Hideaki Sone
Orcid: 0000-0002-9395-9987
According to our database1,
Hideaki Sone
authored at least 81 papers
between 1997 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021
New Gener. Comput., 2021
Proceedings of the WALCOM: Algorithms and Computation, 2021
Proceedings of the International Conference on Information and Communication Technologies for Disaster Management, 2021
Proceedings of the 10th International Conference on Fun with Algorithms, 2021
Proceedings of the Computer Science - Theory and Applications, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
Theor. Comput. Sci., 2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Theory and Practice of Natural Computing - 8th International Conference, 2019
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Proceedings of the Information Security Practice and Experience, 2019
Sharing Information to Eliminate Support Irregularities and Omissions: - Cases from Disaster Information Supporters in Japan -.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019
Proceedings of the Combinatorial Optimization and Applications, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the WALCOM: Algorithms and Computation - 12th International Conference, 2018
Proceedings of the Unconventional Computation and Natural Computation, 2018
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2018
Proceedings of the 9th International Conference on Fun with Algorithms, 2018
Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.
Proceedings of the Combinatorial Optimization and Applications, 2018
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the Theory and Practice of Natural Computing - 5th International Conference, 2016
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Theory and Practice of Natural Computing, 2015
Proceedings of the Theory and Applications of Models of Computation, 2015
Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis.
Proceedings of the 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2015
Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable.
IEICE Trans. Electron., 2014
Minimizing ESCT forms for two-variable multiple-valued input binary output functions.
Discret. Appl. Math., 2014
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEICE Trans. Electron., 2013
Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard.
IEICE Trans. Commun., 2013
Proceedings of the Unconventional Computation and Natural Computation, 2013
Proceedings of the Theory and Practice of Natural Computing, 2013
Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
2012
IEICE Trans. Electron., 2012
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012
Flexible Access Control Framework Considering IdP-Side's Authorization Policy in Roaming Environment.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Implementation and Evaluation of an OpenFlow-Based Access Control System for Wireless LAN Roaming.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Int. J. Found. Comput. Sci., 2011
Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector.
IEICE Trans. Electron., 2011
IEICE Trans. Electron., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
2010
Centralized Authentication System for Location Privacy Protection and Low Operational Cost of Large Scale WLAN Roaming.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Teaching Internet Safety at Universities using "Hikari & Tsubasa's Information Security Game".
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010
2009
Inf. Process. Lett., 2009
The Effect of Position of a Connector Contact Failure on Electromagnetic Near-Field around a Coaxial Cable.
IEICE Trans. Commun., 2009
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009
2008
Fundamental Measurement of Electromagnetic Field Radiated from a Coaxial Transmission Line Caused by Connector Contact Failure.
IEICE Trans. Electron., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
2007
J. Circuits Syst. Comput., 2007
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the Combinatorial Optimization and Applications, 2007
2006
IEICE Trans. Electron., 2006
Proceedings of the Theory and Applications of Models of Computation, 2006
2005
Relationship between Length and Diameter of Contact Bridge Formed under Thermal Equilibrium Condition.
IEICE Trans. Electron., 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
1997
Divide and Conquer Technique for Network Fault Management.
Proceedings of the Integrated Network Management V, 1997