Book and thesis
Papers
Short Merkle one-time signatures The 12th International Workshop on Security (IWSEC) (Co-authored) 2017/08
Papers
A novel hash chain construction for simple and efficient authentication 14th IEEE Conference on Privacy, Security and Trust (PST) 2016,pp.539-542 (Co-authored) 2016/12
Papers
An efficient and adaptive IP traceback scheme IEEE International Workshop on Internet of Things Services (IoTS),pp.235-240 (Co-authored) 2014/11
Papers
A novel hybrid IP traceback scheme with packet counters The 5th International Conference on Internet and Distributed Computing Systems (IDCS 2012) 7646,pp.71-84 (Co-authored) 2012/11/21
Papers
Consideration for multi-threshold multi-secret sharing schemes International Symposium on Information Theory and Applications (ISITA 2012)},pp.265-269 (Co-authored) 2012/10/28
Papers
On Efficient Construction of One Time Signatures IPSJ SIG Technical Reports (Co-authored) 2012/02/29
Papers
Consideration for multi-threshold multi-secret sharing schemes Symposium on Cryptography and Information Security (SCIS2012) (Co-authored) 2012/01/30
Papers
Ideal secret sharing schemes with share selectability The 13th International Conference on Information and Communications Security (ICICS 2011),pp.143-157 (Co-authored) 2011/12/13
Papers
Efficient and low-cost RFID authentication schemes Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 2 (3),pp.4-25 (Co-authored) 2011/09
Papers
Evaluation of an IP Traceback Scheme with Counters IPSJ SIG Technical Reports (Co-authored) 2011/03/10
Papers
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks Technical Report of IEICE, ICSS2010-45 (2010-11) (Co-authored) 2010/11/05
Papers
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application Technical Report of IEICE, ICSS2010-44 (2010-11) (Sole-authored) 2010/11/05
Papers
On a Group Key Distribution Protocol for Wireless Sensor Networks Computer Security Symposium 2010 (CSS 2010) (Co-authored) 2010/10/19
Papers
Simple authentication schemes with hash chains and their application to sensor networks Computer Security Symposium 2010 (CSS 2010) (Sole-authored) 2010/10/12
Papers
Hidden credential retrieval without random oracles The 11th International Workshop on Information Security Applications (WISA 2010) 6513,pp.160-174 (Co-authored) 2010/08
Papers
Consideration of group key distribution protocol in Wireless Sensor Networks IPSJ SIG Technical Reports 2010-CSEC-48 (Co-authored) 2010/02/25
Papers
Proposal of a group key distribution protocol for wireless sensor networks Symposium on Cryptography and Information Security (SCIS2010) (Co-authored) 2010/01/21
Papers
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length International Journal of Applied Cryptography 2 (1),pp.46-59 (Co-authored) 2010/01
Papers
Consideration for a Flexible Key Agreement Protocol in Sensor Networks The 60th Joint Convention of Chugoku Section (Co-authored) 2009/10/17
Papers
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length The 5th Information Security Practice and Experience Conference (ISPEC 2009), Lecture Notes in Computer Science 5451,pp.13-23 (Co-authored) 2009/04
Papers
A secure RFID authentication protocol with low communication cost The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009),pp.559-564 (Co-authored) 2009/03
Papers
Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair International Symposium on Information Theory and its Applications (ISITA2008) (Co-authored) 2008/12
Papers
A proposal of a flexible key agreement protocol in sensor networks Computer Security Symposium 2008 (CSS 2008) (Co-authored) 2008/10/09
Papers
On an IP-traceback scheme with efficient space-time encoding Computer Security Symposium 2008 (CSS 2008) (Co-authored) 2008/10/09
Papers
An RFID authentication protocol suitable for batch-mode authentication Computer Security Symposium 2008 (CSS 2008),pp.277-282 (Co-authored) 2008/10
Papers
An efficient ip traceback scheme with variable packet sampling probabilities IPSJ SIG Technical Reports 2008-CSEC-40 (Co-authored) 2008/03/06
Papers
Consideration of quantum secret sharing between multiparty and multiparty Symposium on Cryptography and Information Security (SCIS2008) (Co-authored) 2008/01/23
Papers
Consideration for an IP traceback method with counters Computer Security Symposium 2007 (CSS 2007) (Co-authored) 2007/11/01
Papers
Mobile agent security with efficient oblivious transfer International Conference on Security and Cryptography (SECRYPT 2007),pp.299-304 (Co-authored) 2007/07
Papers
Consideration of quantum secret sharing between multiparty and multiparty IPSJ Journal,pp.2447-2464 (Co-authored) 2007/07
Papers
Consideration of quantum oblivious transfer Technical Report of IEICE, ISEC2007-10 (Co-authored) 2007/05/18
Papers
On quantum secret sharing between multiparty and multiparty without quantum memory Technical Report of IEICE, ISEC 2006-169 (Co-authored) 2007/03/09
Papers
Share selectable secret sharing scheme on inefficiency concentrated for particular user Technical Report of IEICE, ISEC 2006-169 (Co-authored) 2007/03/09
Papers
Proposal and evaluation of improved packet marking schemes resistant against DoS attacks IPSJ SIG Technical Reports 2007-CSEC-36 (Co-authored) 2007/03/01
Papers
Efficient communication on mobile agent security Symposium on Cryptography and Information Security (SCIS2007), (Co-authored) 2007/01/26
Papers
Consideration for a filtering method against DoS attacks Computer Security Symposium 2006 (CSS 2006) (Co-authored) 2006/10/26
Papers
An IP traceback scheme with variably probabilistic packet marking International Symposium on Information Theory and Applications (ISITA 2006) (Co-authored) 2006/10
Papers
An obfuscation technique with tampar-resistance against dynamic analysis IPSJ SIG Technical Reports 2006-CSEC-32 (Co-authored) 2006/03/16
Papers
Consideration for the quantum multi-secret sharing using MSP Technical Report of IEICE, ISEC 2005-119 (Co-authored) 2005/12/09
Papers
Effects of IP traceback schemes with variable marking probability Computer Security Symposium 2005 (CSS 2005) (Co-authored) 2005/10/27
Papers
Java obfuscation - approaches to construct tamper-resistant object-oriented programs IPSJ Journal 46 (8),pp.2107-2119 (Co-authored) 2005/08
Papers
Quantum coin flipping protocol using n-dimensional quantum states IPSJ Journal,pp.1903-1911 (Co-authored) 2005/08
Papers
n-state quantum coin flipping protocol International Conference on Information Technology (ITCC) 2,pp.776-777 (Co-authored) 2005/04
Papers
Consideration for mobile agent security IPSJ SIG Technical Reports 2005-CSEC-28 (Co-authored) 2005/03/22
Papers
Consideration for quantum secret sharing Technical Report of IEICE, ISEC 2004-127 (Co-authored) 2005/03/11
Papers
A new pushback mechanism resistant to DDoS attacks International Symposium on Information Theory and Applications (ISITA 2004) (Co-authored) 2004/10
Papers
On anonymity metrics for practical anonymous communication protocols IPSJ Journal 45 (8),pp.1887-1897 (Co-authored) 2004/08
Papers
Toward modeling of a pushback mechanism IPSJ Journal,pp.1948-1953 (Co-authored) 2004/08
Papers
A proposal of quantum coin tossing using n-states Technical Report of IEICE, ISEC 2004-10 (Co-authored) 2004/05/12
Papers
The dynamic-typed access matrix model and decidability of the safety problem IEICE Transactions on Fundamentals E87-A (1),pp.190-203 (Co-authored) 2004/01
Papers
Java obfuscation with a theoretical basis for building secure mobile agents Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS'03) 2828,pp.89-103 (Co-authored) 2003/10
Papers
A proposal of a signature system based on the knapsack problem Technical Report of IEICE, ISEC 2003-09 (Co-authored) 2003/09/19
Papers
Evaluation of anonymity of practical anonymous communication networks The Eighth Australasian Conference on Information Security and Privacy - ACISP 2003 2727,pp.13-26 (Co-authored) 2003/07
Papers
A digital contents building system based on the multi-signature scheme Proceedings of the Multimedia, Distributed, Cooperative and Mobile Symposium (DICOMO 2003),pp.169-172 (Co-authored) 2003/06
