Masakatu Morii

Orcid: 0000-0001-7942-5914

According to our database1, Masakatu Morii authored at least 132 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Malicious Domain Detection Based on Decision Tree.
IEICE Trans. Inf. Syst., September, 2023

Few-Shot Learning-Based Malicious IoT Traffic Detection with Prototypical Graph Neural Networks.
IEICE Trans. Inf. Syst., September, 2023

Investigations of Electronic Signatures for Construction of Trust Services.
IEICE Trans. Inf. Syst., September, 2023

A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

Encryption Invalidation Attacks: Is your Wi-Fi encryption really working?
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

QR-Code with Superimposed Text.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.
Sensors, 2022

Extracting the Secrets of OpenSSL with RAMBleed.
Sensors, 2022

A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV.
Future Internet, 2022

Multi-labeling with topic models for searching security information.
Ann. des Télécommunications, 2022

A Cache-Aided Power Optimization Technique for Adaptive Secure Transmission Systems.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

Attack Techniques and Countermeasures against Kr00k using CSA.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021

Fake News Detection via Biased User Profiles in Social Networking Sites.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

Systemization of Vulnerability Information by Ontology for Impact Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
A Spatial-Temporal Subspace-Based Compressive Channel Estimation Technique in Unknown Interference MIMO Channels.
IEEE Trans. Signal Process., 2020

Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020

A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet.
Int. J. Distributed Sens. Networks, 2020

Coded Caching in Multi-Rate Wireless Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection.
IEEE Access, 2020

Stabilized Clustering Enabled V2V Communication in an NDN-SDVN Environment for Content Retrieval.
IEEE Access, 2020

2019
Understanding Attack Trends from Security Blog Posts Using Guided-topic Model.
J. Inf. Process., 2019

Authentication Scheme Using Pre-Registered Information on Blockchain.
IEICE Trans. Inf. Syst., 2019

CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments.
IEICE Trans. Inf. Syst., 2019

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019

A Malicious Web Site Identification Technique Using Web Structure Clustering.
IEICE Trans. Inf. Syst., 2019

Improved Integral Attack on HIGHT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Counter Attack Against the Bus-Off Attack on CAN.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Designing Authentication and Authorization System with Blockchain.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding.
J. Inf. Process., 2018

Cryptanalysis of Reduced Kreyvium.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Coded Caching for Hierarchical Networks with a Different Number of Layers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Modeling Attack Activity for Integrated Analysis of Threat Information.
IEICE Trans. Inf. Syst., 2018

FCReducer: Locating Symmetric Cryptographic Functions on the Memory.
IEICE Trans. Inf. Syst., 2018

On Design of Robust Lightweight Stream Cipher with Short Internal State.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Further Results on the Error Correction Capability of Irregular LDPC Codes under the Gallager A Algorithm.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Coded Caching in Multi-Rate Wireless Network.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

A Construction of Fake QR Codes Based on Error-Correcting Codes.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Several MILP-Aided Attacks Against SNOW 2.0.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Proposal of WEP Operation with Strong IV and Its Implementation.
J. Inf. Process., 2017

Performance Evaluation of a Cluster Based Routing Protocol for VANETs.
J. Commun., 2017

How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Error-Trapping Decoding for Cyclic Codes over Symbol-Pair Read Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data.
IEICE Trans. Inf. Syst., 2017

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage.
IEICE Trans. Inf. Syst., 2017

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services.
IEICE Trans. Inf. Syst., 2017

Aesthetic QR Code Based on Modified Systematic Encoding Function.
IEICE Trans. Inf. Syst., 2017

Analysis and Improvements of the Full Spritz Stream Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

A multi-group signature scheme for local broadcasting.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Virtual storage and area limited data delivery over named data networking.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Low-Data Complexity Attacks on Camellia.
Proceedings of the Applications and Techniques in Information Security, 2017

Conditional Differential Cryptanalysis for Kreyvium.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Leveraging In-Network Caching in Vehicular Network for Content Distribution.
Int. J. Distributed Sens. Networks, 2016

Algebraic Decoding of BCH Codes over Symbol-Pair Read Channels: Cases of Two-Pair and Three-Pair Error Correction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

SSL Client Authentication with TPM.
IEICE Trans. Inf. Syst., 2016

Bit-Based Division Property and Application to Simon Family.
IACR Cryptol. ePrint Arch., 2016

Cloud storage with key-value stores over content-centric networking architecture.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

LDPC codes and iterative decoding over symbol-tuple error channels.
Proceedings of the 9th International Symposium on Turbo Codes and Iterative Information Processing, 2016

