Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka, "Linkage Between CVE and ATT&CK with Public Information," SECRYPT 2024, 655-660.
Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka, "A New Security Measure in Secret Sharing Schemes and Secure Network Coding," IEEE Access, 2024. 12. 69163-69171.
J. Kurihara, T. Tanaka, and T. Kubo, “μODNS: A distributed approach to DNS anonymization with collusion resistance,” Computer Networks, Elsevier, vol. 237, p. 110078, Dec. 2023.
Y. Nakano, S. Kiyomoto, T. Ishiguro, Y. Miyake, T. Tanaka, K. Sakurai, “Fast Implementation of KCipher-2 for Software and Hardware.” IEICE Trans. Inf. Syst. 97-D(1), pp.43-52, January 2014.
S. Kiyomoto, Y. Miyake, T. Tanaka, “On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters”, The 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2012), pp.1755-1762, 2012.
S. Kiyomoto, Y. Miyake, T. Tanaka, “Privacy Frost: A User-Oriented Data Anonymization Tool.”, The Sixth International Conference on Availability, Reliability and Security (ARES2011), pp.442-447, 2011.
M. Inamura, K. Iwamura, R. Watanabe, M. Nishikawa, T. Tanaka, “A New Tree-structure-specified Multisignature Scheme for a Document Circulation System”, International Conference on Security and Cryptography (Secrypt2011), pp.362.369, 2011.
H. Ota, R. Watanabe, K. Ito, T. Aoki, “Implementation of remote system using touchless palmprint recognition algorithm”, The 9th International Conference on Advances in Mobile Computing and Multimedia (MoMM2011), pp.33-41, 2011.
M. Iyama, S. Kiyomoto, K. Fukushima, T. Tanaka, T. Takagi, “Efficient Implementation of Pairing on BREW Mobile Phones”, The 5th International Workshop on Security (IWSEC2010), pp.326-336, 2010.
K. Fukushima, S. Kiyomoto, T. Tanaka, S. Sakurai, “Improved Subset Difference Method with Ternary Tree.”, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11), pp. 2034-2044, Nov. 2010.
W. Shin, S. Kwak, S. Kiyomoto, K. Fukushima, T. Tanaka, “A Small But Non-negligible Flaw in the Android Permission Scheme.”, IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), pp.107-110, 2010.
S. Kiyomoto, T. Tanaka, “A User-Oriented Anonymization Mechanism for Public Data.”, Data Privacy Management and Autonomous Spontaneous Security (DPM/SETOP 2010), pp.22-35, 2010.
W. Shin, S. Kiyomoto, K. Fukushima, T. Tanaka, “A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.”, Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference, pp.944-951, 2010.
M. Henricksen, W. Yap, C. H. Yian, S. Kiyomoto, T. Tanaka, “Side-Channel Analysis of the K2 Stream Cipher”, Australasian Conference on Information Security and Privacy (ACISP 2010). Pp.53-73. 2010.
H. Ota, S. Kiyomoto, T. Tanaka, “Security Verification for Authentication and Key Exchange Protocols, Revisited.”, The 24th IEEE International Conference on Advanced Information Networking and Applications Workshops (AINA Workshops 2010), pp.226-233, 2010.
R. Watanabe, T. Tanaka, “A secure coverage area expansion scheme for public wireless LAN services”, International Journal of Information Technology and Management、9(4), pp.389-403. 2010.
J. Kurihara, S. Kiyomoto, K. Fukushima, T. Tanaka, “A Fast (k, L, n)- Threshold Ramp Secret Sharing Scheme”, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8), pp.1808-1821, 2009.
K. Fukushima, S. Kiyomoto, T. Tanaka, “Obfuscation Mechanism in Conjunction with Tamper-Proof Module.”, International Conference on Computational Science and Engineering (CSE’09), pp.665-670, 2009.
W. Shin, C. A. Gunter, S. Kiyomoto, K. Fukushima, T. Tanaka, “How to Bootstrap Security for Ad-Hoc Network: Revisited.”, pp.119-131, 2009.
R. Watanabe, T. Tanaka, “Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID”, The 6th International Conference on Information Technology (ITNG 2009), pp.435-442, 2009.
T. Fujisawa, M. Inamura, T. Tanaka, “Anonymous handover mechanism for service mobility in heterogeneous wireless networks”, IEEE Wireless Communications and Networking Conference (WCNC2009), pp. 2726-2731, 2009.
K. Fukushima, S. Kiyomoto, T. Tanaka, K. Sakurai, “Ternary Subset Difference Method and Its Quantitative Analysis.”, The 9th International Workshop on Information Security Applications, pp. 225-239, 2008.