Papers
A consideration for the bias of quantum coin flipping - extension to 4 states protocol from 3 states Technical Report of IEICE, ISEC 2003-4 (Co-authored) 2003/05/14
Papers
A consideration for smaller bias of quantum coin flipping Symposium on Cryptography and Information Security (SCIS2003) (Co-authored) 2003/01/29
Papers
Software obfuscation on a theoretical basis and its implementation IEICE Transactions on Fundamentals E86-A (1),pp.176-186 (Co-authored) 2003/01
Papers
A secure and flexible digital contents building system International Symposium on Information Theory and Applications (ISITA 2002),pp.223-226 (Co-authored) 2002/10
Papers
Labeled certificate: Flexible trust management of public key infrastructures International Symposium on Information Theory and Applications (ISITA 2002),pp.215-218 (Co-authored) 2002/10
Papers
Software tamper resistance based on the difficulty of interprocedural analysis The Third International Workshop on Information Security Applications (WISA 2002),pp.437-452 (Co-authored) 2002/08
Papers
A study on flexible and efficient PKI Proceedings of the Multimedia, Distributed, Cooperative and Mobile Symposium (DICOMO 2002),pp.105-108 (Co-authored) 2002/07
Papers
Software obfuscation for object oriented languages Technical Report of IEICE, ISEC 2002-6 (Co-authored) 2002/05/15
Papers
An extension of collusion problem and its application to protocol analysis Technical Report of IEICE, IT 2001-87 (Co-authored) 2002/03/12
Papers
A new approach of software obfuscation based on the difficulty of interprocedural analysis Symposium on Cryptography and Information Security (SCIS2002) (Co-authored) 2002/01/30
Papers
Software tamper resistance and evaluation Technical Report of IEICE, OFS 2001-50 (Co-authored) 2001/11/19
Papers
A collusion model with shared/unshared keys and consideration on collusion relation Technical Report of IEICE, ISEC 2001-80 (Co-authored) 2001/11/08
Papers
An agent-based model of anonymous communication protocols Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE 2001),pp.177-182 (Co-authored) 2001/06
Papers
Modeling anonymous communication protocols with message relaying Symposium on Cryptography and Information Security (SCIS 2001) (Co-authored) 2001/01/23
Papers
On digital signature schemes for mobile agents Symposium on Cryptography and Information Security (SCIS 2001) (Co-authored) 2001/01/23
Papers
Safety analysis of the dynamic-typed access matrix model ESORICS 2000: 6th European Symposium on Research in Computer Security 1895,pp.106-121 (Sole-authored) 2000/10
Papers
The secure renewal of cryptosystems in the open network architecture IPSJ Journal,pp.2102-2109 (Co-authored) 2000/08
Papers
Anonymous communication with elementary cyclic routes. \newblock {\em }, Vol.~41, No.~8, pp.~2148--2160, August 2000. \newblock (In Japanese). IPSJ Journal,pp.2148-2160 (Co-authored) 2000/08
Papers
On decidability of safety problems and expressive power of dynamic-typed access matrix models Symposium on Cryptography and Information Security (SCIS 2000) (Sole-authored) 2000/01/28
Papers
Protecting anonymity and location privacy with cyclic routes Computer Security Symposium'99 (CSS'99) (Co-authored) 1999/10/22
Papers
An access control model based on dual labels Transactions of Information Processing Society of Japan,pp.1305-1314 (Co-authored) 1999/03
Papers
Flexible protection realized by proxies in distributed systems Transactions of Information Processing Society of Japan,pp.810-817 (Co-authored) 1998/03
Papers
A new authorization model and its mechanism using service paths in open distributed environments Systems Proceedings of IFIP TC6 WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems (DAIS '97),pp.251-264 (Co-authored) 1997/10
Papers
The Saga security system - a security architecture for open distributed systems Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems,pp.53-58 (Co-authored) 1997