Jun Kurihara

Orcid: 0000-0002-4923-8824

According to our database1, Jun Kurihara authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Extension of Resource Authorization Method with SSI in Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
μODNS: A distributed approach to DNS anonymization with collusion resistance.
Comput. Networks, December, 2023

Application of Generalized Deduplication Techniques in Edge Computing Environments.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Resource Authorization Methods for Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Mutualized oblivious DNS (μODNS): Hiding a tree in the wild forest.
CoRR, 2021

2019
Two-Level Named Packet Forwarding for Enhancing the Performance of Virtualized ICN Router.
IEICE Trans. Commun., 2019

2018
In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

2017
IPRES: in-device proxy re-encryption service for secure ICN.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
List Interest: Simply Packing Interests Dramatically Reduces Router Workload in Content-Centric Networking.
IEICE Trans. Commun., 2016

Towards the NFVI-Assisted ICN: Integrating ICN Forwarding into the Virtualization Infrastructure.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

RTT-Based Caching Policies to Improve User-Centric Performance in CCN.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Consumer-Driven Access Control Approach to Censorship Circumvention in Content-Centric Networking.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding.
IEEE Trans. Inf. Theory, 2015

An encryption-based access control framework for content-centric networking.
Proceedings of the 14th IFIP Networking Conference, 2015

A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

2012
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Explicit construction of universal strongly secure network coding via MRD codes.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

New parameters of linear codes expressing security performance of universal secure network coding.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
A Novel Realization of Threshold Schemes over Binary Field Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010

Stream Cipher-Based Hash Function and Its Security.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

2009
A Fast (<i>k</i>, <i>L</i>, <i>n</i>)-Threshold Ramp Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

The rakaposhi Stream Cipher.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
On a Fast (<i>k, n</i>)-Threshold Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Fast (3, <i>n</i>)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
IACR Cryptol. ePrint Arch., 2008


  Loading...