Research Output 2002 2016

Filter
Conference contribution
2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citations

Attribute based encryption with direct efficiency tradeoff

Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T. & Yamada, S. 2016 Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Springer Verlag, Vol. 9696, p. 249-266 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computer hardware

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Identity-based hierarchical key-insulated encryption without random oracles

Watanabe, Y. & Shikata, J. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9614, p. 255-279 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers

Sequential aggregate authentication codes with information theoretic security

Tomita, S., Watanabe, Y. & Shikata, J. 2016 Apr 26 2016 50th Annual Conference on Information Systems and Sciences, CISS 2016. Institute of Electrical and Electronics Engineers Inc., p. 192-197 6 p. 7460500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data
Gateways (computer networks)

Unconditionally secure revocable storage: Tight bounds, optimal construction, and robustness

Watanabe, Y., Hanaoka, G. & Shikata, J. 2016 Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Springer Verlag, Vol. 10015 LNCS, p. 213-237 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Access control
Concrete construction
Genes

Who gets the boot? Analyzing victimization by DDoS-as-a-service

Noroozian, A., Korczyński, M., Gañan, C. H., Makita, D., Yoshioka, K. & Vaneeten, M. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 368-389 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Industry
2015

A compiler of two-party protocols for composable and game-theoretic security, and its application to oblivious transfer

Goto, S. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9496, p. 133-151 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9496)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Game theory
1 Citations

AmpPot: Monitoring and defending against amplification DDos attacks

Krämer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K. & Rossow, C. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9404, p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9404)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Bandwidth
Linux
1 Citations

Constructions of CCA-secure revocable identity-based encryption

Ishida, Y., Watanabe, Y. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9144, p. 174-191 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Data encapsulation
Scalability

Constructions of symmetric-key encryption with guessing secrecy

Iwamoto, M. & Shikata, J. 2015 Sep 28 IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-June, p. 725-729 5 p. 7282550

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Probability distributions

Timed-release secret sharing schemes with information theoretic security

Watanabe, Y. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9024, p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9024)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Cryptography
Redundancy
2002
1 Citations

Cryptography with information theoretic security

Imai, H., Hanaoka, G., Shikata, J., Otsuka, A. & Nascimento, A. C. 2002 Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002. Institute of Electrical and Electronics Engineers Inc., p. 73 1 p. 1115419

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Cryptography
1 Citations

Traceability schemes for signed documents

Yonezawa, S., Hanaoka, G., Shikata, J. & Imai, H. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2433, p. 257-271 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Communication
Costs
10 Citations

Unconditionally secure anonymous encryption and group authentication

Hanaoka, G., Shikata, J., Hanaoka, Y. & Imai, H. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2501, p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Polynomials
7 Citations

Unconditionally secure key insulated cryptosystems: Models, bounds and constructions

Hanaoka, Y., Hanaoka, G., Shikata, J. & Imai, H. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513, p. 85-96 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Concrete construction
Computer systems