default search action
Naoto Yanai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Mine Arai, Koki Tejima, Yuya Yamada, Takayuki Miura, Kyosuke Yamashita, Chihiro Kado, Rei Shimizu, Masataka Tatsumi, Naoto Yanai, Goichiro Hanaoka:
REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory. IEEE Access 12: 47359-47372 (2024) - [j31]Behrouz Zolfaghari, Mostafa Abbas Mollaei, Fahimeh Hajizadeh, Naoto Yanai, Khodakhast Bibak:
Secure UAV (Drone) and the Great Promise of AI. ACM Comput. Surv. 56(11): 286:1-286:37 (2024) - [j30]Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 203-217 (2024) - [j29]Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura:
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection. J. Inf. Process. 32: 298-307 (2024) - [j28]Takayuki Miura, Masanobu Kii, Toshiki Shibahara, Kazuki Iwahana, Tetsuya Okuda, Atsunori Ichikawa, Naoto Yanai:
SETSUBUN: Revisiting Membership Inference Game for Evaluating Synthetic Data Generation. J. Inf. Process. 32: 757-766 (2024) - [c46]Seiya Ookura, Hideharu Kojima, Naoto Yanai:
Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols. ICICT 2024: 462-467 - [c45]Takayuki Miura, Toshiki Shibahara, Naoto Yanai:
MEGEX: Data-Free Model Extraction Attack Against Gradient-Based Explainable AI. SecTL@AsiaCCS 2024: 56-66 - [e3]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [i15]Rashi Sharma, Hiroyuki Okada, Tatsumi Oba, Karthikk Subramanian, Naoto Yanai, Sugiri Pranata:
Decoding BACnet Packets: A Large Language Model Approach for Packet Interpretation. CoRR abs/2407.15428 (2024) - 2023
- [j27]Kazuhiko Minematsu, Junji Shikata, Yohei Watanabe, Naoto Yanai:
Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices. IEEE Access 11: 62955-62969 (2023) - [j26]Ouyang Junjie, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Shingo Okamura, Jason Paul Cruz:
APVAS: Reducing the Memory Requirement of AS_PATH Validation by Introducing Aggregate Signatures into BGPsec. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 170-184 (2023) - [j25]Koji Nakao, Katsunari Yoshioka, Takayuki Sasaki, Rui Tanabe, Xuping Huang, Takeshi Takahashi, Akira Fujita, Jun'ichi Takeuchi, Noboru Murata, Junji Shikata, Kazuki Iwamoto, Kazuki Takada, Yuki Ishida, Masaru Takeuchi, Naoto Yanai:
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware. IEICE Trans. Inf. Syst. 106(9): 1302-1315 (2023) - [j24]Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi, Jason Paul Cruz:
A Study on Quantized Parameters for Protection of a Model and Its Inference Input. J. Inf. Process. 31: 667-678 (2023) - [j23]Naoki Umeda, Taiji Kimura, Naoto Yanai:
The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment. IEEE Open J. Commun. Soc. 4: 269-306 (2023) - [c44]Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. APKC@AsiaCCS 2023: 21-32 - [c43]Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura:
JABBERWOCK: A Tool for WebAssembly Dataset Generation towards Malicious Website Detection. DSN-W 2023: 36-39 - [c42]Kazuki Iwahana, Naoto Yanai, Toru Fujiwara:
Backdoor Attacks Leveraging Latent Representation in Competitive Learning. ESORICS Workshops (2) 2023: 700-718 - [c41]Masahiro Kamimura, Kyosuke Yamashita, Naoto Yanai:
Generic Construction of Key-Aggregate Searchable Encryption. GeoPrivacy@SIGSPATIAL 2023: 1-4 - [c40]Yohei Watanabe, Naoto Yanai, Junji Shikata:
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures. ISPEC 2023: 105-122 - [c39]Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities. PerCom Workshops 2023: 92-97 - [c38]Janaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya, Harsha Kalutarage:
MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis. SEC 2023: 279-292 - [c37]Yumeki Goto, Tomoya Matsumoto, Hamada Rizk, Naoto Yanai, Hirozumi Yamaguchi:
Privacy-Preserving Taxi-Demand Prediction Using Federated Learning. SMARTCOMP 2023: 297-302 - [c36]Tomoya Matsumoto, Takayuki Miura, Naoto Yanai:
Membership Inference Attacks against Diffusion Models. SP (Workshops) 2023: 77-83 - [i14]Tomoya Matsumoto, Takayuki Miura, Naoto Yanai:
Membership Inference Attacks against Diffusion Models. CoRR abs/2302.03262 (2023) - [i13]Yumeki Goto, Nami Ashizawa, Toshiki Shibahara, Naoto Yanai:
Do Backdoors Assist Membership Inference Attacks? CoRR abs/2303.12589 (2023) - [i12]Yumeki Goto, Tomoya Matsumoto, Hamada Rizk, Naoto Yanai, Hirozumi Yamaguchi:
Privacy-Preserving Taxi-Demand Prediction Using Federated Learning. CoRR abs/2305.08107 (2023) - [i11]Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Kyosuke Yamashita, Shingo Okamura:
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts. CoRR abs/2306.04250 (2023) - [i10]Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura:
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection. CoRR abs/2306.05698 (2023) - 2022
- [j22]Kazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara:
SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning. J. Inf. Process. 30: 209-225 (2022) - [j21]Naoki Umeda, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Jason Paul Cruz, Shingo Okamura:
