Ryo Nojima

Orcid: 0000-0002-2955-2920

According to our database1, Ryo Nojima authored at least 31 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security Evaluation of Decision Tree Meets Data Anonymization.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Construction of a Support Tool for Japanese User Reading of Privacy Policies and Assessment of its User Impact.
IEICE Trans. Inf. Syst., May, 2023

Designing a Location Trace Anonymization Contest.
Proc. Priv. Enhancing Technol., January, 2023

Differential Private (Random) Decision Tree Without Adding Noise.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022

Continuous Group Key Agreement with Flexible Authorization and Its Applications.
IACR Cryptol. ePrint Arch., 2022

Membership Privacy for Asynchronous Group Messaging.
IACR Cryptol. ePrint Arch., 2022

Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021

The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers.
CoRR, 2021

2020
On Limitation of Plausible Deniability.
Proceedings of the Advances in Information and Computer Security, 2020

2018
How to Handle Excessively Anonymized Datasets.
J. Inf. Process., 2018

2016
On the security of CBC Mode in SSL3.0 and TLS1.0.
J. Internet Serv. Inf. Secur., 2016

Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016

Analyzing Randomized Response Mechanisms Under Differential Privacy.
Proceedings of the Information Security - 19th International Conference, 2016

How does the willingness to provide private information change?
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Generic Fully Simulatable Adaptive Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Can We Securely Use CBC Mode in TLS1.0?
Proceedings of the Information and Communication Technology, 2015

A Secure Automobile Information Sharing System.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
UC-Secure Multi-Session OT Using Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2013

2012
New Leakage Resilient CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2012

2010
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption.
IACR Cryptol. ePrint Arch., 2010

2009
Cryptographically Secure Bloom-Filters.
Trans. Data Priv., 2009

Simple Adaptive Oblivious Transfer Without Random Oracle.
IACR Cryptol. ePrint Arch., 2009

A Storage Efficient Redactable Signature in the Standard Model.
Proceedings of the Information Security, 12th International Conference, 2009

2008
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008

2006
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
Proceedings of the Progress in Cryptology, 2006

2005
Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005


  Loading...