Akira Kanaoka
Orcid: 0000-0002-3886-5128
According to our database1,
Akira Kanaoka
authored at least 44 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing Smishing Detection in AR Environments: Cross-Device Solutions for Seamless Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024
Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
2023
Securing Cross Reality: Unraveling the Risks of 3D Object Disguise on Head Mount Display.
Proceedings of the 13th International Conference on the Internet of Things, 2023
Analysis of Country and Regional User Password Characteristics in Dictionary Attacks.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring.
Proceedings of the 2023 European Symposium on Usable Security, 2023
2021
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021
2020
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
Int. J. Inf. Sec., 2020
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020
2019
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.
J. Inf. Process., 2019
J. Inf. Process., 2019
J. Inf. Process., 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
J. Inf. Secur. Appl., 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016
2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014
Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014
Data Model for Android Package Information and Its Application to Risk Analysis System.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014
2013
J. Inf. Process., 2013
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
2010
FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003