default search action
Kanta Matsuura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(4): 619-633 (2024) - [j31]Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On private information retrieval supporting range queries. Int. J. Inf. Sec. 23(1): 629-647 (2024) - [c67]Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda, Kanta Matsuura:
On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives. ACISP (1) 2024: 303-323 - [c66]Iifan Tyou, Shigenori Ohashi, Justin Yu, Takayuki Miura, Takuro Hosoi, Kanta Matsuura:
Leveraging Timestamps to Create Secure and Feeless Evidence Management. Blockchain 2024: 131-139 - [c65]Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda, Kanta Matsuura:
Updatable Encryption Secure Against Randomness Compromise. CANS (2) 2024: 47-69 - [c64]Taichi Igarashi, Kanta Matsuura:
Scam Token Detection Based on Static Analysis Before Contract Deployment. FC Workshops 2024: 189-206 - 2023
- [j30]Kyosuke Yamashita, Ryu Ishii, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(9): 1177-1188 (2023) - [c63]Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Signature for Objects: Formalizing How to Authenticate Physical Data and More. FC (1) 2023: 182-199 - [c62]Taichi Igarashi, Hiroya Kato, Iwao Sasase, Kanta Matsuura:
A Realtime IoT Malware Classification System Based on Pending Samples. ICC 2023: 4373-4378 - [i11]Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials. IACR Cryptol. ePrint Arch. 2023: 1167 (2023) - [i10]Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. IACR Cryptol. ePrint Arch. 2023: 1168 (2023) - [i9]Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura:
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA. IACR Cryptol. ePrint Arch. 2023: 1169 (2023) - 2022
- [j29]Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures. IEICE Trans. Inf. Syst. 105-D(11): 1845-1856 (2022) - [j28]Takeshi Miyamae, Kanta Matsuura:
Coin Transfer Unlinkability Under the Counterparty Adversary Model. Ledger 7 (2022) - [c61]Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura:
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA. ACNS 2022: 605-625 - [c60]Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality. ADIoT 2022: 51-71 - [c59]Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura:
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks. RAID 2022: 380-394 - 2021
- [j27]Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura:
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers. DTRAP 2(1): 5:1-5:31 (2021) - [j26]Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 89-103 (2021) - [c58]Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures. ACNS Workshops 2021: 378-396 - [c57]Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures. IWSEC 2021: 77-96 - 2020
- [j25]Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 107-113 (2020) - [j24]Yuya Senzaki, Satsuya Ohata, Kanta Matsuura:
Simple Black-Box Adversarial Examples Generation with Very Few Queries. IEICE Trans. Inf. Syst. 103-D(2): 212-221 (2020) - [j23]Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura:
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets. IEICE Trans. Inf. Syst. 103-D(7): 1476-1492 (2020) - [c56]Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On Private Information Retrieval Supporting Range Queries. ESORICS (2) 2020: 674-694 - [c55]Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura:
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials. INDOCRYPT 2020: 763-785 - [i8]Takeshi Miyamae, Kanta Matsuura:
Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies. CoRR abs/2012.10563 (2020)
2010 – 2019
- 2019
- [j22]Kanta Matsuura:
Token Model and Interpretation Function for Blockchain-Based FinTech Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 3-10 (2019) - [j21]Kensuke Tamura, Kanta Matsuura:
Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 65-73 (2019) - [c54]Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura:
My script engines know what you did in the dark: converting engines into script API tracers. ACSAC 2019: 466-477 - [c53]Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions. IWSEC 2019: 253-272 - 2018
- [j20]Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
More Constructions of Re-Splittable Threshold Public Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1473-1483 (2018) - [c52]Masahito Ishizaka, Kanta Matsuura:
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption. CANS 2018: 417-439 - [c51]Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption. ISITA 2018: 707-711 - [c50]Masahito Ishizaka, Kanta Matsuura:
Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions. ISC 2018: 422-441 - [c49]Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura:
Provably Secure Password Reset Protocol: Model, Definition, and Construction. TrustCom/BigDataSE 2018: 774-782 - [i7]Masahito Ishizaka, Kanta Matsuura:
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 1044 (2018) - 2016
- [j19]Satsuya Ohata, Kanta Matsuura:
Proxy re-encryption via indistinguishability obfuscation. Secur. Commun. Networks 9(12): 1786-1795 (2016) - [c48]Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. EuroS&P 2016: 357-371 - [i6]Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura:
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction. IACR Cryptol. ePrint Arch. 2016: 345 (2016) - 2015
- [j18]Fei Feng, Kanta Matsuura:
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models. J. Inf. Process. 23(5): 646-654 (2015) - [c47]Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. CT-RSA 2015: 410-428 - [c46]Aleksandar Kavcic, Miodrag J. Mihaljevic, Kanta Matsuura:
Light-weight secrecy system using channels with insertion errors: Cryptographic implications. ITW Fall 2015: 257-261 - [i5]Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2015: 112 (2015) - 2014
- [j17]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification. IEICE Trans. Inf. Syst. 97-D(3): 510-523 (2014) - [j16]David S. L. Wei, Siani Pearson, Kanta Matsuura, Patrick P. C. Lee, Kshirasagar Naik:
Guest Editorial: Cloud Security. IEEE Trans. Cloud Comput. 2(4): 377-379 (2014) - [j15]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics. IEEE Trans. Inf. Forensics Secur. 9(2): 259-271 (2014) - [c45]Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa:
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. CANS 2014: 290-304 - [c44]Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
More Constructions of Re-splittable Threshold Public Key Encryption. IWSEC 2014: 109-118 - 2013
- [j14]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 56(3): 1-9 (2013) - [c43]Naveen Kumar, Anish Mathuria, Manik Lal Das, Kanta Matsuura:
Improving security and efficiency of time-bound access to outsourced data. COMPUTE 2013: 9:1-9:8 - [p3]Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura:
Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks. The Economics of Information Security and Privacy 2013: 115-134 - 2012
- [j13]Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu:
Construction of highly nonlinear resilient S-boxes with given degree. Des. Codes Cryptogr. 64(3): 241-253 (2012) - [c42]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Towards optimal countermeasures against wolves and lambs in biometrics. BTAS 2012: 69-76 - [c41]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms. Public Key Cryptography 2012: 576-594 - [c40]Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura:
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks. WEIS 2012 - 2011
- [j12]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity. Appl. Math. Lett. 24(12): 2093-2096 (2011) - [j11]Jacob C. N. Schuldt, Kanta Matsuura:
Efficient Convertible Undeniable Signatures with Delegatable Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 71-83 (2011) - [j10]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 265-267 (2011) - [j9]Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura:
Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures. Inf. Media Technol. 6(3): 970-979 (2011) - [j8]Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura:
Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures. J. Inf. Process. 19: 253-262 (2011) - [c39]Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura:
Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. ACNS 2011: 220-237 - [c38]Takahiro Matsuda, Kanta Matsuura:
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. Public Key Cryptography 2011: 246-264 - [c37]Jacob C. N. Schuldt, Kanta Matsuura:
On-line Non-transferable Signatures Revisited. Public Key Cryptography 2011: 369-386 - [c36]Takahiro Matsuda, Kanta Matsuura:
On Black-Box Separations among Injective One-Way Functions. TCC 2011: 597-614 - 2010
- [j7]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Enumeration of balanced symmetric functions over GF(p). Inf. Process. Lett. 110(14-15): 544-548 (2010) - [c35]Jacob C. N. Schuldt, Kanta Matsuura:
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. ISPEC 2010: 276-293 - [c34]Takahiro Matsuda, Yasumasa Nakai, Kanta Matsuura:
Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability. Pairing 2010: 225-245 - [c33]Hosoi Takurou, Kanta Matsuura:
Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009. RAID 2010: 496-497
2000 – 2009
- 2009
- [c32]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. CANS 2009: 402-412 - [c31]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31 - [c30]Yi Shi, Kanta Matsuura:
Fingerprinting Attack on the Tor Anonymity System. ICICS 2009: 425-438 - [c29]Takahiro Matsuda, Kanta Matsuura, Jacob C. N. Schuldt:
Efficient Constructions of Signcryption Schemes and Signcryption Composability. INDOCRYPT 2009: 321-342 - [c28]Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. ISC 2009: 338-346 - [c27]Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, Kanta Matsuura:
A Generic Construction of Timed-Release Encryption with Pre-open Capability. IWSEC 2009: 53-70 - [p2]Kanta Matsuura:
Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model. Managing Information Risk and the Economics of Security 2009: 99-119 - [i4]Jacob C. N. Schuldt, Kanta Matsuura:
On-line Non-transferable Signatures Revisited. IACR Cryptol. ePrint Arch. 2009: 406 (2009) - [i3]Jacob C. N. Schuldt, Kanta Matsuura:
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. IACR Cryptol. ePrint Arch. 2009: 454 (2009) - 2008
- [j6]Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way. IEICE Trans. Inf. Syst. 91-D(5): 1457-1465 (2008) - [j5]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Trans. Inf. Syst. 91-D(5): 1466-1476 (2008) - [j4]Wei Liu, Hideyuki Tanaka, Kanta Matsuura:
Empirical-Analysis Methodology for Information-Security Investment and Its Application to Reliable Survey of Japanese Firms. Inf. Media Technol. 3(2): 464-478 (2008) - [c26]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19 - [c25]Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson:
Proxy Signatures Secure Against Proxy Key Exposure. Public Key Cryptography 2008: 141-161 - [c24]Kanta Matsuura:
Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model. WEIS 2008 - [e1]Kanta Matsuura, Eiichiro Fujisaki:
Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings. Lecture Notes in Computer Science 5312, Springer 2008, ISBN 978-3-540-89597-8 [contents] - 2007
- [j3]Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1814-1829 (2007) - [c23]Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use. ICITS 2007: 133-145 - [c22]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Practical Provider Authentication System for Bidirectional Broadcast Service. KES (3) 2007: 967-974 - [c21]Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991 - [c20]Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. PerCom Workshops 2007: 223-228 - [c19]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84 - [p1]Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki:
Location Privacy in Wireless LAN. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 299-322 - 2006
- [j2]Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai:
Relations among Notions of Security for Identity Based Encryption Schemes. Inf. Media Technol. 1(2): 929-941 (2006) - [c18]Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - [c17]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [c16]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. INDOCRYPT 2006: 48-62 - [c15]Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 - [c14]Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki:
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. SPC 2006: 165-180 - [c13]Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. VIETCRYPT 2006: 366-384 - [c12]Wei Liu, Hideyuki Tanaka, Kanta Matsuura:
An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan. WEIS 2006 - [i2]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. IACR Cryptol. ePrint Arch. 2006: 197 (2006) - 2005
- [c11]Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura:
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. CISC 2005: 395-406 - [c10]Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki:
Towards Modeling Wireless Location Privacy. Privacy Enhancing Technologies 2005: 59-77 - [c9]Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki:
Enhancing wireless location privacy using silent period. WCNC 2005: 1187-1192 - [i1]Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 258 (2005) - 2004
- [c8]Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo:
An Analysis of Detailed Electronic Time-Stamping Using Digital TV. EEE 2004: 277-284 - [c7]Kanta Matsuura:
Robustness of Entrusted Data-Analysis in e-Science Research Collaboration. EEE 2004: 373-378 - [c6]Jose Luis Lacson, Kanta Matsuura:
The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas. EGOV 2004: 547-548 - 2003
- [c5]Manabu Ando, Kanta Matsuura, Michiharu Kudo, Akira Baba:
An Architecture of a Secure Database for Networked Collaborative Activities. ICEIS (1) 2003: 3-10 - 2002
- [c4]Kanta Matsuura, Hideki Imai:
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal. ICEIS 2002: 962-967 - 2001
- [c3]Kanta Matsuura:
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce. ICICS 2001: 90-94
1990 – 1999
- 1999
- [c2]Shoichi Hirose, Kanta Matsuura:
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. ICICS 1999: 169-182 - 1998
- [c1]Kanta Matsuura, Yuliang Zheng, Hideki Imai:
Compact and Flexible Resolution of CBT Multicast Key-Distribution. WWCA 1998: 190-205 - 1995
- [j1]Kanta Matsuura, Yoichi Okabe:
Selective minimum-norm solution of the biomagnetic inverse problem. IEEE Trans. Biomed. Eng. 42(6): 608-615 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint