Masami Mohri
Orcid: 0000-0002-4644-4550
According to our database1,
Masami Mohri
authored at least 47 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Digit., June, 2024
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
2023
IEICE Trans. Inf. Syst., September, 2023
2022
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV.
Future Internet, 2022
Ann. des Télécommunications, 2022
2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021
2020
Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020
A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet.
Int. J. Distributed Sens. Networks, 2020
Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection.
IEEE Access, 2020
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric.
IEEE Access, 2020
Stabilized Clustering Enabled V2V Communication in an NDN-SDVN Environment for Content Retrieval.
IEEE Access, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
2019
J. Inf. Process., 2019
IEICE Trans. Inf. Syst., 2019
CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments.
IEICE Trans. Inf. Syst., 2019
Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019
IEICE Trans. Inf. Syst., 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
IEICE Trans. Inf. Syst., 2018
2017
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data.
IEICE Trans. Inf. Syst., 2017
Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.
J. Inf. Process., 2016
Int. J. Distributed Sens. Networks, 2016
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016
2015
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search.
J. Inf. Process., 2015
Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating.
Hum. centric Comput. Inf. Sci., 2015
LCE in-network caching on vehicular networks for content distribution in urban environments.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015
Storage-Efficient Tree Structure with Level-Ordered Unary Degree Sequence for Packet Classification.
Proceedings of the Third International Symposium on Computing and Networking, 2015
A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Proceedings of the Second International Symposium on Computing and Networking, 2014
2012
On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the 12th International Conference on ITS Telecommunications, 2012
A distribution scheme of certificate revocation list by inter-vehicle communication using a random network coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
A reliability-based computation method for the weight distribution of LDPC codes using the probabilistic algorithm.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009