Network Security Laboratory Home Page

Welcome

Publications

Journal and Conference Papers

    
  • Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka, "Linkage Between CVE and ATT&CK with Public Information," SECRYPT 2024, 655-660.
  • Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka, "A New Security Measure in Secret Sharing Schemes and Secure Network Coding," IEEE Access, 2024. 12. 69163-69171.
  • J. Kurihara, T. Tanaka, and T. Kubo, “μODNS: A distributed approach to DNS anonymization with collusion resistance,” Computer Networks, Elsevier, vol. 237, p. 110078, Dec. 2023.
  • Y. Nakano, S. Kiyomoto, T. Ishiguro, Y. Miyake, T. Tanaka, K. Sakurai, “Fast Implementation of KCipher-2 for Software and Hardware.” IEICE Trans. Inf. Syst. 97-D(1), pp.43-52, January 2014.
  • S. Kiyomoto, Y. Miyake, T. Tanaka, “On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters”, The 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2012), pp.1755-1762, 2012.
  • S. Kiyomoto, Y. Miyake, T. Tanaka, “Privacy Frost: A User-Oriented Data Anonymization Tool.”, The Sixth International Conference on Availability, Reliability and Security (ARES2011), pp.442-447, 2011.
  • M. Inamura, K. Iwamura, R. Watanabe, M. Nishikawa, T. Tanaka, “A New Tree-structure-specified Multisignature Scheme for a Document Circulation System”, International Conference on Security and Cryptography (Secrypt2011), pp.362.369, 2011.
  • H. Ota, R. Watanabe, K. Ito, T. Aoki, “Implementation of remote system using touchless palmprint recognition algorithm”, The 9th International Conference on Advances in Mobile Computing and Multimedia (MoMM2011), pp.33-41, 2011.
  • M. Iyama, S. Kiyomoto, K. Fukushima, T. Tanaka, T. Takagi, “Efficient Implementation of Pairing on BREW Mobile Phones”, The 5th International Workshop on Security (IWSEC2010), pp.326-336, 2010.
  • K. Fukushima, S. Kiyomoto, T. Tanaka, S. Sakurai, “Improved Subset Difference Method with Ternary Tree.”, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11), pp. 2034-2044, Nov. 2010.
  • W. Shin, S. Kwak, S. Kiyomoto, K. Fukushima, T. Tanaka, “A Small But Non-negligible Flaw in the Android Permission Scheme.”, IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), pp.107-110, 2010.
  • 稲村勝樹, 渡辺龍, 田中俊昭, “回覧文書閲覧確認に適した階層表記型多重署名方式の提案と実装評価”, 信学論(B),Vol. J93-B,No.10, pp.1378-1387, Oct. 2010.
  • S. Kiyomoto, T. Tanaka, “A User-Oriented Anonymization Mechanism for Public Data.”, Data Privacy Management and Autonomous Spontaneous Security (DPM/SETOP 2010), pp.22-35, 2010.
  • W. Shin, S. Kiyomoto, K. Fukushima, T. Tanaka, “A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.”, Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference, pp.944-951, 2010.
  • M. Henricksen, W. Yap, C. H. Yian, S. Kiyomoto, T. Tanaka, “Side-Channel Analysis of the K2 Stream Cipher”, Australasian Conference on Information Security and Privacy (ACISP 2010). Pp.53-73. 2010.
  • H. Ota, S. Kiyomoto, T. Tanaka, “Security Verification for Authentication and Key Exchange Protocols, Revisited.”, The 24th IEEE International Conference on Advanced Information Networking and Applications Workshops (AINA Workshops 2010), pp.226-233, 2010.
  • R. Watanabe, T. Tanaka, “A secure coverage area expansion scheme for public wireless LAN services”, International Journal of Information Technology and Management、9(4), pp.389-403. 2010.
  • J. Kurihara, S. Kiyomoto, K. Fukushima, T. Tanaka, “A Fast (k, L, n)- Threshold Ramp Secret Sharing Scheme”, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8), pp.1808-1821, 2009.
  • K. Fukushima, S. Kiyomoto, T. Tanaka, “Obfuscation Mechanism in Conjunction with Tamper-Proof Module.”, International Conference on Computational Science and Engineering (CSE’09), pp.665-670, 2009.
  • W. Shin, C. A. Gunter, S. Kiyomoto, K. Fukushima, T. Tanaka, “How to Bootstrap Security for Ad-Hoc Network: Revisited.”, pp.119-131, 2009.
  • R. Watanabe, T. Tanaka, “Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID”, The 6th International Conference on Information Technology (ITNG 2009), pp.435-442, 2009.
  • T. Fujisawa, M. Inamura, T. Tanaka, “Anonymous handover mechanism for service mobility in heterogeneous wireless networks”, IEEE Wireless Communications and Networking Conference (WCNC2009), pp. 2726-2731, 2009.
  • K. Fukushima, S. Kiyomoto, T. Tanaka, K. Sakurai, “Ternary Subset Difference Method and Its Quantitative Analysis.”, The 9th International Workshop on Information Security Applications, pp. 225-239, 2008.
