Ryu Watanabe

Orcid: 0000-0002-1089-5296

According to our database1, Ryu Watanabe authored at least 15 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Extension of Resource Authorization Method with SSI in Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Application of Generalized Deduplication Techniques in Edge Computing Environments.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Resource Authorization Methods for Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

2019
Laboratory Experiments and Large-Scale Field Trials for Evaluating the Advanced ISDB-T.
Proceedings of the 2019 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2019

2013
Implementation and evaluation of a remote authentication system using touchless palmprint recognition.
Multim. Syst., 2013

P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

PPM: Privacy Policy Manager for Personalized Services.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2011
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
A secure coverage area expansion scheme for public wireless LAN services.
Int. J. Inf. Technol. Manag., 2010

Implementation of remote system using touchless palmprint recognition algorithm.
Proceedings of the MoMM'2010, 2010

Single Sign-on Techniques with PKI-based Authentication for Mobile Phones.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Denial of Service Attack Resilience on Area Expanded WLAN Services.
Proceedings of the 2009 International Conference on Security & Management, 2009


  Loading...