This webpage may contain errors. Please do NOT trust the following list, although the maintainer has tried his best to correct the mistakes. If you find an error, please contact the maintainer via email at “contact [at] ishikawa.cc”.

Highly contributed researchers

In recent 10 years: Naofumi Homma (3) / Takao Murakami (3) / Minoru Kuribayashi (3) / Norio Shiratori (3)

Since 2006: Minoru Kuribayashi (4)

Naofumi Homma (3) / Takao Murakami (3) / Norio Shiratori (3)

Statistics

APAS: Application-Specific Accelerators for RLWE-Based Homomorphic Linear Transformations

Authors: Song Bian, Dur-e-Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato

Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation

Authors: Teruo M. Maruyama, Luiz S. Oliveira, Alceu S. Britto Jr., Robert Sabourin

Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE

Authors: Ville Yli-Myry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma

Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems

Authors: Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori

DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code

Authors: Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo

Atomos: Constant-Size Path Validation Proof

Authors: Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren

Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks

Authors: Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori

Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy

Authors: Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen

Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems

Authors: Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, Norio Shiratori

Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System

Authors: Yue Zheng, Xiaojin Zhao, Takashi Sato, Yuan Cao, Chip-Hong Chang

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Authors: Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai

In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication

Authors: Takashi Nakamura, Valentin Goverdovsky, Danilo P. Mandic

Visual Secret Sharing Schemes Encrypting Multiple Images

Authors: Manami Sasaki and Yodai Watanabe

Wiretap Channels With One-Time State Information: Strong Secrecy

Authors: Te Sun Han, Hiroyuki Endo, Masahide Sasaki

Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials

Authors: Ajita Rattani, Walter J. Scheirer, Arun Ross

Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent

Authors: Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki

Guest Editorial: Special issue on intelligent video surveillance for public security and personal privacy

Authors: Noboru Babaguchi, Andrea Cavallaro, Rama Chellappa, Frdric Dufaux, Liang Wang

Monitoring Integrity Using Limited Local Memory

Authors: Yuki Kinebuchi, Shakeel Butt, Vinod Ganapathy, Liviu Iftode, Tatsuo Nakajima

On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels

Authors: Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai

Erratum to "Soft Biometric Traits for Continuous User Authentication"

Authors: Koichiro Niinuma, Unsang Park, Anil K. Jain

Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems

Authors: Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka

Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems

Authors: Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, Joo Barros

High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators

Authors: Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, Riccardo Leonardi

Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme

Authors: Minoru Kuribayashi and Hiroshi Kato

Soft Biometric Traits for Continuous User Authentication

Authors: Koichiro Niinuma, Unsang Park, Anil K. Jain

Network-based traitor-tracing technique using traffic pattern

Authors: Hidehisa Nakayama, Abbas Jamalipour, Nei Kato

Key extraction from general nondiscrete signals

Authors: Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric

A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification

Authors: Daigo Muramatsu, Mitsuru Kondo, Masahiro Sasaki, Satoshi Tachibana, Takashi Matsumoto