Error correction capability of irregular LDPC codes under the Gallager a algorithm.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Compact Representation for Division Property.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Comparing Malware Samples for Unpacking: A Feasibility Study.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Syndrome Decoding of Symbol-Pair Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

A Decoding Algorithm for Cyclic Codes over Symbol-Pair Read Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Full Plaintext Recovery Attacks on RC4 Using Multiple Biases.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Enrichment of Visual Appearance of Aesthetic QR Code.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

LCE in-network caching on vehicular networks for content distribution in urban environments.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015

A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Expanding Weak-key Space of RC4.
J. Inf. Process., 2014

Comprehensive Analysis of Initial Keystream Biases of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Method for Computing the Weight Spectrum of LDPC Convolutional Codes Based on Circulant Matrices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

On computing the weight distribution of non-binary ldpc codes using the probabilistic algorithm.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

How Much Can Complexity of Linear Cryptanalysis Be Reduced?
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

DCT-OFDM based watermarking scheme robust against clipping attack.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack.
J. Inf. Process., 2013

How to Recover Any Byte of Plaintext on RC4.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Full Plaintext Recovery Attack on Broadcast RC4.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Falsification Attacks against WPA-TKIP in a Realistic Environment.
IEICE Trans. Inf. Syst., 2012

Anonymous Authentication Scheme without Verification Table for Wireless Environments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI.
Proceedings of the Advances in Information and Computer Security, 2012

Security on the quantum-type Even-Mansour cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

An efficient method for computing the weight spectrum of LDPC convolutional codes constructed from quasi-cyclic codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Generalized Classes of Weak Keys on RC4 Using Predictive State.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Irreducible <i>m</i>-Term Polynomial and Its Application to Multiplication over GF(2<sup><i>m</i></sup>).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP.
IEICE Trans. Inf. Syst., 2011

AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -.
IACR Cryptol. ePrint Arch., 2011

A reliability-based computation method for the weight distribution of LDPC codes using the probabilistic algorithm.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Systematic Generation of Tardos's Fingerprint Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Detailed evaluation of error floors of LDPC codes using the probabilistic algorithm.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Quantum distinguisher between the 3-round Feistel cipher and the random permutation.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
A Chosen-IV Key Recovery Attack on Py and Pypy.
IEICE Trans. Inf. Syst., 2009

A Probabilistic Algorithm for Computing the Weight Distribution of LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

On the probabilistic computation of the stopping redundancy of LDPC codes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

A Study of Rounding Error on CDMA-Based Fingerprinting Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
New Weakness in the Key-Scheduling Algorithm of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Compression Functions Suitable for the Multi-Property-Preserving Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Reversible Watermark with Large Capacity Based on the Prediction Error Expansion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2.
IACR Cryptol. ePrint Arch., 2008

On the systematic generation of Tardos's fingerprinting codes.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

A probabilistic algorithm for finding the minimum-size stopping sets of LDPC codes.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

On the probabilistic computation algorithm for the minimum-size stopping sets of LDPC codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Iterative Detection Method for CDMA-Based Fingerprinting Scheme.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Effective detection method for CDMA-based fingerprinting scheme.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

On the implementation of asymmetric fingerprinting protocol.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Special Section on Cryptography and Information Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Redundancy of the Wang-Yu Sufficient Conditions.
IACR Cryptol. ePrint Arch., 2006

2005
A probabilistic computation method for the weight distribution of low-density parity-check codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Visual Cryptographic Protocols Using the Trusted Initializer.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Reversible Watermark with Large Capacity Using the Predictive Coding.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

FMS Attack-Resistant WEP Implementation Is Still Broken.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Port randomized VPN by mobile codes.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
Internal-State Reconstruction of a Stream Cipher RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Remote Access VPN with Port Protection Function by Mobile Codes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

1999
Feedback picture sequence control for real-time MPEG video transfer through ATM networks.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1993
A Note on Aliasing Probability for Multiple Input Signature Analyzer.
IEEE Trans. Computers, 1993

1992
Generalized key-equation of remainder decoding algorithm for Reed-Solomon codes.
IEEE Trans. Inf. Theory, 1992

Perfect Staircase Profile of Linear Complexity for Finite Sequences.
Inf. Process. Lett., 1992

On the Efficient Decoding of Reed-Solomon Codes Based on GMD Criterion.
Proceedings of the 22nd IEEE International Symposium on Multiple-Valued Logic, 1992

1990
Exponetiation in Finite Fields Using Dual Basis Multiplier.
Proceedings of the Applied Algebra, 1990

1989
Efficient bit-serial multiplication and the discrete-time Wiener-Hopf equation over finite fields.
IEEE Trans. Inf. Theory, 1989


  Loading...