Toshiaki Tanaka

Orcid: 0000-0002-1195-3945

According to our database1, Toshiaki Tanaka authored at least 82 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
μODNS: A distributed approach to DNS anonymization with collusion resistance.
Comput. Networks, December, 2023

Augmented Reality (AR) Application Superimposing the Falling Risks of Older Adults in Residential Settings and Coping Strategies: Building an Image-Based Scene Detection Model.
Proceedings of the HCI International 2023 - Late Breaking Papers, 2023

2016
Trial operation of a cloud service-based three-dimensional virtual reality tele-rehabilitation system for stroke patients.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

2015
Design of Elevator-Group Control System to Save Energy Consumption by Dynamically Controlling the Number of Running Cars.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Trans. Inf. Syst., 2014

2013
A new touchscreen application to retrieve speech information efficiently.
IEEE Trans. Consumer Electron., 2013

Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect.
Proceedings of the 2013 IEEE/SICE International Symposium on System Integration, 2013

Assessment of visual space recognition in patients with visual field defects using head mounted display (HMD) system: Case study with severe visual field defect.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Modeling of complex processes in nursing and caregiving services.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

2011
A Search-Based Approach to Railway Rolling Stock Allocation Problems.
Discret. Math. Algorithms Appl., 2011

A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Privacy Frost: A User-Oriented Data Anonymization Tool.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A secure coverage area expansion scheme for public wireless LAN services.
Int. J. Inf. Technol. Manag., 2010

Improved Subset Difference Method with Ternary Tree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010

A Small But Non-negligible Flaw in the Android Permission Scheme.
Proceedings of the POLICY 2010, 2010

Implementation of remote system using touchless palmprint recognition algorithm.
Proceedings of the MoMM'2010, 2010

Efficient Implementation of Pairing on BREW Mobile Phones.
Proceedings of the Advances in Information and Computer Security, 2010

Stream Cipher-Based Hash Function and Its Security.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

A User-Oriented Anonymization Mechanism for Public Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Single Sign-on Techniques with PKI-based Authentication for Mobile Phones.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Search-Based Approach to the Railway Rolling Stock Allocation Problem.
Proceedings of the Combinatorial Optimization and Applications, 2010

Security Verification for Authentication and Key Exchange Protocols, Revisited.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Side-Channel Analysis of the K2 Stream Cipher.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
A Fast (<i>k</i>, <i>L</i>, <i>n</i>)-Threshold Ramp Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Design of Anonymous Attribute Authentication Mechanism.
IEICE Trans. Commun., 2009

Anonymous handover mechanism for service mobility in heterogeneous wireless networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009

Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Denial of Service Attack Resilience on Area Expanded WLAN Services.
Proceedings of the 2009 International Conference on Security & Management, 2009

Obfuscation Mechanism in Conjunction with Tamper-Proof Module.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism.
J. Inf. Process., 2008

Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Trans. Inf. Syst., 2008

On a Fast (<i>k, n</i>)-Threshold Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Fast (3, <i>n</i>)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
IACR Cryptol. ePrint Arch., 2008

Ternary Subset Difference Method and Its Quantitative Analysis.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008

Anonymous attribute authentication scheme using self-blindable certificates.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

On-the-Fly Automatic Generation of Security Protocols.
Proceedings of the ICEIS 2008, 2008

2007
Development of security functions for a medical information sharing platform.
Syst. Comput. Jpn., 2007

Universally Composable Hierarchical Hybrid Authenticated Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

On Effectiveness of Clock Control in Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

GIS model for geothermal resource exploration in Akita and Iwate prefectures, northern Japan.
Comput. Geosci., 2007

K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007

Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy.
Proceedings of the SECRYPT 2007, 2007

Anonymous Prepaid Content Viewing System with Mobile Terminal.
Proceedings of the SECRYPT 2007, 2007

K2 Stream Cipher.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

2006
Secure Host Name Resolution Infrastructure for Overlay Networks.
IEICE Trans. Commun., 2006

Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Zero-Knowledge and Correlation Intractability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Flexible License Transfer System Using Mobile Terminal.
Proceedings of the SECRYPT 2006, 2006

Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

2005
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Secure Service and Network Framework for Mobile Ethernet.
Wirel. Pers. Commun., 2004

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

DNS Transport Size Issues in IPv6 Environment.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

2003
Delay spread reduction effect of beam antenna and adaptively controlled beam facing access system in urban line-of-sight street microcells.
IEEE Trans. Veh. Technol., 2003

Toward the Practical Uses of Holonic Manufacturing Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Distributed Self-Simulation Framework for Holonic Manufacturing Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2001
Performance evaluation of 32 kbits/s real-time and dual-direction video communication system for wireless channels.
IEEE Trans. Circuits Syst. Video Technol., 2001

A basic study for a robotic transfer aid system based on human motion analysis.
Adv. Robotics, 2001

1999
High-Quality and High-Speed Wireless Multimedia Transmission Technology for Personal Handy Phone System.
Wirel. Pers. Commun., 1999

A Relationship between One-Wayness and Correlation Intractability.
IACR Cryptol. ePrint Arch., 1999

On the Existence of 3-Round Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 1999

Potential wireless technologies in mobile communications.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
Performance of real-time video transmission using error control over Rayleigh and Rician fading channels.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

1997
Video transmission performance with adaptive time diversity over PHS channels.
Proceedings of the 8th IEEE International Symposium on Personal, 1997

1996
Image transmission control over fading channel using SR-ARQ based on DCT frequency and image frame structure.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

1995
Dynamic micro-cell assignment technique with distributed control scheme.
Proceedings of the 6th IEEE International Symposium on Personal, 1995

1994
Implementation and evaluation of SCSE for OSI secure communications.
Syst. Comput. Jpn., 1994

1993
The Characteristics of the Convergence Time of Associative Neural Networks.
Neural Comput., 1993

A new associative memory which inhibits a meaningless output.
Proceedings of International Conference on Neural Networks (ICNN'88), San Francisco, CA, USA, March 28, 1993

1990
Feasibility Study for Worldwide Videotex Interworking.
IEEE J. Sel. Areas Commun., 1990

1989
HARP: FORTRAN to silicon [compilation system].
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1989


  Loading...