Ken Naganuma

According to our database1, Ken Naganuma authored at least 15 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Biometric Authentication Service on Smart Contract.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

ContractSafeguard: Practical Bug Bounty Platform for Smart Contracts with Intel SGX.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

2020
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Definition and Efficient Construction of Encrypted k-anonymization Scheme.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem.
Proceedings of the Advances in Information and Computer Security, 2018

Decentralized Netting Protocol over Consortium Blockchain.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
Proceedings of the Information Security Practice and Experience, 2017

Auditable Zerocoin.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2013
How to Evaluate Contents Popularity over Oblivious Transfer.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

2012
Unconditionally provably secure cancellable biometrics based on a quotient polynomial ring.
IET Biom., 2012

Symmetric Inner-Product Predicate Encryption Based on Three Groups.
Proceedings of the Provable Security - 6th International Conference, 2012

Upper bound of the shortest vector coefficients and its applications.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Symmetric Searchable Encryption for Database Applications.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011


  Loading...