Hidema Tanaka
Orcid: 0000-0001-8316-5529
According to our database1,
Hidema Tanaka
authored at least 67 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Information Systems Security - 20th International Conference, 2024
2023
Proceedings of the Codes, Cryptology and Information Security, 2023
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers.
J. Inf. Process., 2022
EURASIP J. Inf. Secur., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
2021
SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors.
Internet Things, 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Information Systems Security - 17th International Conference, 2021
2020
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.
Proceedings of the Information Systems Security - 16th International Conference, 2020
2019
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication Environment.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017
2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Throughput and Power Efficiency Evaluation of Block Ciphers on Kepler and GCN GPUs Using Micro-Benchmark Analysis.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the First International Symposium on Computing and Networking, 2013
2012
A Correlation Power Analysis Countermeasure for Enocoro-128 v2 Using Random Switching Logic.
Proceedings of the Third International Conference on Networking and Computing, 2012
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels.
Proceedings of the ARES 2010, 2010
2009
2008
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest.
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.
Proceedings of the Information Systems Security, Third International Conference, 2007
2005
Proceedings of the Progress in Cryptology, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
2003
Proceedings of the Applied Algebra, 2003
2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack.
Proceedings of the Information Security and Cryptology, 2000
1999
Proceedings of the Applied Algebra, 1999
1997
Proceedings of the Information Security, First International Workshop, 1997