If you made any changes in Pure these will be visible here soon.

Research Output 1982 2016

  • 823 Citations
  • 10 h-Index
  • 68 Article
  • 46 Conference contribution
Filter
Conference contribution
2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citations

Attribute based encryption with direct efficiency tradeoff

Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T. & Yamada, S. 2016 Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Springer Verlag, Vol. 9696, p. 249-266 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computer hardware

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers
2014

Discriminative and distributed measurement of temperature and strain with time-division pump-probe-read light generation by single laser diode in simplified BOCDA system

Matsumoto, T., Kishi, M. & Hotate, K. 2014 Jan 1 Proceedings of SPIE - The International Society for Optical Engineering. SPIE, Vol. 9157, 91573W

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pumps
Temperature
Semiconductor lasers
Polarization-maintaining fiber
Polarization
2013

Search engine based investigation on misconfiguration of zone transfer

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2013 Jan 1 Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 56-62 7 p. 6621652

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Search engines
2012

A method of preventing unauthorized data transmission in controller area network

Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K. & Oishi, K. 2012 Aug 20 IEEE Vehicular Technology Conference. 6240294

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data communication systems
Controllers
1 Citations

An efficient dynamic detection method for various x86 shellcodes

Fujii, T., Yoshioka, K., Shikata, J. & Matsumoto, T. 2012 Nov 1 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 284-289 6 p. 6305299

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Testing
Linux
6 Citations

Malware detection method by catching their random behavior in multiple executions

Kasama, T., Yoshioka, K., Inoue, D. & Matsumoto, T. 2012 Nov 1 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 262-266 5 p. 6305295

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Application programming interfaces (API)
Dynamic analysis
Servers
Experiments
2011

An efficient verifiable implicit asking protocol for Diffie-Hellman key exchange

Oishi, K. & Matsumoto, T. 2011 May 17 Proceedings - 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, LightSec 2011. p. 10-19 10 p. 5749573

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography

Integrity enhancement of real-time systems by information-theoretic cryptography

Katayama, S., Sekiguchi, K., Fukushima, K. & Matsumoto, T. 2011 Nov 21 Proceedings of the SICE Annual Conference. p. 1541-1546 6 p. 6060209

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Real time systems
Cryptography
Security of data
Communication
2 Citations

Self destructive tamper response for software protection

Oishi, K. & Matsumoto, T. 2011 May 20 Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 490-496 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Static analysis
Costs
2010
3 Citations

An artifact-metrics which utilizes laser speckle patterns for plastic ID card surface

Yamakoshi, M., Rong, X. & Matsumoto, T. 2010 May 7 Proceedings of SPIE - The International Society for Optical Engineering. Vol. 7618, 76180B

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Speckle
Cameras
Lasers
Metric system
Laser beams
3 Citations

Information-theoretically secure key-insulated multireceiver authentication codes

Seito, T., Aikawa, T., Shikata, J. & Matsumoto, T. 2010 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6055 LNCS, p. 148-165 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data

Information-theoretic approach to authentication codes for power system communications

Matsumoto, T., Kobayashi, T., Katayama, S., Fukushima, K. & Sekiguchi, K. 2010 Jul 26 2010 IEEE PES Transmission and Distribution Conference and Exposition: Smart Solutions for a Changing World. 5484416

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Authentication
Smart power grids
Advanced metering infrastructures
Electric load management
2 Citations

Vulnerability in public malware sandbox analysis systems

Yoshioka, K., Hosobuchi, Y., Orii, T. & Matsumoto, T. 2010 Nov 29 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 265-268 4 p. 5598065

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Internet
Computer systems
Testing
2009
1 Citations

Complementary logics vs masked logics: Which countermeasure is a better selection?

Matsumoto, T., Mimura, H. & Suzuki, D. 2009 Dec 10 ECCTD 2009 - European Conference on Circuit Theory and Design Conference Program. p. 399-402 4 p. 5274989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application specific integrated circuits
Field programmable gate arrays (FPGA)
Side channel attack

Evaluation of equal error rate in document authentication system using magnetic fiber

Ikeda, T., Hiroe, S., Yamada, T., Matsumoto, T. & Takemura, Y. 2009 Dec 29 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009. 5276959

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Metric system
Fibers
Biometrics
Security systems

Power system communications and information-theoretic cryptography

Matsumoto, T., Kobayashi, T., Katayama, S., Fukushima, K. & Sekiguchi, K. 2009 Dec 16 Transmission and Distribution Conference and Exposition: Asia and Pacific, T and D Asia 2009. 5357018

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Authentication
Cryptography
Control systems
Data acquisition

Protection relay systems employing unconditionally secure authentication codes

Matsumoto, T., Kobayashi, T., Katayama, S., Fukushima, K. & Sekiguchi, K. 2009 Dec 1 2009 IEEE Bucharest PowerTech: Innovative Ideas Toward the Electrical Grid of the Future. 5281906

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Relay protection
Communication
1 Citations

Unconditionally secure blind authentication codes: The model, constructions, and links to commitment

Hara, Y., Ishiwata, T., Shikata, J. & Matsumoto, T. 2009 Jul 16 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5458 LNCS, p. 116-137 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5458 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data
Cryptography
Polynomials
2 Citations

Unconditionally secure blind signatures

Hara, Y., Seito, T., Shikata, J. & Matsumoto, T. 2009 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4883 LNCS, p. 23-43 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4883 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Fingerprinting traffic log

Yoshioka, K. & Matsumoto, T. 2008 Oct 22 Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 143-146 4 p. 4604026

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Sensors
Computer worms
Computer viruses
Internet
5 Citations

