1.
|
2021
|
Article
|
Investigation of Power Consumption Attack on Android Devices (Collaboration)
|
2.
|
2020
|
Article
|
Comparison of OAuth/OpenID Connect Security in America and Japan (Collaboration)
|
3.
|
2019
|
Article
|
Examination and Comparison of Countermeasures Against Web Tracking Technologies (Collaboration)
|
4.
|
2019
|
Article
|
How Securely Are OAuth/OpenID Connect Implemented in Japan? (Collaboration)
|
5.
|
2018
|
Article
|
A Proposal and the Evaluation of a Hands-On Training System for Cyber Securit (Collaboration)
|
6.
|
2018
|
Article
|
Combining Featuresin Browser Fingerprinting (Collaboration)
|
7.
|
2018
|
Article
|
On Estimating Platforms of Web User with JavaScript Math Object (Collaboration)
|
8.
|
2018
|
Article
|
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries (Collaboration)
|
9.
|
2017
|
Article
|
Proposal and Implementation of a Countermeasure against Event Tracking on the Web (Collaboration)
|
10.
|
2017
|
Article
|
Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting? (Collaboration)
|
11.
|
2017
|
Article
|
Web Browser Tampering:Inspecting CPU Features from Side-Channel Information (Collaboration)
|
12.
|
2016
|
Article
|
A Browser Scanner: Collecting Intranet Information (Collaboration)
|
13.
|
2016
|
Article
|
A Survey of Prevention/Mitigation against Memory Corruption Attacks (Collaboration)
|
14.
|
2016
|
Article
|
An Authorization Scheme Concealing Client's Access from Authentication Server (Collaboration)
|
15.
|
2016
|
Article
|
Estimating CPU Features by Browser Fingerprinting (Collaboration)
|
16.
|
2015/03
|
Article
|
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (Collaboration)
|
17.
|
2012
|
Article
|
Authentication Binding between SSL/TLS and HTTP IEICE TRANSACTIONS on Information and Systems .E95-D(3),pp.786-796 (Collaboration)
|
18.
|
2009
|
Article
|
A Scenario-Based Protocol Checker for the Public-Key Authentication Scheme IEICE TRANSACTIONS on Information and Systems Vol.E92-D(6),pp.1268-1279 (Single)
|
19.
|
2009
|
Article
|
An Implementation and its Evaluation of Password Cracking Tool Parallelized on GPGPU, Proc. of Communications and Information Technologies (ISCIT) 2010 pp.534 - 538 (Collaboration)
|
20.
|
2009
|
Article
|
SSL Connection Failover in Web Clusters and its Evaluation Proc. of the 12th International Conference on Network-Based Information Systems (Collaboration)
|
21.
|
2008
|
Article
|
Authentication Binding between TLS and HTTP Lecture Notes in Computer Science 5186 pp.252-262 (Collaboration)
|
22.
|
2007
|
Article
|
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme Proc. of IPDPS 2007, IEEE Computer Society. (Single)
|
23.
|
2007
|
Article
|
Load-Balancing SSL Cluster Using Session Migration Proc. of Advanced Information Networking and Applications 2007 (Collaboration)
|
24.
|
2006
|
Article
|
A Privacy-Enhanced Access Control Systems and Computers in Japan Vol.37(No.5),pp.77-86 (Collaboration)
|
25.
|
2006
|
Article
|
On Compromising Password-Based Authentication over HTTPS Proc. of the 20th International Conference on Advanced Information Networking and Applications, IEEE Computer Society. pp.869-874 (Collaboration)
|
26.
|
2005
|
Article
|
A Technical Comparison of IPSec and SSL 19th International Conference on Advanced Information Networking and Applications(AINA 2005), IEEE Computer Society. pp.395-398 (Collaboration)
|
27.
|
2005
|
Article
|
Anti-SPAM System: Another Way of Preventing SPAM Proc. of DEXA Workshop 2005, IEEE Computer Society. pp.395-398 (Single)
|
28.
|
2004/03
|
Article
|
A Secure Wireless LAN System Retaining Privacy Proc. of 18th International Conference on Advanced Information Networking, IEEE Computer Society. (ISBN 0-7695-2051-0),pp.370-375 (Collaboration)
|
29.
|
2004/01
|
Article
|
A Technical Comparison of IPSec and SSL(研究報告)
|
30.
|
2003/02
|
Article
|
Verification of Authentication Protocols Based on the Binding Relation Software Security--Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Revised Papers, Lecture Notes in Computer Science, Springer Vol.2609,pp.299-316 (Collaboration)
|
31.
|
2002/11
|
Article
|
The Secure DHCP System with User Authentication Proc. of 27th Conference on Local Computer Networks, IEEE Computer Society. (ISBN 0-7695-1591-6),pp.123-131 (Single)
|
32.
|
2002/09
|
Article
|
Architectural Defects of the Secure Shell Proc. of 13th International Workshop on Data and Expert Systems Applications, IEEE Computer Society (ISBN 0-7695-1688-8),pp.22-28 (Collaboration)
|
33.
|
2002
|
Article
|
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server Proc. of the 17th International Conference on Advanced Information Networking and Applications, IEEE Computer Society. pp.696-703 (Single)
|
34.
|
2001/04
|
Article
|
An Access Control with Handling Private Information Proc. of 15th International Parallel & Distributed Processing Symposium 2001, IEEE Computer Society (ISBN 0-7695-0990-8),pp.23-27 (Collaboration)
|
35.
|
2000/08
|
Article
|
Attack on Authentication Protocols with Compromised Certificates and How to Fix Them IPSJ Journal Vol.41(No.8),pp.2110-2120 (Collaboration)
|
36.
|
2000/07
|
Article
|
Privacy Enhanced Access Control by SPKI Proc. of the 7th International Conference on Parallel and Distributed Systems: International Workshop on Next-Generation Internet Technologies and Applications 2000(NGITAOO), IEEE Computer Society. (ISBN 0-7695-0571-6),pp.301-306 (Collaboration)
|
37.
|
2000/06
|
Article
|
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server Proc. of the IEEE 9th Intl. Workshops on Enabling Techonologies: Infrastructure for Collaborative Enterprise(WETICE2000), Enterprise Security Workshop, IEEE Computer Society. (ISBN 0-7695-0798-0),pp.201-206 (Collaboration)
|
38.
|
2000/01
|
Article
|
Access Control by SPKI Certificate Proc. of the Joint Workshop on Information Security and Cryptology 2000 pp.143-150 (Single)
|
39.
|
2000/01
|
Article
|
Security of Public-Key Based Authentication Protocol Lecture Notes in Computer Science 1751 (2000),Springer-Verlag. (ISBN 3-540-66967-1),pp.196-209 (Collaboration)
|
40.
|
1999/10
|
Article
|
A Deduction Engine for Security Logic Proc. of the International Synposium on Future Software Technology ISFST-99, Software Engineers Association. (ISBN 4-916227-07-7),pp.18-23 (Collaboration)
|
41.
|
1999/10
|
Article
|
A Verification Tool of Authentication Protocols(研究報告)
|
42.
|
1999/06
|
Article
|
Incremental Analysis and Verification of Authentication Protocols Proc. of the IEEE 8th Intl. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterorise(WETICE'99), Enterprise Security Workshop, IEEE Computer Society. (ISBN-0-7695-0365-9),pp.192-193 (Collaboration)
|
Display 5 items
|
Display all(42)
|