default search action
Akira Kanaoka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Akira Kanaoka, Takamasa Isohara:
Enhancing Smishing Detection in AR Environments: Cross-Device Solutions for Seamless Reality. VR Workshops 2024: 565-572 - 2023
- [c32]Daiki Ishii, Akira Kanaoka:
Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring. EuroUSEC 2023: 218-223 - [c31]Kazutoshi Itoh, Akira Kanaoka:
Survey of Services that Store Passwords in a Recoverable Manner. HCI (35) 2023: 68-77 - [c30]Akira Kanaoka:
(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy. HCI (35) 2023: 78-89 - [c29]Shodai Kurasaki, Akira Kanaoka:
Analysis of Country and Regional User Password Characteristics in Dictionary Attacks. HCI (35) 2023: 656-671 - [c28]Mayu Fujita, Shodai Kurasaki, Akira Kanaoka:
Securing Cross Reality: Unraveling the Risks of 3D Object Disguise on Head Mount Display. IoT 2023: 281-286 - 2021
- [c27]Michihiro Nakayama, Akira Kanaoka:
Risk Assessment of "Ostrich ZIP". HCI (27) 2021: 76-90 - 2020
- [j12]Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). Int. J. Inf. Sec. 19(1): 15-38 (2020) - [j11]Akira Kanaoka:
Editor's Message to Special Issue of Usable Security. J. Inf. Process. 28: 1008-1009 (2020) - [c26]Akihiro Tachikawa, Akira Kanaoka:
Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions. HCI (30) 2020: 652-670 - [e1]Kazumaro Aoki, Akira Kanaoka:
Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings. Lecture Notes in Computer Science 12231, Springer 2020, ISBN 978-3-030-58207-4 [contents]
2010 – 2019
- 2019
- [j10]Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. J. Inf. Process. 27: 593-602 (2019) - [j9]Hironori Imai, Akira Kanaoka:
Chronological Analysis of Source Code Reuse Impact on Android Application Security. J. Inf. Process. 27: 603-612 (2019) - [j8]Tatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka:
Helping Johnny to Search: Usable Encrypted Search on Webmail System. J. Inf. Process. 27: 763-772 (2019) - [c25]Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka:
Password Strength Measurement without Password Disclosure. AsiaJCIS 2019: 157-164 - 2018
- [c24]Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. ACISP 2018: 341-359 - [c23]Hironori Imai, Akira Kanaoka:
Time Series Analysis of Copy-and-Paste Impact on Android Application Security. AsiaJCIS 2018: 15-22 - [c22]Tatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka:
Helping Johnny to Search: Encrypted Search on Webmail System. AsiaJCIS 2018: 47-53 - [c21]Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. COMPSAC (2) 2018: 713-718 - 2017
- [j7]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. J. Inf. Secur. Appl. 34: 84-91 (2017) - [c20]Soushirou Sakumoto, Akira Kanaoka:
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation. AsiaJCIS 2017: 15-22 - [c19]Masahito Ando, Masayuki Okada, Akira Kanaoka:
Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology. AsiaJCIS 2017: 75-82 - [c18]Wakana Omori, Akira Kanaoka:
Efficient Secure Arithmetic on Floating Point Numbers. NBiS 2017: 924-934 - 2016
- [j6]Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi:
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation. IEEE Trans. Emerg. Top. Comput. 4(1): 88-101 (2016) - 2015
- [j5]Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. J. Inf. Process. 23(5): 613-622 (2015) - [c17]Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation. AsiaJCIS 2015: 77-84 - [c16]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
A KEM/DEM-Based Construction for Secure and Anonymous Communication. COMPSAC Workshops 2015: 680-681 - 2014
- [j4]Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Transparent Probabilistic Packet Marking. J. Inf. Process. 22(4): 609-616 (2014) - [c15]Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. AsiaJCIS 2014: 31-38 - [c14]Takeshi Takahashi, Koji Nakao, Akira Kanaoka:
Data Model for Android Package Information and Its Application to Risk Analysis System. WISCS@CCS 2014: 71-80 - [c13]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Building secure and anonymous communication channel: formal model and its prototype implementation. SAC 2014: 1641-1648 - [c12]Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Akira Kanaoka, Yuuki Takano, Shin'ichiro Matsuo:
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme. SERVICES 2014: 121-128 - [c11]Yohtaro Miyanishi, Akira Kanaoka, Fumiaki Sato, Xiaogong Han, Shinji Kitagami, Yoshiyori Urano, Norio Shiratori:
New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services. UIC/ATC/ScalCom 2014: 859-866 - [c10]Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson:
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection. WISTP 2014: 108-123 - [i2]Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi:
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation. CoRR abs/1403.7014 (2014) - 2013
- [j3]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. Inf. Media Technol. 8(4): 1251-1258 (2013) - [j2]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. J. Inf. Process. 21(4): 632-639 (2013) - [c9]Takeshi Takahashi, Keita Emura, Akira Kanaoka, Shin'ichiro Matsuo, Tadashi Minowa:
Risk visualization and alerting system: architecture and proof-of-concept implementation. SESP@CCS Asia 2013: 3-10 - [c8]Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
A Device for Transparent Probabilistic Packet Marking. COMPSAC Workshops 2013: 242-247 - [c7]Wakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin'ichiro Matsuo:
Toward Practical Searchable Symmetric Encryption. IWSEC 2013: 151-167 - [c6]Yusuke Niwa, Akira Kanaoka, Eiji Okamoto:
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure. NBiS 2013: 105-112 - 2012
- [c5]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Discovery of Unexpected Services and Communication Paths in Networked Systems. SafeConfig 2012: 169-178 - [c4]Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto:
Tracing Advanced Persistent Threats in Networked Systems. SafeConfig 2012: 179-187 - 2011
- [c3]Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, Eiji Okamoto:
32-bit as Number Based IP Traceback. IMIS 2011: 628-633 - 2010
- [j1]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [c2]Toshiki Harada, Akira Kanaoka, Eiji Okamoto, Masahiko Kato:
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS. SAINT 2010: 367-370
2000 – 2009
- 2008
- [i1]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2008: 280 (2008) - 2003
- [c1]Akira Kanaoka, Eiji Okamoto:
Multivariate Statistical Analysis of Network Traffic for Intrusion Detection. DEXA Workshops 2003: 472-476
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint