Takamasa Isohara

Orcid: 0000-0003-2371-3698

According to our database1, Takamasa Isohara authored at least 18 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Private Verification in Multi-stakeholder Environment and its Application to Stable Matching.
SN Comput. Sci., March, 2024

Messages and Incentives to Promote Updating of Software on Smartphones.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Review on Machine Unlearning.
SN Comput. Sci., July, 2023

Privacy-Preserving Correlation Coefficient.
IEICE Trans. Inf. Syst., May, 2023

Hierarchical Local Differential Privacy.
J. Inf. Process., 2023

Privacy-Preserving Reputation System Against Dishonest Queries.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching.
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023

Proposal for Approaches to Updating Software on Android Smartphone.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Human Factors Impacting the Security Actions of Help Recipients.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT).
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

2022
Comparing Perception of Disclosure of Different Types of Information Related to Automated Tools.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Differential Privacy under Incalculable Sensitivity.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Analysis of Trust Factors in Children's Abilities to Use Digital Devices.
Proceedings of the GoodIT 2022: ACM International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7, 2022

2021
Designing Personalized OS Update Message based on Security Behavior Stage Model.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2013
SanAdBox: Sandboxing third party advertising libraries in a mobile application.
Proceedings of IEEE International Conference on Communications, 2013

2012
A Proposal to Realize the Provision of Secure Android Applications - ADMS: An Application Development and Management System.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Kernel-based Behavior Analysis for Android Malware Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
LSM-Based Secure System Monitoring Using Kernel Protection Schemes.
Proceedings of the ARES 2010, 2010


  Loading...