  • J. Kurihara, S. Kiyomoto, K. Fukushima, T. Tanaka, “On a Fast (k, n)-Threshold Secret Sharing Scheme”, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9), pp.2365-2378, Sep. 2008.
  • J. Kurihara, S. Kiyomoto, K. Fukushima, T. Tanaka, “A New (k, n)-Threshold Secret Sharing Scheme and Its Extension” The 11th International Conference on Information Security Conference (ISC 2008), pp.455-470, 2008.
  • S. Kiyomoto, T. Tanaka, S. Sakurai, “FPGA-Targeted Hardware Implementations of K2”, International Conference on Security and Cryptography (Secrypt2008), pp. 270-277, 2008.
  • K. Fukishima, S. Kiyomoto, T. Tanaka, S. Sakurai, “Optimization of Group Key Management Structure with a Client Join-Leave Mechanism”, J. Inf. Process. 16, pp. 130-141, 2008.
  • S. Kiyomoto, T. Tanaka, “Anonymous attribute authentication scheme using self-blindable certificates”, IEEE International Conference on Intelligence and Security Informatics (ISI2008), pp. 215-127, 2008.
  • S. Kiyomoto, H. Ota, T. Tanaka, “On-the-Fly Automatic Generation of Security Protocols.”, The 10th International Conference on Enterprise Information Systems (ICEIS2008), pp. 97-104, 2008.
  • M. Inamura, T. Tanaka, “Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy”, International Conference on Security and Cryptography (Secrypt2007), pp. 427-432, 2007.
  • S. Kiyomoto, T. Tanaka, K. Sakurai, “K2: A stream cipher algorithm using dynamic feedback control”, International Conference on Security and Cryptography (Secrypt2007), pp.204-213, 2007.
  • 田中俊昭, “マルチメディアサービスのための通信基盤とそのセキュリティに関する研究”, 学位論文, 2007.
  • S. Hada, T. Tanaka, “Zero Knowledge and Correlation Intractability”, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 89-A(10), 2894-2905, 2007.
  • 清本晋作, 田中俊昭, “モバイルPKIの最適設計について”, 情報処理学会論文誌 第47巻, 第8号, pp.2712-2723, 2006.
  • M, Inamura, T. Tanaka, T, Fujisawa, K. Ogawa, T. Kimura, “Flexible License Transfer System Using Mobile Terminal”, International Conference on Security and Cryptography (Secrypt2006), pp.397-404, 2006.
  • A. Yamada, Y. Miyake, K. Takemori, T. Tanaka, “Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data”, International Symposium on Information Technology: Coding and Computing (ITCC 2005), pp.650-665, 2005.
  • T. Tanaka, “Current Topics on Mobile PKI (Invited Talk)”, The 3rd International Workshop for Applied PKI (IWAP2004), 2004.
  • S. Kiyomoto, T. Tanaka, K. Nakao, “Implementation and Evaluation of a Micropayment System for Mobile Environment”, IPSJ Journal Vol.45 No.3, pp. 370-379, 2004.
  • T. Tanaka, S. Kiyomoto, K. Nakao, F. Kojima, K. Sato, M. Fujise, “Implementation and Evaluation of Secure Protocols for ITS Reservation and Downloading Services”, ITS Telecommunications 2002 (ITST2002), pp. 263-268, 2002.
  • T. Tanaka, K. Nakao, S. Kiyomoto, “Proposal of the Secure Agent Model for Intelligent Transportation Systems”, The 2nd International Symposium on Wireless Personal Multimedia Communications (WPMC2001), Vol.3, pp. 1235-1240.
  • S. Hada, T. Tanaka, “A Relationship between One-Wayness and Correlation Intractability”, Public Key Cryptography (PKC 1999) Lecture Notes in Computer Science (LNCS) Vol,1560, pp. 82-96. 1999.
  • S. Hada, T. Tanaka, “On the Existence of 3-Round Zero-Knowledge Protocols”, CRYPTO 1988 Lecture Notes in Computer Science (LNCS), Vol. 1462, pp. 408-423, 1998. T. Tanaka, M. Yamada, “Colleague: Joint Editing System Based on Structured Multimedia Document”, The 10th Japan-German Forum on Information Technology, 1996.
  • 田中俊昭, 山田満, 羽鳥好律, “構造化マルチメディア文章を用いた協同編集システムColleague”, 情報処理学会論文誌, 第36巻, 第6号, pp. 1310-1321, 1995.
  • T. Tanaka, M. Yamada, “Introduction of CDH (Cooperative Document Handling) and its Feasibility Study on Multimedia Document Conference System”, The 5th IEEE COMSOC International Workshop on Multimedia Communications (Multimedia 1994), pp.431-436, 1994.
  • 田中俊昭, 中尾康二, “文書会議システムにおけるODAコンバータ方式に基づく文書処理機能の設計および実装/評価”, テレビジョン学会誌, 第17巻, 第10号, pp.1340-1350, 1993.
  • K. Nakao, S. Obana, S. Nishiyama, T. Tanaka, “Feasibility Study for Worldwide Videotex Interworking”, IEEE Journal on Selected Areas in Communications Volume: 8, Issue: 1, pp.80-92. 1990.
  • 田中俊昭, 森田長吉, 熊谷信昭, “一様曲りステップインデックス形光ファイバのLP11モードの実行遮断周波数”, 電子情報通信学会論文誌C, 第J70-C巻, 第1号, pp.31-39, 1987.
  •     

Graduate School of Information Science

Network Security Laboratory

Home