Hajime Watanabe
Orcid: 0000-0002-0011-1638
According to our database1,
Hajime Watanabe
authored at least 28 papers
between 1997 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection.
IEEE Access, 2018
2017
Mutual Authentication Protocol for HTTP: Cryptographic Algorithms Based on the Key Agreement Mechanism 3 (KAM3).
RFC, April, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
2014
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014
2013
Proceedings of the SECRYPT 2013, 2013
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
2008
Proceedings of the Advances in Information and Computer Security, 2008
2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field.
Proceedings of the Public Key Infrastructure, 2007
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
Proceedings of the Applied Algebra, 2007
2006
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
CoRR, 2006
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006
2003
A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized <i>c</i>-Secure CRT Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
Watermarking method for extracting embedded data without original image.
Proceedings of the Visual Communications and Image Processing 2002, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
1997
Proceedings of the Information and Communication Security, First International Conference, 1997