Akira Kanaoka

Orcid: 0000-0002-3886-5128

According to our database1, Akira Kanaoka authored at least 41 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Securing Cross Reality: Unraveling the Risks of 3D Object Disguise on Head Mount Display.
Proceedings of the 13th International Conference on the Internet of Things, 2023

Analysis of Country and Regional User Password Characteristics in Dictionary Attacks.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

Survey of Services that Store Passwords in a Recoverable Manner.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2021
Risk Assessment of "Ostrich ZIP".
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
Editor's Message to Special Issue of Usable Security.
J. Inf. Process., 2020

Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
Int. J. Inf. Sec., 2020

Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.
J. Inf. Process., 2019

Helping Johnny to Search: Usable Encrypted Search on Webmail System.
J. Inf. Process., 2019

Chronological Analysis of Source Code Reuse Impact on Android Application Security.
J. Inf. Process., 2019

Password Strength Measurement without Password Disclosure.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Helping Johnny to Search: Encrypted Search on Webmail System.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Time Series Analysis of Copy-and-Paste Impact on Android Application Security.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
J. Inf. Secur. Appl., 2017

Efficient Secure Arithmetic on Floating Point Numbers.
Proceedings of the Advances in Network-Based Information Systems, 2017

Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016

2015
METRO: Measurement of End-to-End Route Trust.
J. Inf. Process., 2015

A KEM/DEM-Based Construction for Secure and Anonymous Communication.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Transparent Probabilistic Packet Marking.
J. Inf. Process., 2014

A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014

Data Model for Android Package Information and Its Application to Risk Analysis System.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Detection of Unexpected Services and Communication Paths in Networked Systems.
J. Inf. Process., 2013

Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Toward Practical Searchable Symmetric Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

A Device for Transparent Probabilistic Packet Marking.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Tracing Advanced Persistent Threats in Networked Systems.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Discovery of Unexpected Services and Communication Paths in Networked Systems.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

2011
32-bit as Number Based IP Traceback.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010

Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2003
Multivariate Statistical Analysis of Network Traffic for Intrusion Detection.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003


  Loading...