Yuuki Takano

Orcid: 0000-0002-6888-9024

According to our database1, Yuuki Takano authored at least 25 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PRSafe: A Domain Specific Language Created with LLVM.
J. Inf. Process., 2024

2023
Deadlock- and Starvation-free Formally Verified Client Library for Robots.
Proceedings of the 7th International Conference on System Reliability and Safety, 2023

2022
NEMIANA: Cross-Platform Execution Migration for Debugging.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022

2021
A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

PRSafe: Primitive Recursive Function based Domain Specific Language using LLVM.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

2020
Development and Application of Privacy-preserving Distributed Medical Data Integration System.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Secure Primitive for Big Data Utilization.
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020

2019
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2017
GINTATE: Scalable and Extensible Deep Packet Inspection System for Encrypted Network Traffic: Session Resumption in Transport Layer Security Communication Considered Harmful to DPI.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

2016
Alfons: A Mimetic Network Environment Construction System.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communities, 2016

FARIS: Fast and Memory-Efficient URL Filter by Domain Specific Machine.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

NETorium: high-fidelity scalable wireless network emulator.
Proceedings of the 12th Asian Internet Engineering Conference, 2016

2015
DynamiQ: A Tool for Dynamic Emulation of Networks.
EAI Endorsed Trans. Self Adapt. Syst., 2015

Towards an Interactive Experiment Framework: DynamiQ.
EAI Endorsed Trans. Cloud Syst., 2015

SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware.
Proceedings of the 29th Large Installation System Administration Conference, 2015

2014
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014

MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Remote Collaboration with Spatial AR Support.
Proceedings of the Human-Computer Interaction. Advanced Interaction Modalities and Techniques, 2014

2012
Mobile-carrier Choice Modeling Framework Under Competitive Conditions.
J. Inf. Process., 2012

2011
A design and implementation of nickname-based sockets for applications inside NATed network.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Customer Segmentation in Mobile Carrier Choice Modeling.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2007
Evaluation of the Security of RC6 against the Chi<sup>2</sup>-Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Multipath Key Exchange on P2P Networks.
Proceedings of the The First International Conference on Availability, 2006

2005
On the Success Probability of chi<sup>2</sup>-attack on RC6.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Success Probability in Chi<sup>2</sup>-Attacks.
Proceedings of the Applied Cryptography and Network Security, 2004


  Loading...