Kazuto Ogawa
Orcid: 0000-0002-4999-3790
According to our database1,
Kazuto Ogawa
authored at least 47 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023
2022
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
IEICE Trans. Inf. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
2019
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019
Privacy Preserving System for Real-Time Enriched-Integrated Service with Feedback to Providers.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
2016
IEICE Trans. Inf. Syst., 2016
2015
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption.
IEEE Trans. Consumer Electron., 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the IEEE International Conference on Consumer Electronics, 2015
Proceedings of the IEEE International Conference on Consumer Electronics, 2015
Proceedings of the 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Application Authentication for Hybrid Services of Broadcasting and Communications Networks.
Proceedings of the Information Security Applications - 12th International Workshop, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Provable Security - 4th International Conference, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Public Key Infrastructure, 2008
2007
IEICE Trans. Inf. Syst., 2007
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Anonymous Prepaid Content Viewing System with Mobile Terminal.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
Proceedings of the Applied Algebra, 2007
2006
Flexible License Transfer System Using Mobile Terminal.
Proceedings of the SECRYPT 2006, 2006
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003