Yuji Suga

Orcid: 0000-0002-9244-907X

According to our database1, Yuji Suga authored at least 32 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A classification for commutative three-element semigroups with local XOR structure and its implementability of card-based protocols.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
ICH 3-party model for claims distribution on the blockchain and their application to the e-KYC-e model.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

A classification proof for commutative three-element semigroups with local AND structure and its application to card-based protocols.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

How to implement non-committed card protocols to realize AND operations satisfying the three-valued logics.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Formalising Linked-Data based Verifiable Credentials for Selective Disclosure.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2020
Editor's Message to Special Issue of Real World Cryptography, Security and Privacy.
J. Inf. Process., 2020

Simple authentication methods with pseudo IDs and derivative passwords.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Securing Cryptocurrency Exchange: Building up Standard from Huge Failures.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Formulation of Information Hiding Model for One-Time Authentication Methods Using the Merkle Tree.
Proceedings of the Advances in Internet, 2019

2018
An algebraic interpretation of the XOR-based Secret Sharing Schemes.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
An Extension of \((2, m(m+1)/2)\)-Threshold Secret Sharing Schemes.
Proceedings of the Advances in Network-Based Information Systems, 2017

Sausage-Style One-Time Authentication Schemes.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Browser's "search form" issues and countermeasures.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Generalized Graph-Based Visual Secret Sharing Schemes for Multiple Secrets.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

2015
Consideration of the XOR-operation Based Secure Multiparty Computation.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

2014
SSL/TLS Servers Status Survey about Enabling Forward Secrecy.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Classification of Generalized Graph-type (2, n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple Secrets.
Proceedings of the Intelligent Systems and Applications, 2014

Visualization of SSL Setting Status Such as the FQDN Mismatch.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

New Constructions of (2, n)-Threshold Secret Sharing Schemes Using Exclusive-OR Operations.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

Interactive Fingerprint.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A Fair Exchange Protocol for Attribute Certification.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access Structure.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
A Low-Cost Key Derivation Scheme for Hierarchy-Based Access.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Encryption Methods for Restricted Data Limited in Value Range.
Proceedings of the Computational Science and Its Applications, 2010

2005
New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005


  Loading...