Individuality evaluation for paper based artifact-metrics using transmitted light image

Yamakoshi, M., Tanaka, J., Furuie, M., Hirabayashi, M. & Matsumoto, T. 2008 May 7 Proceedings of SPIE - The International Society for Optical Engineering. Vol. 6819, 68190H

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metric system
Ferromagnetic resonance
Image resolution
Fibers

Prototyping security test objects for use with advanced biometric authentication systems

Matsumoto, T. 2008 Dec 1 Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
2007

Security evaluation of a type of table-network implementation of block ciphers

Matsunaga, A. & Matsumoto, T. 2007 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4435 LNCS, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4435 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Access control
Embedded systems

Windows vault: Prevention of virus infection and secret leakage with secure OS and virtual machine

Sameshima, Y., Saisho, H., Matsumoto, T. & Komoda, N. 2007 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4867 LNCS, p. 128-141 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4867 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Computer viruses
Computer workstations
2006
1 Citations

Information hiding on lossless data compression

Yoshioka, K., Sonoda, K., Takizawa, O. & Matsumoto, T. 2006 Dec 1 Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006. p. 15-18 4 p. 4041656

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data compression
2005
2 Citations

Authenticated encryption and steganography in unconditional security setting

Matsumoto, T. & Shikata, J. 2005 Dec 1 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. Vol. 2005, p. 1-6 6 p. 1543946

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Steganography

How to construct secure cryptographic location-based services

Anzai, J. & Matsumoto, T. 2005 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3823 LNCS, p. 894-904 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
Ubiquitous computing
Cryptography
5 Citations

Method of hiding information in agglutinative language documents using adjustment to new line positions

Takizawa, O., Makino, K., Matsumoto, T., Nakagawa, H. & Murase, I. 2005 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3683 LNAI, p. 1039-1048 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3683 LNAI)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Redundancy
Steganography
Digital watermarking
Information technology
Printing
2002
3 Citations

A scheme of Standard MIDI Files steganography and its evaluation

Inoue, D. & Matsumoto, T. 2002 Proceedings of SPIE - The International Society for Optical Engineering. Delp III, E. J. & Wong, P. W. (eds.). Vol. 4675, p. 194-205 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Musical instruments
Personal computers
Redundancy
Internet
6 Citations

Gummy and conductive silicone rubber fingers importance of vulnerability analysis

Matsumoto, T. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2501, p. 574-575 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Silicones
Rubber
319 Citations

Impact of artificial "gummy" fingers on fingerprint systems

Matsumoto, T., Matsumoto, H., Yamada, K. & Hoshino, S. 2002 Proceedings of SPIE - The International Society for Optical Engineering. Renesse, R. L. (ed.). Vol. 4677, p. 275-289 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Molds
Authentication
Capacitive sensors
Smart cards
Optical sensors
9 Citations

Security of camellia against truncated differential cryptanalysis

Kanda, M. & Matsumoto, T. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2355, p. 286-299 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
2000

A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tamura, T., Sakurai, K. & Matsumoto, T. 2000 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1787, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardware
Cryptography
Clocks
Computer hardware
1 Citations

CPLgram: an advanced machine readable OVD that is obtained by combining diffraction gratings and liquid crystals

Takeuchi, I., Yamamotoya, K., Sugahara, T., Hoshino, H., Matsumoto, H. & Matsumoto, T. 2000 Proceedings of SPIE - The International Society for Optical Engineering. Society of Photo-Optical Instrumentation Engineers, Vol. 3973, p. 238-246 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cholesteric liquid crystals
Circular polarization
Diffraction gratings
Diffraction
Wavelength
2 Citations

Evaluating security of a clone preventive technique using physical randomness and cryptography

Matsumoto, H. & Matsumoto, T. 2000 Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3973, p. 139-152 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Cryptography
Fibers
Copying
Substrates
3 Citations

Light Weight broadcast exclusion Using secret Sharing

Matsuzaki, N., Anzai, J. & Matsumoto, T. 2000 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841, p. 313-327 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Smart cards
1999
20 Citations

A quick group key distribution scheme with ‘entity revocation’

Anzai, J., Matsuzaki, N. & Matsumoto, T. 1999 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1716, p. 1-15 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1716)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Telecommunication
Managers
Internet
Communication
25 Citations

A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis

Kanda, M., Takashima, Y., Matsumoto, T., Aoki, K. & Ohta, K. 1999 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1556, p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1556)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear transformations
1998
1 Citations

A clone preventive technique which features magnetic micro-fibers and cryptography

Matsumoto, H., Suzuki, K. & Matsumoto, T. 1998 Proceedings of SPIE - The International Society for Optical Engineering. Renesse, R. L. (ed.). Vol. 3314, p. 275-286 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Fibers
Authentication
Electronic document identification systems
Biometrics

Getting users’ attributes without violating anonymity

Matsumoto, T. 1998 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1368, p. 440-443 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1368)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Websites
History
1996
33 Citations

Human-computer cryptography: an attempt

Matsumoto, T. 1996 Jan 1 Proceedings of the ACM Conference on Computer and Communications Security. New York, NY, United States: ACM, p. 68-75 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardware
Computer terminals
Cryptography
Brain
1995
4 Citations

Incidence structures for key sharing

Matsumoto, T. 1995 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 917, p. 342-353 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 917)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Microelectronics
1988

Key predistribution system and linear schemes on modules over rings

Matsumoto, T. & Imai, H. 1988 Dec 1 Unknown Host Publication Title. New York, NY, USA: Publ by IEEE, Vol. 25 n 13

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Smart cards
Security of data