Hitoshi Fuji

According to our database1, Hitoshi Fuji authored at least 17 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages.
J. Inf. Process., 2019

2018
Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Secure Visible Light Communication Business Architecture Based on Federation of ID Management.
Proceedings of the Advances in Network-Based Information Systems, 2018

Proposal of Secure Business Architecture by Visible Light Communication System.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

Abnormal vehicle behavior induced using only fabricated informative CAN messages.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Automotive Attacks and Countermeasures on LIN-Bus.
J. Inf. Process., 2017

Buffer overflow attack with multiple fault injection and a proven countermeasure.
J. Cryptogr. Eng., 2017

2016
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
IACR Cryptol. ePrint Arch., 2016

2015
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2005
Detecting DDoS Attacks by Analyzing Client Response Patterns.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

2003
A countermeasure againstDDOS attacks using active networks technologies.
Ann. des Télécommunications, 2003

2002
Consideration of EVMS Technique Application to Software Development.
Proceedings of the Software Quality, 2002

2000
A proposal on FlexibleCUG service architecture.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000


  Loading...