Ryo Nojima

Orcid: 0000-0002-2955-2920

According to our database1, Ryo Nojima authored at least 33 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Simple Privacy-Preserving Federated Learning with Different Encryption Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2024

Security Evaluation of Decision Tree Meets Data Anonymization.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Construction of a Support Tool for Japanese User Reading of Privacy Policies and Assessment of its User Impact.
IEICE Trans. Inf. Syst., May, 2023

Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol., January, 2023

Differential Private (Random) Decision Tree Without Adding Noise.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Continuous Group Key Agreement with Flexible Authorization and Its Applications.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

2022
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022

Membership Privacy for Asynchronous Group Messaging.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
Proceedings of the 24th International Conference on Enterprise Information Systems, 2022

2021
The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers.
CoRR, 2021

2020
On Limitation of Plausible Deniability.
Proceedings of the Advances in Information and Computer Security, 2020

2018
How to Handle Excessively Anonymized Datasets.
J. Inf. Process., 2018

2016
On the security of CBC Mode in SSL3.0 and TLS1.0.
J. Internet Serv. Inf. Secur., 2016

Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016

Analyzing Randomized Response Mechanisms Under Differential Privacy.
Proceedings of the Information Security - 19th International Conference, 2016

How does the willingness to provide private information change?
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Can We Securely Use CBC Mode in TLS1.0?
Proceedings of the Information and Communication Technology, 2015

A Secure Automobile Information Sharing System.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2013
UC-Secure Multi-Session OT Using Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2013

2012
New Leakage Resilient CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2012

Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Generic Fully Simulatable Adaptive Oblivious Transfer.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Cryptographically Secure Bloom-Filters.
Trans. Data Priv., 2009

A Storage Efficient Redactable Signature in the Standard Model.
Proceedings of the Information Security, 12th International Conference, 2009

Simple Adaptive Oblivious Transfer without Random Oracle.
Proceedings of the Advances in Cryptology, 2009

2008
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008

2006
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
Proceedings of the Progress in Cryptology, 2006

2005
Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005


  Loading...