Shin'ichiro Matsuo

Orcid: 0000-0002-3208-4531

According to our database1, Shin'ichiro Matsuo authored at least 45 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyzing the Performance Impact of HPC Workloads with Gramine+SGX on 3rd Generation Xeon Scalable Processors.
Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, 2023

Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

2022
log*-Round Game-Theoretically-Fair Leader Election.
IACR Cryptol. ePrint Arch., 2022

log <sup>*</sup>-Round Game-Theoretically-Fair Leader Election.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Distributed Random Number Generation Method on Smart Contracts.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

2021
Non-Interactive Differentially Anonymous Router.
IACR Cryptol. ePrint Arch., 2021

Smart Auto Insurance: High Resolution, Dynamic, Privacy-Driven, Telematic Insurance.
CoRR, 2021

Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Proceedings of the Financial Cryptography and Data Security, 2021

Fairness in ERC Token Markets: A Case Study of CryptoKitties.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
How to Dynamically Incentivize Sufficient Level of IoT Security.
Proceedings of the Financial Cryptography and Data Security, 2020

Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020.
Proceedings of the Financial Cryptography and Data Security, 2020

Proof of No-Work: How to Incentivize Individuals to Stay at Home.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2017
How formal analysis and verification add security to blockchain-based systems.
Proceedings of the 2017 Formal Methods in Computer Aided Design, 2017

Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2015
A non-repudiable negotiation protocol for security service level agreements.
Int. J. Commun. Syst., 2015

2014
Relations among Notions of Privacy for RFID Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Tailored Security: Building Nonrepudiable Security Service-Level Agreements.
CoRR, 2014

A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014

2013
Tailored Security: Building Nonrepudiable Security Service-Level Agreements.
IEEE Veh. Technol. Mag., 2013

PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.
IACR Cryptol. ePrint Arch., 2013

A Forward Privacy Model for RFID Authentication Protocols.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

Toward Practical Searchable Symmetric Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

Accountable security mechanism based on security service level agreement.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Solving a 676-Bit Discrete Logarithm Problem in GF(3<sup>6<i>n</i></sup>).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?
Proceedings of the Trusted Systems, 4th International Conference, 2012

Enabling secure multitenancy in cloud computing: Challenges and approaches.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
Multifactor Authenticated Key Renewal.
Proceedings of the Trusted Systems - Third International Conference, 2011

A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility.
IACR Cryptol. ePrint Arch., 2010

Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII.
IACR Cryptol. ePrint Arch., 2010

Solving a 676-bit Discrete Logarithm Problem in GF(3<sup>6n</sup>).
IACR Cryptol. ePrint Arch., 2010

Leakage-Resilient RFID Authentication with Forward-Privacy.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Leakage Resilient Strong Key-Insulated Signatures in Public Channel.
Proceedings of the Trusted Systems - Second International Conference, 2010

Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Proceedings of the HOST 2010, 2010

How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010

2008
Classification of Hash Functions Suitable for Real-Life Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2005
Efficient Divisible Voting Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

On Universal Composable Security of Time-Stamping Protocols.
IACR Cryptol. ePrint Arch., 2005

2003
Matching Oblivious Transfer: How to Exchange Valuable Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Electronic Ticket Scheme for ITS.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Divisible Voting Scheme.
IACR Cryptol. ePrint Arch., 2003

Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003


  Loading...