Personal profile

e-rad ID

30345483

Researchmap ID

5000006077

Research Interests

(no English)

URL

http://er-web.jmk.ynu.ac.jp/html/SHIKATA_Junji/en.html

External positions

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Cryptography Engineering & Materials Science
Authentication Engineering & Materials Science
Security of data Engineering & Materials Science
Electronic document identification systems Engineering & Materials Science
Entropy Engineering & Materials Science
Concrete construction Engineering & Materials Science
Data encapsulation Engineering & Materials Science
Steganography Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2016

  • 227 Citations
  • 7 h-Index
  • 38 Conference contribution
  • 23 Article
  • 2 Chapter

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Identity-based hierarchical key-insulated encryption without random oracles

Watanabe, Y. & Shikata, J. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9614, p. 255-279 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography

Information-theoretically secure timed-release secret sharing schemes

Watanabe, Y. & Shikata, J. 2016 In : Journal of Information Processing. 24, 4, p. 680-689 10 p.

Research output: Contribution to journalArticle

Security of data
Cryptography
Redundancy

Sequential aggregate authentication codes with information theoretic security

Tomita, S., Watanabe, Y. & Shikata, J. 2016 Apr 26 2016 50th Annual Conference on Information Systems and Sciences, CISS 2016. Institute of Electrical and Electronics Engineers Inc., p. 192-197 6 p. 7460500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data
Gateways (computer networks)