Junpei Kawamoto

According to our database1, Junpei Kawamoto authored at least 28 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019

2018
Detecting Anomalous Reviewers and Estimating Summaries from Early Reviews Considering Heterogeneity.
IEICE Trans. Inf. Syst., 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017

Improving the accuracy of signature authentication using the eight principles of Yong.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Host independent and distributed detection system of the network attack by using OpenFlow.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Behavior-Based Method for Detecting DNS Amplification Attacks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Cyberbullying detection using parent-child relationship between comments.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Cross-group Secret Sharing for Secure Cloud Storage Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

An implementation of privacy preserving stream integration system.
Proceedings of the 2016 International Conference on Information Networking, 2016

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Locality Sensitive Hashing Filter for Encrypted Vector Databases.
Fundam. Informaticae, 2015

Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015

Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015

Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Identity-Embedding Method for Decentralized Public-Key Infrastructure.
Proceedings of the Trusted Systems - 6th International Conference, 2014

A method of digital rights management based on Bitcoin protocol.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Privacy-aware cloud-based input method editor.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Frequency-based constraint relaxation for private query processing in cloud databases.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

A Parameterless Learning Algorithm for Behavior-Based Detection.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2011
Private range query by perturbation and matrix based encryption.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

A Bipartite Graph Model and Mutually Reinforcing Analysis for Review Sites.
Proceedings of the Database and Expert Systems Applications, 2011

2009
Security of social information from query analysis in DaaS.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009

2008
Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

2007
ReCQ: Real-World Context-Aware Querying.
Proceedings of the Modeling and Using Context, 2007


  Loading...