J. Kurihara, S. Kiyomoto, K. Fukushima, T. Tanaka, “On a Fast (k, n)-Threshold Secret Sharing Scheme”, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9), pp.2365-2378, Sep. 2008.
J. Kurihara, S. Kiyomoto, K. Fukushima, T. Tanaka, “A New (k, n)-Threshold Secret Sharing Scheme and Its Extension” The 11th International Conference on Information Security Conference (ISC 2008), pp.455-470, 2008.
S. Kiyomoto, T. Tanaka, S. Sakurai, “FPGA-Targeted Hardware Implementations of K2”, International Conference on Security and Cryptography (Secrypt2008), pp. 270-277, 2008.
K. Fukishima, S. Kiyomoto, T. Tanaka, S. Sakurai, “Optimization of Group Key Management Structure with a Client Join-Leave Mechanism”, J. Inf. Process. 16, pp. 130-141, 2008.
S. Kiyomoto, T. Tanaka, “Anonymous attribute authentication scheme using self-blindable certificates”, IEEE International Conference on Intelligence and Security Informatics (ISI2008), pp. 215-127, 2008.
S. Kiyomoto, H. Ota, T. Tanaka, “On-the-Fly Automatic Generation of Security Protocols.”, The 10th International Conference on Enterprise Information Systems (ICEIS2008), pp. 97-104, 2008.
M. Inamura, T. Tanaka, “Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy”, International Conference on Security and Cryptography (Secrypt2007), pp. 427-432, 2007.
S. Kiyomoto, T. Tanaka, K. Sakurai, “K2: A stream cipher algorithm using dynamic feedback control”, International Conference on Security and Cryptography (Secrypt2007), pp.204-213, 2007.
S. Hada, T. Tanaka, “Zero Knowledge and Correlation Intractability”, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 89-A(10), 2894-2905, 2007.
M, Inamura, T. Tanaka, T, Fujisawa, K. Ogawa, T. Kimura, “Flexible License Transfer System Using Mobile Terminal”, International Conference on Security and Cryptography (Secrypt2006), pp.397-404, 2006.
A. Yamada, Y. Miyake, K. Takemori, T. Tanaka, “Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data”, International Symposium on Information Technology: Coding and Computing (ITCC 2005), pp.650-665, 2005.
T. Tanaka, “Current Topics on Mobile PKI (Invited Talk)”, The 3rd International Workshop for Applied PKI (IWAP2004), 2004.
S. Kiyomoto, T. Tanaka, K. Nakao, “Implementation and Evaluation of a Micropayment System for Mobile Environment”, IPSJ Journal Vol.45 No.3, pp. 370-379, 2004.
T. Tanaka, S. Kiyomoto, K. Nakao, F. Kojima, K. Sato, M. Fujise, “Implementation and Evaluation of Secure Protocols for ITS Reservation and Downloading Services”, ITS Telecommunications 2002 (ITST2002), pp. 263-268, 2002.
T. Tanaka, K. Nakao, S. Kiyomoto, “Proposal of the Secure Agent Model for Intelligent Transportation Systems”, The 2nd International Symposium on Wireless Personal Multimedia Communications (WPMC2001), Vol.3, pp. 1235-1240.
S. Hada, T. Tanaka, “A Relationship between One-Wayness and Correlation Intractability”, Public Key Cryptography (PKC 1999) Lecture Notes in Computer Science (LNCS) Vol,1560, pp. 82-96. 1999.
S. Hada, T. Tanaka, “On the Existence of 3-Round Zero-Knowledge Protocols”, CRYPTO 1988 Lecture Notes in Computer Science (LNCS), Vol. 1462, pp. 408-423, 1998.
T. Tanaka, M. Yamada, “Colleague: Joint Editing System Based on Structured Multimedia Document”, The 10th Japan-German Forum on Information Technology, 1996.
田中俊昭, 山田満, 羽鳥好律, “構造化マルチメディア文章を用いた協同編集システムColleague”, 情報処理学会論文誌, 第36巻, 第6号, pp. 1310-1321, 1995.
T. Tanaka, M. Yamada, “Introduction of CDH (Cooperative Document Handling) and its Feasibility Study on Multimedia Document Conference System”, The 5th IEEE COMSOC International Workshop on Multimedia Communications (Multimedia 1994), pp.431-436, 1994.
K. Nakao, S. Obana, S. Nishiyama, T. Tanaka, “Feasibility Study for Worldwide Videotex Interworking”, IEEE Journal on Selected Areas in Communications Volume: 8, Issue: 1, pp.80-92. 1990.