FPGA and ASIC implementations of the ηT pairing in characteristic three JL Beuchat, H Doi, K Fujita, A Inomata, P Ith, A Kanaoka, M Katouno, ... Computers & electrical engineering 36 (1), 73-87, 2010 | 32 | 2010 |
Toward practical searchable symmetric encryption W Ogata, K Koiwa, A Kanaoka, S Matsuo Advances in Information and Computer Security: 8th International Workshop on …, 2013 | 31 | 2013 |
Secure and anonymous communication technique: Formal model and its prototype implementation K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015 | 27 | 2015 |
New methods to ensure security to increase user's sense of safety in cloud services Y Miyanishi, A Kanaoka, F Sato, X Han, S Kitagami, Y Urano, N Shiratori 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 …, 2014 | 26 | 2014 |
Multivariate statistical analysis of network traffic for intrusion detection A Kanaoka, E Okamoto 14th International Workshop on Database and Expert Systems Applications …, 2003 | 23 | 2003 |
Risk visualization and alerting system: Architecture and proof-of-concept implementation T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa Proceedings of the first international workshop on Security in embedded …, 2013 | 19 | 2013 |
Building secure and anonymous communication channel: Formal model and its prototype implementation K Emura, A Kanaoka, S Ohta, T Takahashi Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1641-1648, 2014 | 18 | 2014 |
Identifying potentially-impacted area by vulnerabilities in networked systems using CVSS T Harada, A Kanaoka, E Okamoto, M Kato 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010 | 17 | 2010 |
32-bit AS number based IP Traceback M Okada, Y Katsuno, A Kanaoka, E Okamoto 2011 Fifth International Conference on Innovative Mobile and Internet …, 2011 | 16 | 2011 |
Tracing advanced persistent threats in networked systems M Kato, T Matsunami, A Kanaoka, H Koide, E Okamoto Automated Security Management, 179-187, 2013 | 14 | 2013 |
IEICE Technical Report H Tahara, K Iwanaga, M Hirano, R Baba, T Sagara, H Murakami, ... | 12 | 1971 |
Key-updatable public-key encryption with keyword search: Models and generic constructions H Anada, A Kanaoka, N Matsuzaki, Y Watanabe Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 11 | 2018 |
A KEM/DEM-based construction for secure and anonymous communication K Emura, A Kanaoka, S Ohta, T Takahashi 2015 IEEE 39th Annual Computer Software and Applications Conference 3, 680-681, 2015 | 11 | 2015 |
Time series analysis of copy-and-paste impact on Android application security H Imai, A Kanaoka 2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 15-22, 2018 | 10 | 2018 |
安全なネットワークシステム設計のためのマルチレイヤネットワークモデルの提案と応用 金岡晃, 原田敏樹, 加藤雅彦, 勝野恭治, 岡本栄司 情報処理学会論文誌 51 (9), 1726-1735, 2010 | 10 | 2010 |
Extraction of parameters from well managed networked system in access control A Kanaoka, M Katoh, N Toudou, E Okamoto 2009 Fourth International Conference on Internet Monitoring and Protection …, 2009 | 10 | 2009 |
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments) H Anada, A Kanaoka, N Matsuzaki, Y Watanabe International Journal of Information Security 19 (1), 15-38, 2020 | 9 | 2020 |
Probabilistic packet marking method considering topology property for efficiently re-building dos attack paths A Kanaoka, M Okada, Y Katsuno, E Okamoto 情報処理学会論文誌ジャーナル (CD-ROM) 52 (3), 929-939, 2011 | 9 | 2011 |
Helping johnny to search: Encrypted search on webmail system T Midorikawa, A Tachikawa, A Kanaoka 2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 47-53, 2018 | 8 | 2018 |
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation K Emura, A Kanaoka, S Ohta, T Takahashi Journal of Information Security and Applications 34, 84-91, 2017 | 8 | 2017 |