SQUAB: A Virtualized Infrastructure for BGP-related Experiments and Its Applications to Evaluation on BGPsec. J. Inf. Process. 30: 829-840 (2022) - [c35]Jason Paul Cruz, Naoto Yanai:
APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop. AsiaCCS 2022: 1261-1262 - [c34]Keitaro Watanabe, Hideharu Kojima, Yuichi Sudo, Naoto Yanai, Tatsuhiro Tsuchiya:
Implementation and Evaluation of Leader Election in the Population Protocol Model Using an Emulation Environment. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - [c33]Takumi Okano, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya:
Implementing Access Control in Chaincodes on Hyperledger Fabric with Attribute-Based Encryption. ICSA Companion 2022: 193-196 - [c32]Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi, Jason Paul Cruz:
MOTUS: How Quantized Parameters Improve Protection of Model and Its Inference Input. SecITC 2022: 184-202 - [e2]Jason Paul Cruz, Naoto Yanai:
APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022. ACM 2022, ISBN 978-1-4503-9174-0 [contents] - [i9]Yohei Watanabe, Naoto Yanai, Junji Shikata:
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures. CoRR abs/2208.03781 (2022) - 2021
- [j20]Kazuki Iwahana, Tatsuya Takemura, Ju Chien Cheng, Nami Ashizawa, Naoki Umeda, Kodai Sato, Ryota Kawakami, Rei Shimizu, Yuichiro Chinen, Naoto Yanai:
MADMAX: Browser-Based Malicious Domain Detection Through Extreme Learning Machine. IEEE Access 9: 78293-78314 (2021) - [j19]Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
RA: A Static Analysis Tool for Analyzing Re-Entrancy Attacks in Ethereum Smart Contracts. J. Inf. Process. 29: 537-547 (2021) - [j18]Yang Chen, Nami Ashizawa, Chai Kiat Yeo, Naoto Yanai, Seanglidet Yean:
Multi-scale Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for unsupervised intrusion detection. Knowl. Based Syst. 224: 107086 (2021) - [c31]Naoki Umeda, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Jason Paul Cruz, Shingo Okamura:
SQUAB: A Virtualized Infrastructure for Experiments on BGP and its Extensions. AINA (1) 2021: 600-613 - [c30]Yohei Watanabe, Naoto Yanai, Junji Shikata:
Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices. AINA (2) 2021: 679-690 - [c29]Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts. BSCI 2021: 47-59 - [c28]Yang Chen, Nami Ashizawa, Seanglidet Yean, Chai Kiat Yeo, Naoto Yanai:
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection. CCNC 2021: 1-6 - [c27]Kazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara:
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning. DPM/CBT@ESORICS 2021: 89-105 - [c26]Tatsuya Takemura, Naoto Yanai, Naoki Umeda, Masayuki Okada, Shingo Okamura, Jason Paul Cruz:
APVAS+: A Practical Extension of BGPsec with Low Memory Requirement. ICC 2021: 1-7 - [i8]Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts. CoRR abs/2101.02377 (2021) - [i7]Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima:
First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data. CoRR abs/2109.14857 (2021) - 2020
- [j17]Masahiro Kamimura, Naoto Yanai, Shingo Okamura, Jason Paul Cruz:
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation. IEEE Access 8: 24153-24169 (2020) - [j16]Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1367-1380 (2020) - [j15]Tatsuya Takemura, Naoto Yanai, Toru Fujiwara:
Model Extraction Attacks on Recurrent Neural Networks. J. Inf. Process. 28: 1010-1024 (2020) - [c25]Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
RA: Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis. Blockchain 2020: 327-336 - [c24]Hideharu Kojima, Naoto Yanai:
A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction. IPDPS Workshops 2020: 627-635 - [e1]Keita Emura, Naoto Yanai:
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020. ACM 2020, ISBN 978-1-4503-7607-5 [contents] - [i6]Tatsuya Takemura, Naoto Yanai, Toru Fujiwara:
Model Extraction Attacks against Recurrent Neural Networks. CoRR abs/2002.00123 (2020) - [i5]Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis. CoRR abs/2007.01029 (2020) - [i4]Yang Chen, Nami Ashizawa, Seanglidet Yean, Chai Kiat Yeo, Naoto Yanai:
Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection. CoRR abs/2008.12686 (2020) - [i3]Ouyang Junjie, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Shingo Okamura, Jason Paul Cruz:
APVAS: Reducing Memory Size of AS_PATH Validation by Using Aggregate Signatures. CoRR abs/2008.13346 (2020)
2010 – 2019
- 2019
- [j14]Hideharu Kojima, Naoto Yanai, Jason Paul Cruz:
ISDSR+: Improving the Security and Availability of Secure Routing Protocol. IEEE Access 7: 74849-74868 (2019) - [j13]Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Jason Paul Cruz, Shouei Ou, Takao Okubo:
Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache. IEEE Access 7: 74941-74960 (2019) - [j12]Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
MOBIUS: Model-Oblivious Binarized Neural Networks. IEEE Access 7: 139021-139034 (2019) - [c23]Hideharu Kojima, Naoto Yanai:
A State Space Reduction Method for Model Checking of Wireless Multi-Hop Network Routing Protocols Focusing on Topologies. CANDAR Workshops 2019: 14-20 - [c22]Hideharu Kojima, Naoto Yanai:
A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPIN. ISSRE Workshops 2019: 124-125 - [c21]Shinnosuke Shimizu, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya:
Implementation and Evaluation of ISDSR in Emulation Environments. WCNC 2019: 1-6 - [i2]Masahiro Kamimura, Naoto Yanai, Shingo Okamura, Jason Paul Cruz:
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation. CoRR abs/1908.11096 (2019) - 2018
- [j11]Jason Paul Cruz, Yuichi Kaji, Naoto Yanai:
RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 6: 12240-12251 (2018) - [j10]Naoto Yanai, Toru Fujiwara:
Tighter Reductions for Deterministic Identity-Based Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 64-76 (2018) - [j9]Naoto Yanai:
Meeting Tight Security for Multisignatures in the Plain Public Key Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1484-1493 (2018) - [j8]Thi Ngoc Diep Pham, Chai Kiat Yeo, Naoto Yanai, Toru Fujiwara:
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 67(1): 795-808 (2018) - [c20]Naoto Yanai, Jason Paul Cruz:
On Security of Anonymous Invitation-Based System. DPM/CBT@ESORICS 2018: 415-421 - [p1]Hikaru Kishimoto, Naoto Yanai, Shingo Okamura:
An Anonymous Authentication Protocol for the Smart Grid. Smart Micro-Grid Systems Security and Privacy 2018: 29-52 - [i1]Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
MOBIUS: Model-Oblivious Binarized Neural Networks. CoRR abs/1811.12028 (2018) - 2017
- [j7]Naoto Yanai, Tomoya Iwasaki, Masaki Inamura, Keiichi Iwamura:
Provably Secure Structured Signature Schemes with Tighter Reductions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1870-1881 (2017) - [j6]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2991-3006 (2017) - [j5]Hikaru Kishimoto, Naoto Yanai, Shingo Okamura:
SPaCIS: Secure Payment Protocol for Charging Information over Smart Grid. J. Inf. Process. 25: 12-21 (2017) - [c19]Hikaru Kishimoto, Naoto Yanai, Shingo Okamura:
An Anonymous Authentication Protocol for Smart Grid. AINA Workshops 2017: 62-67 - [c18]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide:
Identity-Based Key-Insulated Aggregate Signatures, Revisited. Inscrypt 2017: 141-156 - [c17]Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara:
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model. DPM/CBT@ESORICS 2017: 55-69 - [c16]Hideharu Kojima, Naoto Yanai:
Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi. CANDAR 2017: 230-236 - 2016
- [j4]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions. J. Inf. Process. 24(2): 275-291 (2016) - [c15]Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura:
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption. AINA 2016: 669-676 - [c14]Naoto Yanai:
Towards Provable Security of Dynamic Source Routing Protocol and Its Applications. ER Workshops 2016: 231-239 - [c13]Naoto Yanai:
On the Tightness of Deterministic Identity-Based Signatures. CANDAR 2016: 168-173 - [c12]Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Web security model with cache. ISITA 2016: 408-412 - [c11]Ryo Fukuyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Towards a formal foundation of protection against data-oriented attacks. ISITA 2016: 413-417 - [c10]Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
ISDSR: Secure DSR with ID-based Sequential Aggregate Signature. SECRYPT 2016: 376-387 - 2015
- [c9]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. AsiaJCIS 2015: 112-123 - [c8]Yuma Higashiyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones. CANDAR 2015: 89-95 - [c7]Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. INTRUST 2015: 32-48 - [c6]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. SECRYPT 2015: 39-52 - [c5]Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers. TrustCom/BigDataSE/ISPA (1) 2015: 1329-1336 - 2014
- [j3]Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto:
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles. J. Inf. Process. 22(2): 366-375 (2014) - [c4]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
A CDH-based ordered multisignature scheme in the standard model with better efficiency. ISITA 2014: 236-240 - 2013
- [c3]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. ISC 2013: 367-377 - 2012
- [j2]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54 (2012) - 2011
- [j1]Naoto Yanai, Eikoh Chida, Masahiro Mambo:
A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1346-1355 (2011) - [c2]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. INCoS 2011: 662-667 - 2010
- [c1]Naoto Yanai, Eikoh Chida, Masahiro Mambo:
A structured aggregate signature scheme. ISITA 2010: 795-800
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint