Keiichi Iwamura
According to our database1,
Keiichi Iwamura
authored at least 109 papers
between 1992 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
2025
0
5
10
1
2
3
4
1
2
3
1
1
1
1
1
8
5
11
5
3
8
9
6
9
4
3
8
4
3
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation.
IEEE Access, 2025
2023
Privacy preserving multi-party multiplication of polynomials based on (k,n) threshold secret sharing.
ICT Express, October, 2023
Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing.
IEEE Access, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server.
IEEE Access, 2022
IEEE Access, 2022
Improvement of Privacy Prevented Person Tracking System using Artificial Fiber Pattern.
Proceedings of the 19th International Conference on Signal Processing and Multimedia Applications, 2022
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Round Color 2D Symbol with Display Area and Secret Data Area for Business-to-Consumer Applications.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
A Decentralized Machine Learning Scheme with Input Perturbation-Based Differential Privacy.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Performance of Federated Learning with Local Differential Privacy: Federation or Individualƒ.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords.
J. Inf. Secur. Appl., 2021
Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N=k Servers (Revised Version).
IACR Cryptol. ePrint Arch., 2021
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper).
IACR Cryptol. ePrint Arch., 2021
(Server-Aided) Two-Party Multiplication of Encrypted Shares Using (k, n) Threshold Secret Sharing With N ≥ k Servers.
IEEE Access, 2021
Proceedings of the 18th International Conference on Signal Processing and Multimedia Applications, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k Servers.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
A Supply Chain Management System to Prevent Counterfeiting and Trace Different Transactions Instead of using PUF Device.
Proceedings of the 18th International Conference on e-Business, 2021
2020
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
New Approach to Dishonest-Majority Secure Multiparty Computation for Malicious Adversaries when n < 2k - 1.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020
Secure and Efficient Outsourcing of Matrix Multiplication based on Secret Sharing Scheme using only One Server.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
An AODV-Based Communication-Efficient Secure Routing Protocol for Large Scale Ad-Hoc Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
Proceedings of the AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, 2020
Detecting Discrete Cosine Transform-Based Digital Watermarking Insertion Area Using Deep Learning.
Proceedings of the AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2019
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018
Detection of Human Motion Gestures Using Machine Learning for Actual Emergency Situations.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper).
IACR Cryptol. ePrint Arch., 2017
Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Privacy-protected video surveillance in crowded environments using robust watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition.
Entropy, 2015
Proceedings of the SIGMAP 2015, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the ICE-B 2015, 2015
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014
2013
Content Approval Systems with Expansions of a New Pair-Connected-Structured Aggregate Signature Scheme.
Int. J. E Entrepreneurship Innov., 2013
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
J. Information Security, 2012
A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
An improvement of insertion/deletion/substitution error correction capabilities of LDPC codes using slide decoding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Information Hiding Based on a Single Dot Pattern Method with Improved Extraction and Robustness against Foreground Objects.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Information Hiding Based on the Artificial Fiber Pattern with Improved Robustness against Foregound Objects.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block Cipher.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern.
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2008
A Study of Information Hiding Performance Using Simple Dot Pattern with Different Tile Sizes.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Information Hiding Method Utilizing Low Visible Natural Fiber Pattern for Printed Documents.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
1995
IEEE Trans. Computers, 1995
1992
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992