Tsutomu Matsumoto
Orcid: 0000-0002-7965-4888
According to our database1,
Tsutomu Matsumoto
authored at least 166 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Very Large Scale Integr. Syst., August, 2024
J. Inf. Process., 2024
EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities.
J. Inf. Process., 2024
Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot.
J. Inf. Process., 2024
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023
J. Inf. Process., 2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022
J. Inf. Process., 2022
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator.
Clust. Comput., 2022
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
J. Inf. Process., 2021
Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device.
J. Inf. Process., 2021
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Evaluation Framework for Performance Limitation of Autonomous Systems Under Sensor Attack.
Proceedings of the Computer Safety, Reliability, and Security, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
J. Inf. Process., 2020
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Commun., 2020
IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information.
IEICE Trans. Commun., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Inf. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
How to Code Data Integrity Verification Secure Against Single-Spot-Laser-Induced Instruction Manipulation Attacks.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal.
IEICE Trans. Inf. Syst., 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the Applications and Techniques in Information Security, 2019
Low-Latency Pairing Processor Architecture Using Fully-Unrolled Quotient Pipelining Montgomery Multiplier.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019
2018
A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs.
IEEE Trans. Circuits Syst. II Express Briefs, 2018
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices.
J. Inf. Process., 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
2016
Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
EURASIP J. Inf. Secur., 2016
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the International SoC Design Conference, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.
J. Inf. Process., 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
J. Inf. Process., 2012
IEICE Electron. Express, 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
2011
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems.
J. Inf. Process., 2011
J. Inf. Process., 2011
How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Web-Based Data Leakage Prevention.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Progress in Cryptology, 2010
2009
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Proceedings of the Formal to Practical Security, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
2008
IEEE Trans. Inf. Theory, 2008
Information Hiding on Lossless Data Compression.
J. Digit. Inf. Manag., 2008
Individuality evaluation for paper based artifact-metrics using transmitted light image.
Proceedings of the Security, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Prototyping security test objects for use with advanced biometric authentication systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008
2007
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Proceedings of the Advances in Computer Science, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
2004
IEICE Trans. Inf. Syst., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003
A study toward cognitive action with environment recognition by a learning space robot.
Proceedings of the 2003 IEEE International Conference on Robotics and Automation, 2003
Medical decision support system using clinical laboratory data, remarks and symptoms.
Proceedings of the American Control Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Impact of Artificial "Gummy" Fingers on Fingerprint Systems.
Datenschutz und Datensicherheit, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Designing and Implementation of Mobile Terminal for Telehealth Care Life Support System.
Proceedings of the Seventh International Conference on CSCW in Design, 2002
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the MEDINFO 2001, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Designing and Implementation of Tele-Health Care Information System based on Health Care Model.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001
2000
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998
A support system to formulate care plans for senior citizens & dataInput methods for a Web database.
Proceedings of WebNet 98, 1998
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Proceedings of the Selected Areas in Cryptography '98, 1998
1996
Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware.
Proceedings of WebNet 96, 1996
A Web site for counseling on students' future courses.
Proceedings of WebNet 96, 1996
1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1992
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Construction and evaluation of the identity transformers for cryptographic key distribution.
Syst. Comput. Jpn., 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Applied Algebra, 1990
1989
Adv. Robotics, 1989
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Proceedings of the Advances in Cryptology, 1989
1988
A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
Syst. Comput. Jpn., 1988
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
1987
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Applied Algebra, 1987
1985
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985