Kazuhiro Minami

According to our database1, Kazuhiro Minami authored at least 27 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Algorithmic Matching Attacks on Optimally Suppressed Tabular Data.
Algorithms, 2019

2016
Formalization of resilience for constraint-based dynamic systems.
J. Reliable Intelligent Environments, 2016

2014
Evaluating data utility of privacy-preserving pseudonymized location datasets.
JoWUA, 2014

On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems.
Proceedings of the Information and Communication Technology, 2014

Preventing denial-of-request inference attacks in location-sharing services.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

Pseudonym exchange for privacy-preserving publishing of trajectory data set.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Protecting location privacy with k-confusing paths based on dynamic pseudonyms.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Systems resilience: a challenge problem for dynamic constraint-based agent systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Confidentiality-preserving proof theories for distributed proof systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
On the consistency of distributed proofs with hidden subtrees.
ACM Trans. Inf. Syst. Secur., 2010

Protecting location privacy against inference attacks.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

2009
Safety in discretionary access control for logic-based publish-subscribe systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Confidentiality-preserving distributed proofs of conjunctive queries.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Secure aggregation in a publish-subscribe system.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Classifying pulmonary nodules using dynamic enhanced CT images based on CT number histogram.
Proceedings of the Medical Imaging 2008: Computer-Aided Diagnosis, 2008

2007
Single-bit re-encryption with applications to distributed proof systems.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Classifying pulmonary nodules using dynamic enhanced CT images based on CT number histogram.
Proceedings of the Medical Imaging 2007: Computer-Aided Diagnosis, 2007

2006
Naming and Discovery in Mobile Systems.
Proceedings of the Handbook of Mobile Middleware., 2006

Scalability in a Secure Distributed Proof System.
Proceedings of the Pervasive Computing, 2006

2005
Secure context-sensitive authorization.
Pervasive and Mobile Computing, 2005

Secure Context-Sensitive Authorization.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

2001
Computerized characterization of contrast enhancement patterns for classifying pulmonary nodules.
Proceedings of the Medical Imaging 2001: Image Processing, 2001

Patterns for classifying pulmonary nodules based on dynamic CT images.
Proceedings of the CARS 2001. Computer Assisted Radiology and Surgery. Proceedings of the 15th International Congress and Exhibition, 2001

Securing Web Servers against Insider Attack .
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001


  Loading...