoriPQM10,
author = {Keisuke Takemori and
Adrian Perrig and
Ning Qu and
Yutaka Miyake},
title = {Remote Attestation for {HDD} Files Using Kernel Protection Mechanism},
booktitle = {Proceedings of {IEEE} International Conference on Communications,
{ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
pages = {1--6},
publisher = {{IEEE}},
year = {2010},
url = {https://doi.org/10.1109/ICC.2010.5501979},
doi = {10.1109/ICC.2010.5501979},
timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
biburl = {https://dblp.org/rec/conf/icc/TakemoriPQM10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamadaKMH09,
author = {Akira Yamada and
Ayumu Kubota and
Yutaka Miyake and
Kazuo Hashimoto},
title = {Service Independent Access Control Architecture for User Generated
Content {(UGC)} and Its Implementation},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {92-D},
number = {10},
pages = {1961--1970},
year = {2009},
url = {https://doi.org/10.1587/transinf.E92.D.1961},
doi = {10.1587/TRANSINF.E92.D.1961},
timestamp = {Fri, 20 Nov 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieicet/YamadaKMH09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YamadaMTHK09,
author = {Akira Yamada and
Yutaka Miyake and
Masahiro Terabe and
Kazuo Hashimoto and
Nei Kato},
editor = {Irfan Awan and
Muhammad Younas and
Takahiro Hara and
Arjan Durresi},
title = {Anomaly Detection for {DNS} Servers Using Frequent Host Selection},
booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking
and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
2009},
pages = {853--860},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/AINA.2009.93},
doi = {10.1109/AINA.2009.93},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/aina/YamadaMTHK09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cics/HaraYM09,
author = {Masanoei Hara and
Akira Yamada and
Yutaka Miyake},
title = {Visual similarity-based phishing detection without victim site information},
booktitle = {2009 {IEEE} Symposium on Computational Intelligence in Cyber Security,
{CICS} 2009, Nashville, TN, USA, March 31 - April 2, 2009},
pages = {30--36},
publisher = {{IEEE}},
year = {2009},
url = {https://doi.org/10.1109/CICYBS.2009.4925087},
doi = {10.1109/CICYBS.2009.4925087},
timestamp = {Fri, 20 Nov 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cics/HaraYM09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KubotaM09,
author = {Ayumu Kubota and
Yutaka Miyake},
title = {Public Key-Based Rendezvous Infrastructure for Secure and Flexible
Private Networking},
booktitle = {Proceedings of {IEEE} International Conference on Communications,
{ICC} 2009, Dresden, Germany, 14-18 June 2009},
pages = {1--6},
publisher = {{IEEE}},
year = {2009},
url = {https://doi.org/10.1109/ICC.2009.5199375},
doi = {10.1109/ICC.2009.5199375},
timestamp = {Thu, 25 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icc/KubotaM09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/YamadaKM08,
author = {Akira Yamada and
Ayumu Kubota and
Yutaka Miyake},
editor = {Hamid R. Arabnia and
Selim Aissi},
title = {Service Independent Access Control Architecture for User Generated
Content {(UGC)}},
booktitle = {Proceedings of the 2008 International Conference on Security {\&}
Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
pages = {220--226},
publisher = {{CSREA} Press},
year = {2008},
timestamp = {Fri, 20 Nov 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/csreaSAM/YamadaKM08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/TakemoriNTM08,
author = {Keisuke Takemori and
Masakatsu Nishigaki and
Tomohiro Takami and
Yutaka Miyake},
title = {Detection of Bot Infected PCs Using Destination-Based {IP} and Domain
Whitelists During a Non-Operating Term},
booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
2008, New Orleans, LA, USA, 30 November - 4 December 2008},
pages = {2072--2077},
publisher = {{IEEE}},
year = {2008},
url = {https://doi.org/10.1109/GLOCOM.2008.ECP.399},
doi = {10.1109/GLOCOM.2008.ECP.399},
timestamp = {Tue, 23 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/globecom/TakemoriNTM08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/KiyomotoTMM07,
author = {Shinsaku Kiyomoto and
Toshiaki Tanaka and
Yutaka Miyake and
Yoshinori Mitamura},
title = {Development of security functions for a medical information sharing
platform},
journal = {Syst. Comput. Jpn.},
volume = {38},
number = {11},
pages = {49--63},
year = {2007},
url = {https://doi.org/10.1002/scj.20466},
doi = {10.1002/SCJ.20466},
timestamp = {Wed, 13 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/scjapan/KiyomotoTMM07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YamadaMTSP07,
author = {Akira Yamada and
Yutaka Miyake and
Keisuke Takemori and
Ahren Studer and
Adrian Perrig},
title = {Intrusion Detection for Encrypted Web Accesses},
booktitle = {21st International Conference on Advanced Information Networking and
Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
2007, Niagara Falls, Canada},
pages = {569--576},
publisher = {{IEEE} Computer Society},
year = {2007},
url = {https://doi.org/10.1109/AINAW.2007.212},
doi = {10.1109/AINAW.2007.212},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/aina/YamadaMTSP07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/FadlullahTAHMNK07,
author = {Zubair Md. Fadlullah and
Tarik Taleb and
Nirwan Ansari and
Kazuo Hashimoto and
Yutaka Miyake and
Yoshiaki Nemoto and
Nei Kato},
title = {Combating Against Attacks on Encrypted Protocols},
booktitle = {Proceedings of {IEEE} International Conference on Communications,
{ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
pages = {1211--1216},
publisher = {{IEEE}},
year = {2007},
url = {https://doi.org/10.1109/ICC.2007.205},
doi = {10.1109/ICC.2007.205},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icc/FadlullahTAHMNK07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TakemoriMIS07,
author = {Keisuke Takemori and
Yutaka Miyake and
Chie Ishida and
Iwao Sasase},
title = {A {SOC} Framework for {ISP} Federation and Attack Forecast by Learning
Propagation Patterns},
booktitle = {{IEEE} International Conference on Intelligence and Security Informatics,
{ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings},
pages = {172--179},
publisher = {{IEEE}},
year = {2007},
url = {https://doi.org/10.1109/ISI.2007.379551},
doi = {10.1109/ISI.2007.379551},
timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
biburl = {https://dblp.org/rec/conf/isi/TakemoriMIS07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KubotaMT06,
author = {Ayumu Kubota and
Yutaka Miyake and
Toshiaki Tanaka},
title = {Secure Host Name Resolution Infrastructure for Overlay Networks},
journal = {{IEICE} Trans. Commun.},
volume = {89-B},
number = {9},
pages = {2434--2439},
year = {2006},
url = {https://doi.org/10.1093/ietcom/e89-b.9.2434},
doi = {10.1093/IETCOM/E89-B.9.2434},
timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/KubotaMT06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KubotaYM06,
author = {Ayumu Kubota and
Akira Yamada and
Yutaka Miyake},
title = {{L2VPN} over Chord: Hosting Millions of Small Zeroconf Networks over
{DHT} Nodes},
booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
'06, San Francisco, CA, USA, 27 November - 1 December 2006},
publisher = {{IEEE}},
year = {2006},
url = {https://doi.org/10.1109/GLOCOM.2006.188},
doi = {10.1109/GLOCOM.2006.188},
timestamp = {Fri, 20 Nov 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/globecom/KubotaYM06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/YamadaMTT05,
author = {Akira Yamada and
Yutaka Miyake and
Keisuke Takemori and
Toshiaki Tanaka},
title = {Intrusion Detection System to Detect Variant Attacks Using Learning
Algorithms with Automatic Generation of Training Data},
booktitle = {International Symposium on Information Technology: Coding and Computing
{(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
pages = {650--655},
publisher = {{IEEE} Computer Society},
year = {2005},
url = {https://doi.org/10.1109/ITCC.2005.178},
doi = {10.1109/ITCC.2005.178},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/itcc/YamadaMTT05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/DenkerMM02,
author = {Grit Denker and
Jonathan K. Millen and
Yutaka Miyake},
title = {Cross-Domain Access Control via {PKI}},
booktitle = {3rd International Workshop on Policies for Distributed Systems and
Networks {(POLICY} 2002), 5-7 June 2002, Monterey, CA, {USA}},
pages = {202--205},
publisher = {{IEEE} Computer Society},
year = {2002},
url = {https://doi.org/10.1109/POLICY.2002.1011308},
doi = {10.1109/POLICY.2002.1011308},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/policy/DenkerMM02.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/HasegawaHMN02,
author = {Teruyuki Hasegawa and
Toru Hasegawa and
Yutaka Miyake and
Koji Nakao},
title = {{TCP} gateway for satellite-based Internet service accommodating multiple
subscribers},
booktitle = {2002 {IEEE} Wireless Communications and Networking Conference Record,
{WCNC} 2002, Orlando, Florida, USA, MArch 17-21, 2002},
pages = {849--854},
publisher = {{IEEE}},
year = {2002},
url = {https://doi.org/10.1109/WCNC.2002.993379},
doi = {10.1109/WCNC.2002.993379},
timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
biburl = {https://dblp.org/rec/conf/wcnc/HasegawaHMN02.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/MiyakeHHK00,
author = {Yutaka Miyake and
Teruyuki Hasegawa and
Toru Hasegawa and
Toshihiko Kato},
title = {Acceleration of {TCP} Throughput over Satellite-Based Internet Access
Using {TCP} Gateway},
booktitle = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications
{(ISCC} 2000), 4-6 July 2000, Antibes, France},
pages = {245--253},
publisher = {{IEEE} Computer Society},
year = {2000},
url = {https://doi.org/10.1109/ISCC.2000.860646},
doi = {10.1109/ISCC.2000.860646},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iscc/MiyakeHHK00.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/KatoOSMIS00,
author = {Toshihiko Kato and
Tomohiko Ogishi and
Hiroyuki Shinbo and
Yutaka Miyake and
Akira Idoue and
Kenji Suzuki},
editor = {Hasan Ural and
Robert L. Probert and
Gregor von Bochmann},
title = {Interoperability Testing System of {TCP/IP} Based Systems in Operational
Environment},
booktitle = {Testing of Communicating Systems: Tools and Techniques, {IFIP} {TC6/WG6.1}
13\({}^{\mbox{th}}\) International Conference on Testing Communicating
Systems (TestCom 2000), August 29 - September 1, 2000, Ottawa, Canada},
series = {{IFIP} Conference Proceedings},
volume = {176},
pages = {143},
publisher = {Kluwer},
year = {2000},
timestamp = {Thu, 22 Sep 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pts/KatoOSMIS00.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/MiyakeKS95,
author = {Yutaka Miyake and
Toshihiko Kato and
Kenji Suzuki},
title = {Implementation method of high speed protocol as transport library},
booktitle = {1995 International Conference on Network Protocols, {ICNP} 1995, November
7-10, 1995, Tokyo, Japan},
pages = {172--179},
publisher = {{IEEE} Computer Society},
year = {1995},
url = {https://doi.org/10.1109/ICNP.1995.524832},
doi = {10.1109/ICNP.1995.524832},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icnp/MiyakeKS95.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/MiyakeHN89,
author = {Yutaka Miyake and
Masafumi Hagiwara and
Masao Nakagawa},
title = {A new timing extraction method and data interpolation for block demodulation},
booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing,
{ICASSP} '89, Glasgow, Scotland, May 23-26, 1989},
pages = {1223--1226},
publisher = {{IEEE}},
year = {1989},
url = {https://doi.org/10.1109/ICASSP.1989.266655},
doi = {10.1109/ICASSP.1989.266655},
timestamp = {Mon, 09 Aug 2021 14:54:02 +0200},
biburl = {https://dblp.org/rec/conf/icassp/MiyakeHN89.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}