Takashi Matsunaka

According to our database1, Takashi Matsunaka authored at least 28 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hierarchical Local Differential Privacy.
J. Inf. Process., 2023

Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme.
Proceedings of the Network and System Security - 17th International Conference, 2023

Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.
Proceedings of the Information Security Practice and Experience, 2022

2021
Phishing Site Detection Using Similarity of Website Structure.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2018
Runtime Attestation for IAAS Clouds.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

2017
ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System.
Proceedings of the CLOSER 2017, 2017

2014
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

On the Feasibility of Deploying Software Attestation in Cloud Environments.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

Passive OS Fingerprinting by DNS Traffic Analysis.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A Cell-Planning Model for HetNet with CRE and TDM-ICIC in LTE-Advanced.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Colony-RAN architecture for future cellular network.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

2011
Personal Network Construction System Using Mobile Phones.
IEICE Trans. Commun., 2011

Retarding application idle timer expiration for service resumption in challenged network.
Proceedings of the 8th International Symposium on Wireless Communication Systems, 2011

2010
A Study on Security Management Architecture for Personal Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

2009
User-Centric Seamless Handover Scheme for Real-Time Applications in Heterogeneous Networks.
IEICE Trans. Commun., 2009

Basic Design of a User-Driven Service Creation Platform Assisted by Cellular Systems.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Device Authentication and Registration Method Assisted by a Cellular System for User-Driven Service Creation Architecture.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Load sharing of location-based routing in overlay networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Secure Data Sharing in Mobile Environments.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

2007
Proposal of ID Composition for Fast Location Lookup in Overlay Nodes.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

User-Centric Seamless Handover Scheme for Realtime Applications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

A Lightweight Approach to Protect Mobile Data.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

2006
An Effective Authentication Procedure Considering User Expiry Time During Handover.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

2005
Proposed relay method with P-MP structure of IEEE 802.16-2004.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

2004
Success Probability in Chi<sup>2</sup>-Attacks.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Optimized Chi<sup>2</sup>-Attack against RC6.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...