Takamichi Saito

Affiliations:
  • Meiji University, Department of Information Science, Kawasaki, Japan


According to our database1, Takamichi Saito authored at least 50 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Device Classification via Passive Fingerprints with Clustering Algorithm.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2021
Investigation of Power Consumption Attack on Android Devices.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Comparison of OAuth/OpenID Connect Security in America and Japan.
Proceedings of the Advances in Networked-Based Information Systems, 2020

2019
Examination and Comparison of Countermeasures Against Web Tracking Technologies.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

How Securely Are OAuth/OpenID Connect Implemented in Japan?
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
On Estimating Platforms of Web User with JavaScript Math Object.
Proceedings of the Advances in Network-Based Information Systems, 2018

Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries.
Proceedings of the Advances in Information and Computer Security, 2018

Combining Features in Browser Fingerprinting.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

A Proposal and the Evaluation of a Hands-On Training System for Cyber Security.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting?
Proceedings of the Advances in Network-Based Information Systems, 2017

Proposal and Implementation of a Countermeasure Against Event Tracking on the Web.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A Method for Changes Prediction of the Dynamic Signature Global Features over Time.
Proceedings of the Artificial Intelligence and Soft Computing, 2017

Fuzzy PID Controllers with FIR Filtering and a Method for Their Construction.
Proceedings of the Artificial Intelligence and Soft Computing, 2017

Web Browser Tampering: Inspecting CPU Features from Side-Channel Information.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Mitigating Use-After-Free Attack with Application Program Loader.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores.
J. Artif. Intell. Soft Comput. Res., 2016

A Survey of Prevention/Mitigation against Memory Corruption Attacks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

A Browser Scanner: Collecting Intranet Information.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Estimating CPU Features by Browser Fingerprinting.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

An Authorization Scheme Concealing Client's Access from Authentication Server.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Aspects of Evolutionary Construction of New Flexible PID-fuzzy Controller.
Proceedings of the Artificial Intelligence and Soft Computing, 2016

OS and Application Identification by Installed Fonts.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Security Authorization Scheme for Web Applications.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A Survey of Hardware Features in Modern Browsers: 2015 Edition.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Robust Identification of Browser Fingerprint Comparison Using Edit Distance.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Web Browser Fingerprinting Using Only Cascading Style Sheets.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Cryptographic Operation Load-Balancing between Cryptographic Module and CPU.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

A Proposal and Implementation of an ID Federation that Conceals a Web Service from an Authentication Server.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2012
Authentication Binding between SSL/TLS and HTTP.
IEICE Trans. Inf. Syst., 2012

2009
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme.
IEICE Trans. Inf. Syst., 2009

SSL Connection Failover in Web Clusters and its Evaluation.
Proceedings of the NBiS 2009, 2009

2008
Authentication Binding between TLS and HTTP.
Proceedings of the Network-Based Information Systems, 2nd International Conference, 2008

2007
Load-Balancing SSL Cluster Using Session Migration.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A privacy-enhanced access control.
Syst. Comput. Jpn., 2006

Anti-spam mail system.
Syst. Comput. Jpn., 2006

On Compromising Password-Based Authentication over HTTPS.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Anti-SPAM System: Another Way of Preventing SPAM.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

2004
A Technical Comparison of IPSec and SSL.
IACR Cryptol. ePrint Arch., 2004

A Secure Wireless LAN System Retaining Privacy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server .
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
The Secure DHCP System with User Authentication.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Verification of Authentication Protocols Based on the Binding Relation.
Proceedings of the Software Security -- Theories and Systems, 2002

Architectural Defects of the Secure Shell.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
An Access Control with handling Private Information.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Security of Public Key Certificate Based Authentication Protocols.
Proceedings of the Public Key Cryptography, 2000

Privacy enhanced access control by SPKI.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

1999
Incremental Analysis and Verification of Authentication Protocols.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999


  Loading...