Hidehito Gomi

Orcid: 0000-0002-6265-1752

According to our database1, Hidehito Gomi authored at least 23 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
User Verification System using Location-based Dynamic Questions for Account Recovery.
Proceedings of the IEEE Security and Privacy, 2024

2023
Mechanisms to Address Different Privacy Requirements for Users and Locations.
IEICE Trans. Inf. Syst., December, 2023

Enhancing Account Recovery with Location-based Dynamic Questions.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Indoor Localization with Passerby Data in Parasitic Approach.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Mitigating Privacy Vulnerability Caused by Map Asymmetry.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

2021
Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Parasitic Location Logging: Estimating Users' Location from Context of Passersby.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications, 2020

Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Context-Aware Authentication Using Co-Located Devices.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Continuous Authentication System Using Online Activities.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Symbiotic Construction of Individual's Rich Location Dataset.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

2017
Towards authentication using multi-modal online activities.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

2012
Policy Provisioning and Its Access Control Beyond Administrative and Collaborative Domains.
J. Inf. Process., 2012

Authentication Trust Metric and Assessment for Federated Identity Management Systems.
IEICE Trans. Inf. Syst., 2012

2011
Access Control Model and Design for Delegation Using Authorization Tokens.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Data and Access Management using Access Tokens for Delegating Authority to Persons and Software.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Dynamic Identity Delegation Using Access Tokens in Federated Environments.
Proceedings of the IEEE International Conference on Web Services, 2011

2010
An Authentication Trust Metric for Federated Identity Management Systems.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Policy Provisioning for Distributed Identity Management Systems.
Proceedings of the Policies and Research in Identity Management, 2010

2009
User-centric identity governance across domain boundaries.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2007
Session Management for Cross-protocol Identity Federation.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

2005
A delegation framework for federated identity management.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

2003


  Loading...