iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.uni-trier.de/pid/22/993.bib
@article{DBLP:journals/eis/NakaharaOKMK23, author = {Masataka Nakahara and Norihiro Okui and Yasuaki Kobayashi and Yutaka Miyake and Ayumu Kubota}, title = {Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data}, journal = {Enterp. Inf. Syst.}, volume = {17}, number = {9}, year = {2023}, url = {https://doi.org/10.1080/17517575.2022.2142854}, doi = {10.1080/17517575.2022.2142854}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/NakaharaOKMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iotj/PashamokhtariOMNG23, author = {Arman Pashamokhtari and Norihiro Okui and Yutaka Miyake and Masataka Nakahara and Hassan Habibi Gharakheili}, title = {Combining Stochastic and Deterministic Modeling of {IPFIX} Records to Infer Connected IoT Devices in Residential {ISP} Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {6, March 15}, pages = {5128--5145}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3222116}, doi = {10.1109/JIOT.2022.3222116}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PashamokhtariOMNG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bwcca/SerizawaOOYSNNB22, author = {Ayumi Serizawa and Ryosuke Okudera and Yumo Ouchi and Mizuho Yoshihira and Yuya Shiomi and Naoya Nitta and Masataka Nakahara and Akira Baba and Yutaka Miyake and Tetsushi Ohki and Masakatsu Nishigaki}, editor = {Leonard Barolli}, title = {Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition}, booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 17th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2022), Tirana, Albania, 27-29 October 2022}, series = {Lecture Notes in Networks and Systems}, volume = {570}, pages = {125--136}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20029-8\_12}, doi = {10.1007/978-3-031-20029-8\_12}, timestamp = {Thu, 20 Oct 2022 11:20:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/SerizawaOOYSNNB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/compsac/OkuiNMK22, author = {Norihiro Okui and Masataka Nakahara and Yutaka Miyake and Ayumu Kubota}, editor = {Hong Va Leong and Sahra Sedigh Sarvestani and Yuuichi Teranishi and Alfredo Cuzzocrea and Hiroki Kashiwazaki and Dave Towey and Ji{-}Jiang Yang and Hossain Shahriar}, title = {Identification of an IoT Device Model in the Home Domain Using {IPFIX} Records}, booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc, {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022}, pages = {583--592}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMPSAC54236.2022.00104}, doi = {10.1109/COMPSAC54236.2022.00104}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/OkuiNMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/hci/YoshihiraSOOSNN22, author = {Mizuho Yoshihira and Ayumi Serizawa and Ryosuke Okudera and Yumo Ouchi and Yuya Shiomi and Naoya Nitta and Masataka Nakahara and Akira Baba and Yutaka Miyake and Tetsushi Ohki and Masakatsu Nishigaki}, editor = {Abbas Moallem}, title = {Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - 4th International Conference, {HCI-CPT} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13333}, pages = {78--93}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05563-8\_6}, doi = {10.1007/978-3-031-05563-8\_6}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/YoshihiraSOOSNN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iotbd/NakaharaOKM21, author = {Masataka Nakahara and Norihiro Okui and Yasuaki Kobayashi and Yutaka Miyake}, editor = {Gary B. Wills and P{\'{e}}ter Kacsuk and Victor Chang}, title = {Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest}, booktitle = {Proceedings of the 6th International Conference on Internet of Things, Big Data and Security, IoTBDS 2021, Online Streaming, April 23-25, 2021}, pages = {38--47}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010394900380047}, doi = {10.5220/0010394900380047}, timestamp = {Mon, 31 May 2021 12:07:54 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/NakaharaOKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/lcn/PashamokhtariOM21, author = {Arman Pashamokhtari and Norihiro Okui and Yutaka Miyake and Masataka Nakahara and Hassan Habibi Gharakheili}, title = {Inferring Connected IoT Devices from {IPFIX} Records in Residential {ISP} Networks}, booktitle = {46th {IEEE} Conference on Local Computer Networks, {LCN} 2021, Edmonton, AB, Canada, October 4-7, 2021}, pages = {57--64}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/LCN52139.2021.9524954}, doi = {10.1109/LCN52139.2021.9524954}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lcn/PashamokhtariOM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sera/NakanoNKOIHYMK21, author = {Yuto Nakano and Toru Nakamura and Yasuaki Kobayashi and Takashi Ozu and Masahito Ishizaka and Masayuki Hashimoto and Hiroyuki Yokoyama and Yutaka Miyake and Shinsaku Kiyomoto}, title = {Automatic Security Inspection Framework for Trustworthy Supply Chain}, booktitle = {19th {IEEE/ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2021, Kanazawa, Japan, June 20-22, 2021}, pages = {45--50}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERA51205.2021.9509040}, doi = {10.1109/SERA51205.2021.9509040}, timestamp = {Fri, 13 Aug 2021 10:40:52 +0200}, biburl = {https://dblp.org/rec/conf/sera/NakanoNKOIHYMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/eucnc/NakanoNKIHYMK20, author = {Yuto Nakano and Toru Nakamura and Yasuaki Kobayashi and Masahito Ishizaka and Masayuki Hashimoto and Hiroyuki Yokoyama and Yutaka Miyake and Shinsaku Kiyomoto}, title = {Consideration on Data Conformance Toward Building Trust in Supply Chain}, booktitle = {2020 European Conference on Networks and Communications, EuCNC 2020, Dubrovnik, Croatia, June 15-18, 2020}, pages = {128--132}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuCNC48522.2020.9200933}, doi = {10.1109/EUCNC48522.2020.9200933}, timestamp = {Tue, 29 Sep 2020 14:45:05 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/NakanoNKIHYMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ihsi/SugimotoSBOOMN20, author = {Ayaka Sugimoto and Yuya Shiomi and Akira Baba and Norihiro Okui and Tetsushi Ohki and Yutaka Miyake and Masakatsu Nishigaki}, editor = {Tareq Z. Ahram and Waldemar Karwowski and Alberto Vergnano and Francesco Leali and Redha Ta{\"{\i}}ar}, title = {A Liveness Detection Method for Palmprint Authentication}, booktitle = {Intelligent Human Systems Integration 2020 - Proceedings of the 3rd International Conference on Intelligent Human Systems Integration {(IHSI} 2020): Integrating People and Intelligent Systems, February 19-21, 2020, Modena, Italy}, series = {Advances in Intelligent Systems and Computing}, volume = {1131}, pages = {385--391}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-39512-4\_60}, doi = {10.1007/978-3-030-39512-4\_60}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ihsi/SugimotoSBOOMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iotbd/NakaharaOKM20, author = {Masataka Nakahara and Norihiro Okui and Yasuaki Kobayashi and Yutaka Miyake}, editor = {Gary B. Wills and P{\'{e}}ter Kacsuk and Victor Chang}, title = {Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data}, booktitle = {Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9, 2020}, pages = {78--87}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009345300780087}, doi = {10.5220/0009345300780087}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/NakaharaOKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/compsac/HashimotoHM18, author = {Masaki Hashimoto and Yoshiaki Hori and Yutaka Miyake}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Md. Kamrul Hasan}, title = {Message from the {NETSAP} 2018 Workshop Organizers}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {652}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10312}, doi = {10.1109/COMPSAC.2018.10312}, timestamp = {Mon, 19 Aug 2024 08:42:01 +0200}, biburl = {https://dblp.org/rec/conf/compsac/HashimotoHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/csm/MasiniGSZDLWKLL17, author = {Gino Masini and Craig Gunther and Jonathan Segev and Yuan Zhang and Huan Deng and Gyu Myoung Lee and Dong Wang and Emil Kowalczyk and Kangchan Lee and Leo Lehmann and Tom Huber and Steve S. Gorshe and Stephen Shew and Stefano Ruffini and Silvana Rodrigues and Heung Youl Youm and Yutaka Miyake and Arnaud Taddei}, title = {Standards News}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {1}, number = {4}, pages = {16--21}, year = {2017}, url = {https://doi.org/10.1109/MCOMSTD.2017.8258593}, doi = {10.1109/MCOMSTD.2017.8258593}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/MasiniGSZDLWKLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijnc/YuanCKMT16, author = {Ye Yuan and Chen{-}Mou Cheng and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Portable Implementation of Lattice-based Cryptography using JavaScript}, journal = {Int. J. Netw. Comput.}, volume = {6}, number = {2}, pages = {309--327}, year = {2016}, url = {http://www.ijnc.org/index.php/ijnc/article/view/130}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/YuanCKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/compsac/IidaMYYB16, author = {Katsuyoshi Iida and Yutaka Miyake and Chung Huang Yang and Bian Yang and Julien Bringer}, title = {Message from the {NETSAP} and {SIMICE} Workshop Organizers}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {552}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.286}, doi = {10.1109/COMPSAC.2016.286}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/IidaMYYB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ccs/BasuCVCKSM15, author = {Anirban Basu and Juan Camilo Corena and Jaideep Vaidya and Jon Crowcroft and Shinsaku Kiyomoto and Yung Shin Van Der Sype and Yutaka Miyake}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Practical Private One-way Anonymous Message Routing}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {665}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714641}, doi = {10.1145/2714576.2714641}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasuCVCKSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/compsac/HoriMY15, author = {Yoshiaki Hori and Yutaka Miyake and Chung Huang Yang}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Message from the {NETSAP} 2015 Workshop Organizers}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {248}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.304}, doi = {10.1109/COMPSAC.2015.304}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HoriMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ic-nc/YuanCKMT15, author = {Ye Yuan and Chen{-}Mou Cheng and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Portable Implementation of Lattice-Based Cryptography Using JavaScript}, booktitle = {Third International Symposium on Computing and Networking, {CANDAR} 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015}, pages = {58--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CANDAR.2015.36}, doi = {10.1109/CANDAR.2015.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YuanCKMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/trustcom/KiyomotoNM15, author = {Shinsaku Kiyomoto and Toru Nakamura and Yutaka Miyake}, title = {Towards Tracing of k-Anonymized Datasets}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1237--1242}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.511}, doi = {10.1109/TRUSTCOM.2015.511}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KiyomotoNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wf-iot/NeisseBSMKB15, author = {Ricardo Neisse and Gianmarco Baldini and Gary Steri and Yutaka Miyake and Shinsaku Kiyomoto and Abdur Rahim Biswas}, title = {An agent-based framework for Informed Consent in the internet of things}, booktitle = {2nd {IEEE} World Forum on Internet of Things, WF-IoT 2015, Milan, Italy, December 14-16, 2015}, pages = {789--794}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WF-IoT.2015.7389154}, doi = {10.1109/WF-IOT.2015.7389154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wf-iot/NeisseBSMKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/NakanoFKIMTS14, author = {Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsukasa Ishiguro and Yutaka Miyake and Toshiaki Tanaka and Kouichi Sakurai}, title = {Fast Implementation of KCipher-2 for Software and Hardware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {1}, pages = {43--52}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.43}, doi = {10.1587/TRANSINF.E97.D.43}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/HibikiHNFKMA14, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {157--166}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.157}, doi = {10.1587/TRANSFUN.E97.A.157}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/NakanoKMS14, author = {Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, title = {Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {10}, pages = {2576--2585}, year = {2014}, url = {https://doi.org/10.1587/transinf.2013THP0007}, doi = {10.1587/TRANSINF.2013THP0007}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoKMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jaihc/KiyomotoFM14, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Security issues on {IT} systems during disasters: a survey}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {5}, number = {2}, pages = {173--185}, year = {2014}, url = {https://doi.org/10.1007/s12652-013-0177-8}, doi = {10.1007/S12652-013-0177-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/KiyomotoFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/KiyomotoM14, author = {Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {PrivacyFrost2: {A} Efficient Data Anonymization Tool Based on Scoring Functions}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {211--225}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_16}, doi = {10.1007/978-3-319-10975-6\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ccnc/CorenaBKMO14, author = {Juan Camilo Corena and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake and Tomoaki Ohtsuki}, title = {{XOR} network coding pollution prevention without homomorphic functions}, booktitle = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2014, Las Vegas, NV, USA, January 10-13, 2014}, pages = {293--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCNC.2014.6866586}, doi = {10.1109/CCNC.2014.6866586}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/CorenaBKMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cloudcom/BasuCMPGKVM14, author = {Anirban Basu and Juan Camilo Corena and Anna Monreale and Dino Pedreschi and Fosca Giannotti and Shinsaku Kiyomoto and Jaideep Vaidya and Yutaka Miyake}, title = {CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud}, booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014}, pages = {731--734}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CloudCom.2014.114}, doi = {10.1109/CLOUDCOM.2014.114}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/BasuCMPGKVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cloudcom/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Data Storage on the Cloud under User Control}, booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014}, pages = {739--742}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CloudCom.2014.113}, doi = {10.1109/CLOUDCOM.2014.113}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/crisis/NakanoBKM14, author = {Yuto Nakano and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Key Extraction Attack Using Statistical Analysis of Memory Dump Data}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {239--246}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_17}, doi = {10.1007/978-3-319-17127-2\_17}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/NakanoBKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/globecom/CorenaBKMO14, author = {Juan Camilo Corena and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake and Tomoaki Ohtsuki}, title = {Beyond proofs of data possession: Finding defective blocks in outsourced storage}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014}, pages = {2381--2386}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOM.2014.7037164}, doi = {10.1109/GLOCOM.2014.7037164}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CorenaBKMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ifiptm/BasuMCGPKMYT14, author = {Anirban Basu and Anna Monreale and Juan Camilo Corena and Fosca Giannotti and Dino Pedreschi and Shinsaku Kiyomoto and Yutaka Miyake and Tadashi Yanagihara and Roberto Trasarti}, editor = {Jianying Zhou and Nurit Gal{-}Oz and Jie Zhang and Ehud Gudes}, title = {A Privacy Risk Model for Trajectory Data}, booktitle = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {430}, pages = {125--140}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43813-8\_9}, doi = {10.1007/978-3-662-43813-8\_9}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuMCGPKMYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/imis/KiyomotoM14, author = {Shinsaku Kiyomoto and Yutaka Miyake}, title = {How to Find an Appropriate {K} for K-Anonymization}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {273--279}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.34}, doi = {10.1109/IMIS.2014.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/KiyomotoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pkc/IshiguroKMT14, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, editor = {Hugo Krawczyk}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a 128-Dimensional Ideal Lattice}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {411--428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_24}, doi = {10.1007/978-3-642-54631-0\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sac/BasuCKVMM14, author = {Anirban Basu and Juan Camilo Corena and Shinsaku Kiyomoto and Jaideep Vaidya and Stephen Marsh and Yutaka Miyake}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {PrefRank: fair aggregation of subjective user preferences}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {287--288}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2555084}, doi = {10.1145/2554850.2555084}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BasuCKVMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sac/BasuCKMVG0M14, author = {Anirban Basu and Juan Camilo Corena and Shinsaku Kiyomoto and Stephen Marsh and Jaideep Vaidya and Guibing Guo and Jie Zhang and Yutaka Miyake}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Privacy preserving trusted social feedback}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1706--1711}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554860}, doi = {10.1145/2554850.2554860}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BasuCKMVG0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {307--314}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005049803070314}, doi = {10.5220/0005049803070314}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/mms/OtaAWIMA13, author = {Haruki Ota and Shoichiro Aoyama and Ryu Watanabe and Koichi Ito and Yutaka Miyake and Takafumi Aoki}, title = {Implementation and evaluation of a remote authentication system using touchless palmprint recognition}, journal = {Multim. Syst.}, volume = {19}, number = {2}, pages = {117--129}, year = {2013}, url = {https://doi.org/10.1007/s00530-012-0283-z}, doi = {10.1007/S00530-012-0283-Z}, timestamp = {Mon, 11 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/OtaAWIMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/KiyomotoNTWM13, author = {Shinsaku Kiyomoto and Toru Nakamura and Haruo Takasaki and Ryu Watanabe and Yutaka Miyake}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {{PPM:} Privacy Policy Manager for Personalized Services}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {377--392}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_26}, doi = {10.1007/978-3-642-40588-4\_26}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cosade/HibikiHNFKMA13, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, editor = {Emmanuel Prouff}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {169--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_11}, doi = {10.1007/978-3-642-40026-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/esorics/JiaAFBSFKM13, author = {Limin Jia and Jassim Aljuraidan and Elli Fragkaki and Lujo Bauer and Michael Stroucken and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract)}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {775--792}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_43}, doi = {10.1007/978-3-642-40203-6\_43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nbis/KanekoNTMN13, author = {Takuya Kaneko and Takumi Nagaya and Keisuke Takemori and Yutaka Miyake and Masakatsu Nishigaki}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa and James J. Park}, title = {A Proposal for the Deterrence of Information Leakage Using Anti-virus Software}, booktitle = {16th International Conference on Network-Based Information Systems, NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013}, pages = {90--96}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NBiS.2013.17}, doi = {10.1109/NBIS.2013.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/KanekoNTMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/IshiguroKM13, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {51--61}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223155/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IshiguroKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13, author = {Shinsaku Kiyomoto and Andre Rein and Yuto Nakano and Carsten Rudolph and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {{LMM} - {A} Common Component for Software License Management on Cloud}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {284--295}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223177/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/trustcom/NakamuraKWM13, author = {Toru Nakamura and Shinsaku Kiyomoto and Ryu Watanabe and Yutaka Miyake}, title = {{P3MCF:} Practical Privacy-Preserving Multi-domain Collaborative Filtering}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {354--361}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.271}, doi = {10.1109/TRUSTCOM.2013.271}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NakamuraKWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/IshiguroKMT13, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} in the Ideal Lattice of 128 dimensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2013}, url = {http://eprint.iacr.org/2013/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshiguroKMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/FukushimaKM12, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Software Protection Combined with Tamper-Proof Device}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {213--222}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.213}, doi = {10.1587/TRANSFUN.E95.A.213}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jowua/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Design of Categorization Mechanism for Disaster-Information-Gathering System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {21--34}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.021}, doi = {10.22667/JOWUA.2012.12.31.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {Security-and-Privacy-Related Issues on {IT} Systems During Disasters}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {445--459}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_33}, doi = {10.1007/978-3-642-32498-7\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cardis/NakanoCKM12, author = {Yuto Nakano and Carlos Cid and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Stefan Mangard}, title = {Memory Access Pattern Protection for Resource-Constrained Devices}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {188--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_13}, doi = {10.1007/978-3-642-37288-9\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/NakanoCKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/trustcom/KiyomotoMT12, author = {Shinsaku Kiyomoto and Yutaka Miyake and Toshiaki Tanaka}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {1755--1762}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.214}, doi = {10.1109/TRUSTCOM.2012.214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KiyomotoMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wistp/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Preservation of User History Graph}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {87--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_9}, doi = {10.1007/978-3-642-30955-7\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/Miyake11, author = {Yutaka Miyake}, title = {Foreword}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {11}, pages = {2067--2068}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.2067}, doi = {10.1587/TRANSINF.E94.D.2067}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Miyake11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/imt/YamadaMM11, author = {Akira Yamada and Hara Masanori and Yutaka Miyake}, title = {Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation}, journal = {Inf. Media Technol.}, volume = {6}, number = {2}, pages = {560--571}, year = {2011}, url = {https://doi.org/10.11185/imt.6.560}, doi = {10.11185/IMT.6.560}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/YamadaMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/imt/TakemoriSNM11, author = {Keisuke Takemori and Takahiro Sakai and Masakatsu Nishigaki and Yutaka Miyake}, title = {Detection of Bot Infected {PC} Using Destination-based {IP} Address and Domain Name Whitelists}, journal = {Inf. Media Technol.}, volume = {6}, number = {2}, pages = {649--659}, year = {2011}, url = {https://doi.org/10.11185/imt.6.649}, doi = {10.11185/IMT.6.649}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/TakemoriSNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jip/YamadaMM11, author = {Akira Yamada and Hara Masanori and Yutaka Miyake}, title = {Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation}, journal = {J. Inf. Process.