Personal profile

e-rad ID

40183107

Research Interests

Information and Physical Security

Researchmap ID

5000006847

URL

http://er-web.jmk.ynu.ac.jp/html/MATSUMOTO_Tsutomu/en.html

External positions

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Cryptography Engineering & Materials Science
Communication Engineering & Materials Science
Internet Engineering & Materials Science
Malware Engineering & Materials Science
Authentication Engineering & Materials Science
Security of data Engineering & Materials Science
Experiments Engineering & Materials Science
Electronic document identification systems Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1982 2016

  • 823 Citations
  • 10 h-Index
  • 68 Article
  • 46 Conference contribution

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citations

ASIC implementation of random number generators using SR latches and its evaluation

Torii, N., Kokubo, H., Yamamoto, D., Itoh, K., Takenaka, M. & Matsumoto, T. 2016 Dec 1 In : Eurasip Journal on Information Security. 2016, 1, 10

Research output: Contribution to journalArticle

Application specific integrated circuits
Entropy
Statistical tests
Field programmable gate arrays (FPGA)
Electric power utilization
1 Citations

Attribute based encryption with direct efficiency tradeoff

Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T. & Yamada, S. 2016 Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Springer Verlag, Vol. 9696, p. 249-266 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computer hardware

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments
1 Citations

Eigenanalysis of morphological diversity in silicon random nanostructures formed via resist collapse

Naruse, M., Hoga, M., Ohyagi, Y., Nishio, S., Tate, N., Yoshida, N. & Matsumoto, T. 2016 Nov 15 In : Physica A: Statistical Mechanics and its Applications. 462, p. 883-888 6 p.

Research output: Contribution to journalArticle

Nanostructures
Silicon
Security of data