default search action
Yuji Suga
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Yuji Suga:
POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale. ACNS Workshops 2023: 716-721 - [c30]Yuji Suga:
A classification for commutative three-element semigroups with local XOR structure and its implementability of card-based protocols. ICCE-Taiwan 2023: 543-544 - 2022
- [c29]Dan Yamamoto, Yuji Suga, Kazue Sako:
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure. EuroS&P Workshops 2022: 52-65 - [c28]Yuji Suga:
How to implement non-committed card protocols to realize AND operations satisfying the three-valued logics. CANDARW 2022: 370-374 - [c27]Yuji Suga:
A classification proof for commutative three-element semigroups with local AND structure and its application to card-based protocols. ICCE-TW 2022: 171-172 - [c26]Yuji Suga:
ICH 3-party model for claims distribution on the blockchain and their application to the e-KYC-e model. LifeTech 2022: 512-513 - [e2]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - 2020
- [j1]Yuji Suga:
Editor's Message to Special Issue of Real World Cryptography, Security and Privacy. J. Inf. Process. 28: 462-463 (2020) - [c25]Yuji Suga, Masaki Shimaoka, Masashi Sato, Hirotaka Nakajima:
Securing Cryptocurrency Exchange: Building up Standard from Huge Failures. Financial Cryptography Workshops 2020: 254-270 - [c24]Yuji Suga:
Simple authentication methods with pseudo IDs and derivative passwords. ICCE-TW 2020: 1-2
2010 – 2019
- 2019
- [c23]Yuji Suga:
Formulation of Information Hiding Model for One-Time Authentication Methods Using the Merkle Tree. EIDWT 2019: 363-373 - 2018
- [c22]Yuji Suga:
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues. CANDAR Workshops 2018: 483-485 - [c21]Yuji Suga:
An algebraic interpretation of the XOR-based Secret Sharing Schemes. ISITA 2018: 228-231 - 2017
- [c20]Yuji Suga:
Browser's "search form" issues and countermeasures. APNOMS 2017: 358-361 - [c19]Yuji Suga:
Sausage-Style One-Time Authentication Schemes. BWCCA 2017: 658-667 - [c18]Yuji Suga:
An Extension of \((2, m(m+1)/2)\)-Threshold Secret Sharing Schemes. NBiS 2017: 935-945 - 2016
- [c17]Yuji Suga:
Generalized Graph-Based Visual Secret Sharing Schemes for Multiple Secrets. IMIS 2016: 614-619 - [c16]Shinichi Goto, Keiichi Iwamura, Yuji Suga, Kitahiro Kaneda:
Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks. WINSYS 2016: 172-180 - 2015
- [c15]Yuji Suga:
Consideration of the XOR-operation Based Secure Multiparty Computation. IMIS 2015: 506-510 - [e1]Keisuke Tanaka, Yuji Suga:
Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings. Lecture Notes in Computer Science 9241, Springer 2015, ISBN 978-3-319-22424-4 [contents] - 2014
- [c14]Yuji Suga:
Visualization of SSL Setting Status Such as the FQDN Mismatch. IMIS 2014: 588-593 - [c13]Yuji Suga:
Classification of Generalized Graph-type (2, n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple Secrets. ICS 2014: 746-755 - [c12]Yuji Suga:
SSL/TLS Servers Status Survey about Enabling Forward Secrecy. NBiS 2014: 501-505 - 2013
- [c11]Yuji Suga:
New Constructions of (2, n)-Threshold Secret Sharing Schemes Using Exclusive-OR Operations. IMIS 2013: 837-842 - [c10]Yuji Suga:
A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors. NBiS 2013: 539-544 - 2012
- [c9]Yuji Suga:
Interactive Fingerprint. AINA Workshops 2012: 1023-1026 - [c8]Yuji Suga:
SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem. AsiaJCIS 2012: 17-24 - [c7]Yuji Suga:
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability. IMIS 2012: 656-659 - [c6]Yuji Suga:
Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes. NBiS 2012: 794-798 - 2011
- [c5]Yuji Suga:
Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access Structure. IMIS 2011: 634-638 - [c4]Yuji Suga:
A Fair Exchange Protocol for Attribute Certification. INCoS 2011: 457-461 - 2010
- [c3]Yuji Suga:
Encryption Methods for Restricted Data Limited in Value Range. ICCSA (4) 2010: 284-295 - [c2]Yuji Suga:
A Low-Cost Key Derivation Scheme for Hierarchy-Based Access. NBiS 2010: 564-568
2000 – 2009
- 2005
- [c1]Yuji Suga:
New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images. SEC 2005: 525-536
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint