Kensaku Asahi

According to our database1, Kensaku Asahi authored at least 18 papers between 2011 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Multiple Rounds Aware Power Analysis Attack for a Lightweight Cipher SIMECK.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016

Vulnerability Evaluation Accelerator for Lightweight Ciphers.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Secure in-vehicle Systems using Authentication.
Int. J. Networked Distributed Comput., 2015

Frequency Domain Aware Power Analysis Attack against Random Clock LSI for Secure Automotive Embedded Systems.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Power analysis for clock fluctuation LSI.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A Cloud Education Environment to Support Self-Learning at Home - Analysis of Self-Learning Styles from Log Data.
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015

Estimation of bus traveling section using wireless sensor network.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

Statistical fault analysis for a lightweight block cipher TWINE.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure in-vehicle systems against Trojan attacks.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Error value driven fault analysis attack.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Vulnerability evaluation of multiplexing PUF for SVM attacks.
Proceedings of the Progress in Systems Engineering, 2014

Proposal for a seamless connection method for remotely located Bluetooth devices.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

Proposal for an ad-hoc routing protocol considering traffic conditions and evaluation of UDP using a redundant route.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

Proposal for a wireless sensor network visualization system using location estimation technology.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

Researches and evaluation of Strong Busy Tone that improves the performance of ad-hoc networks.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

PUF ID generation method for modeling attacks.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Study of threat for automotive embedded system by Trojan virus.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2011
Development and evaluation of a scheme for detecting multiple approaching vehicles through acoustic sensing.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011


  Loading...