Junpei Kawamoto
According to our database1,
Junpei Kawamoto
authored at least 28 papers
between 2007 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019
2018
Detecting Anomalous Reviewers and Estimating Summaries from Early Reviews Considering Heterogeneity.
IEICE Trans. Inf. Syst., 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017
Improving the accuracy of signature authentication using the eight principles of Yong.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Host independent and distributed detection system of the network attack by using OpenFlow.
Proceedings of the 2017 International Conference on Information Networking, 2017
2016
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
Fundam. Informaticae, 2015
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015
Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Frequency-based constraint relaxation for private query processing in cloud databases.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2011
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011
Proceedings of the Database and Expert Systems Applications, 2011
2009
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009
2008
Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
2007
Proceedings of the Modeling and Using Context, 2007