}, volume = {19}, pages = {62--73}, year = {2011}, url = {https://doi.org/10.2197/ipsjjip.19.62}, doi = {10.2197/IPSJJIP.19.62}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YamadaMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jip/TakemoriSNM11, author = {Keisuke Takemori and Takahiro Sakai and Masakatsu Nishigaki and Yutaka Miyake}, title = {Detection of Bot Infected {PC} Using Destination-based {IP} Address and Domain Name Whitelists}, journal = {J. Inf. Process.}, volume = {19}, pages = {169--179}, year = {2011}, url = {https://doi.org/10.2197/ipsjjip.19.169}, doi = {10.2197/IPSJJIP.19.169}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/TakemoriSNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jisis/FukushimaKM11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Towards Secure Cloud Computing Architecture - {A} Solution Based on Software Protection Mechanism}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {1}, pages = {4--17}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.05.31.004}, doi = {10.22667/JISIS.2011.05.31.004}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FukushimaKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tce/ShinFKM11, author = {Wook Shin and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {{AMY:} Use your cell phone to create a protected personal network over devices}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {57}, number = {1}, pages = {99--104}, year = {2011}, url = {https://doi.org/10.1109/TCE.2011.5735487}, doi = {10.1109/TCE.2011.5735487}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/ShinFKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/KiyomotoMT11, author = {Shinsaku Kiyomoto and Yutaka Miyake and Toshiaki Tanaka}, title = {Privacy Frost: {A} User-Oriented Data Anonymization Tool}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {442--447}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.68}, doi = {10.1109/ARES.2011.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/fgit/KiyomotoFM11, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Wai{-}Chi Fang and L. Javier Garc{\'{\i}}a{-}Villalba and Kirk P. Arnett and Muhammad Khurram Khan}, title = {Data Anonymity in Multi-Party Service Model}, booktitle = {Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {259}, pages = {21--30}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27189-2\_3}, doi = {10.1007/978-3-642-27189-2\_3}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KiyomotoFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icete/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Mohammad S. Obaidat and Jos{\'{e}} Luis Sevillano and Joaquim Filipe}, title = {Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {314}, pages = {233--248}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35755-8\_17}, doi = {10.1007/978-3-642-35755-8\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icics/IshiguroKM11, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {255--266}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_21}, doi = {10.1007/978-3-642-25243-3\_21}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/IshiguroKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/imis/MizoguchiTMHS11, author = {Seiichiro Mizoguchi and Keisuke Takemori and Yutaka Miyake and Yoshiaki Hori and Kouichi Sakurai}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {Traceback Framework against Botmaster by Sharing Network Communication Pattern Information}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {639--644}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.152}, doi = {10.1109/IMIS.2011.152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/MizoguchiTMHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/incos/KiyomotoM11, author = {Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {On Data Importance Analysis}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {628--633}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.127}, doi = {10.1109/INCOS.2011.127}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/KiyomotoM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nss/OtaKM11, author = {Haruki Ota and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Automatic security verification for 3-party authentication and key exchange protocols}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {254--258}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060010}, doi = {10.1109/ICNSS.2011.6060010}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/nss/OtaKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/saint/SawayaKM11, author = {Yukiko Sawaya and Ayumu Kubota and Yutaka Miyake}, title = {Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics}, booktitle = {11th Annual International Symposium on Applications and the Internet, {SAINT} 2011, Munich, Germany, 18-21 July, 2011, Proceedings}, pages = {353--359}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SAINT.2011.68}, doi = {10.1109/SAINT.2011.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/SawayaKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--49}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/IEEEares/IsoharaTMQP10, author = {Takamasa Isohara and Keisuke Takemori and Yutaka Miyake and Ning Qu and Adrian Perrig}, title = {LSM-Based Secure System Monitoring Using Kernel Protection Schemes}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {591--596}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.48}, doi = {10.1109/ARES.2010.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/IsoharaTMQP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/aina/YamadaMM10, author = {Akira Yamada and Hara Masanori and Yutaka Miyake}, title = {Web Tracking Site Detection Based on Temporal Link Analysis}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {626--631}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WAINA.2010.134}, doi = {10.1109/WAINA.2010.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/YamadaMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icc/TakemoriPQM10, author = {Keisuke Takemori and Adrian Perrig and Ning Qu and Yutaka Miyake}, title = {Remote Attestation for {HDD} Files Using Kernel Protection Mechanism}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5501979}, doi = {10.1109/ICC.2010.5501979}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/TakemoriPQM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/YamadaKMH09, author = {Akira Yamada and Ayumu Kubota and Yutaka Miyake and Kazuo Hashimoto}, title = {Service Independent Access Control Architecture for User Generated Content {(UGC)} and Its Implementation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {10}, pages = {1961--1970}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.1961}, doi = {10.1587/TRANSINF.E92.D.1961}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/YamadaKMH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/aina/YamadaMTHK09, author = {Akira Yamada and Yutaka Miyake and Masahiro Terabe and Kazuo Hashimoto and Nei Kato}, editor = {Irfan Awan and Muhammad Younas and Takahiro Hara and Arjan Durresi}, title = {Anomaly Detection for {DNS} Servers Using Frequent Host Selection}, booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29, 2009}, pages = {853--860}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/AINA.2009.93}, doi = {10.1109/AINA.2009.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/YamadaMTHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cics/HaraYM09, author = {Masanoei Hara and Akira Yamada and Yutaka Miyake}, title = {Visual similarity-based phishing detection without victim site information}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence in Cyber Security, {CICS} 2009, Nashville, TN, USA, March 31 - April 2, 2009}, pages = {30--36}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CICYBS.2009.4925087}, doi = {10.1109/CICYBS.2009.4925087}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cics/HaraYM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icc/KubotaM09, author = {Ayumu Kubota and Yutaka Miyake}, title = {Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199375}, doi = {10.1109/ICC.2009.5199375}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KubotaM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/csreaSAM/YamadaKM08, author = {Akira Yamada and Ayumu Kubota and Yutaka Miyake}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Service Independent Access Control Architecture for User Generated Content {(UGC)}}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {220--226}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/YamadaKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/globecom/TakemoriNTM08, author = {Keisuke Takemori and Masakatsu Nishigaki and Tomohiro Takami and Yutaka Miyake}, title = {Detection of Bot Infected PCs Using Destination-Based {IP} and Domain Whitelists During a Non-Operating Term}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {2072--2077}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.399}, doi = {10.1109/GLOCOM.2008.ECP.399}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/TakemoriNTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/scjapan/KiyomotoTMM07, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Yutaka Miyake and Yoshinori Mitamura}, title = {Development of security functions for a medical information sharing platform}, journal = {Syst. Comput. Jpn.}, volume = {38}, number = {11}, pages = {49--63}, year = {2007}, url = {https://doi.org/10.1002/scj.20466}, doi = {10.1002/SCJ.20466}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/KiyomotoTMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/aina/YamadaMTSP07, author = {Akira Yamada and Yutaka Miyake and Keisuke Takemori and Ahren Studer and Adrian Perrig}, title = {Intrusion Detection for Encrypted Web Accesses}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {569--576}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.212}, doi = {10.1109/AINAW.2007.212}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/YamadaMTSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icc/FadlullahTAHMNK07, author = {Zubair Md. Fadlullah and Tarik Taleb and Nirwan Ansari and Kazuo Hashimoto and Yutaka Miyake and Yoshiaki Nemoto and Nei Kato}, title = {Combating Against Attacks on Encrypted Protocols}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1211--1216}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.205}, doi = {10.1109/ICC.2007.205}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/FadlullahTAHMNK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isi/TakemoriMIS07, author = {Keisuke Takemori and Yutaka Miyake and Chie Ishida and Iwao Sasase}, title = {A {SOC} Framework for {ISP} Federation and Attack Forecast by Learning Propagation Patterns}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings}, pages = {172--179}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISI.2007.379551}, doi = {10.1109/ISI.2007.379551}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/TakemoriMIS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/KubotaMT06, author = {Ayumu Kubota and Yutaka Miyake and Toshiaki Tanaka}, title = {Secure Host Name Resolution Infrastructure for Overlay Networks}, journal = {{IEICE} Trans. Commun.}, volume = {89-B}, number = {9}, pages = {2434--2439}, year = {2006}, url = {https://doi.org/10.1093/ietcom/e89-b.9.2434}, doi = {10.1093/IETCOM/E89-B.9.2434}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KubotaMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/globecom/KubotaYM06, author = {Ayumu Kubota and Akira Yamada and Yutaka Miyake}, title = {{L2VPN} over Chord: Hosting Millions of Small Zeroconf Networks over {DHT} Nodes}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.188}, doi = {10.1109/GLOCOM.2006.188}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/KubotaYM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itcc/YamadaMTT05, author = {Akira Yamada and Yutaka Miyake and Keisuke Takemori and Toshiaki Tanaka}, title = {Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {650--655}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.178}, doi = {10.1109/ITCC.2005.178}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/YamadaMTT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/policy/DenkerMM02, author = {Grit Denker and Jonathan K. Millen and Yutaka Miyake}, title = {Cross-Domain Access Control via {PKI}}, booktitle = {3rd International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2002), 5-7 June 2002, Monterey, CA, {USA}}, pages = {202--205}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/POLICY.2002.1011308}, doi = {10.1109/POLICY.2002.1011308}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/DenkerMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wcnc/HasegawaHMN02, author = {Teruyuki Hasegawa and Toru Hasegawa and Yutaka Miyake and Koji Nakao}, title = {{TCP} gateway for satellite-based Internet service accommodating multiple subscribers}, booktitle = {2002 {IEEE} Wireless Communications and Networking Conference Record, {WCNC} 2002, Orlando, Florida, USA, MArch 17-21, 2002}, pages = {849--854}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/WCNC.2002.993379}, doi = {10.1109/WCNC.2002.993379}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/HasegawaHMN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iscc/MiyakeHHK00, author = {Yutaka Miyake and Teruyuki Hasegawa and Toru Hasegawa and Toshihiko Kato}, title = {Acceleration of {TCP} Throughput over Satellite-Based Internet Access Using {TCP} Gateway}, booktitle = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications {(ISCC} 2000), 4-6 July 2000, Antibes, France}, pages = {245--253}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ISCC.2000.860646}, doi = {10.1109/ISCC.2000.860646}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/MiyakeHHK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pts/KatoOSMIS00, author = {Toshihiko Kato and Tomohiko Ogishi and Hiroyuki Shinbo and Yutaka Miyake and Akira Idoue and Kenji Suzuki}, editor = {Hasan Ural and Robert L. Probert and Gregor von Bochmann}, title = {Interoperability Testing System of {TCP/IP} Based Systems in Operational Environment}, booktitle = {Testing of Communicating Systems: Tools and Techniques, {IFIP} {TC6/WG6.1} 13\({}^{\mbox{th}}\) International Conference on Testing Communicating Systems (TestCom 2000), August 29 - September 1, 2000, Ottawa, Canada}, series = {{IFIP} Conference Proceedings}, volume = {176}, pages = {143}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pts/KatoOSMIS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icnp/MiyakeKS95, author = {Yutaka Miyake and Toshihiko Kato and Kenji Suzuki}, title = {Implementation method of high speed protocol as transport library}, booktitle = {1995 International Conference on Network Protocols, {ICNP} 1995, November 7-10, 1995, Tokyo, Japan}, pages = {172--179}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ICNP.1995.524832}, doi = {10.1109/ICNP.1995.524832}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/MiyakeKS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icassp/MiyakeHN89, author = {Yutaka Miyake and Masafumi Hagiwara and Masao Nakagawa}, title = {A new timing extraction method and data interpolation for block demodulation}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} '89, Glasgow, Scotland, May 23-26, 1989}, pages = {1223--1226}, publisher = {{IEEE}}, year = {1989}, url = {https://doi.org/10.1109/ICASSP.1989.266655}, doi = {10.1109/ICASSP.1989.266655}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icassp/MiyakeHN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }