Masami Mohri

Orcid: 0000-0002-4644-4550

According to our database1, Masami Mohri authored at least 47 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Method for Solving Problems in Acquiring Communication Logs on End Hosts.
Digit., June, 2024

Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

2023
Investigations of Electronic Signatures for Construction of Trust Services.
IEICE Trans. Inf. Syst., September, 2023

2022
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV.
Future Internet, 2022

Multi-labeling with topic models for searching security information.
Ann. des Télécommunications, 2022

2021
Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time.
IEICE Trans. Inf. Syst., 2021

2020
Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports.
J. Inf. Process., 2020

A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packet.
Int. J. Distributed Sens. Networks, 2020

Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection.
IEEE Access, 2020

Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric.
IEEE Access, 2020

Stabilized Clustering Enabled V2V Communication in an NDN-SDVN Environment for Content Retrieval.
IEEE Access, 2020

Transparent Provable Data Possession Scheme for Cloud Storage.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Understanding Attack Trends from Security Blog Posts Using Guided-topic Model.
J. Inf. Process., 2019

Authentication Scheme Using Pre-Registered Information on Blockchain.
IEICE Trans. Inf. Syst., 2019

CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments.
IEICE Trans. Inf. Syst., 2019

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description.
IEICE Trans. Inf. Syst., 2019

A Malicious Web Site Identification Technique Using Web Structure Clustering.
IEICE Trans. Inf. Syst., 2019

A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Designing Authentication and Authorization System with Blockchain.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Modeling Attack Activity for Integrated Analysis of Threat Information.
IEICE Trans. Inf. Syst., 2018

Zero-Knowledge Identification Scheme Using LDPC Codes.
IEICE Trans. Inf. Syst., 2018

2017
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data.
IEICE Trans. Inf. Syst., 2017

Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior.
IEICE Trans. Inf. Syst., 2017

Delivering CRL with Low Bit Rate Network Coded Communication for ITS.
IEICE Trans. Inf. Syst., 2017

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage.
IEICE Trans. Inf. Syst., 2017

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services.
IEICE Trans. Inf. Syst., 2017

A multi-group signature scheme for local broadcasting.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Virtual storage and area limited data delivery over named data networking.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.
J. Inf. Process., 2016

Leveraging In-Network Caching in Vehicular Network for Content Distribution.
Int. J. Distributed Sens. Networks, 2016

SSL Client Authentication with TPM.
IEICE Trans. Inf. Syst., 2016

Cloud storage with key-value stores over content-centric networking architecture.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

2015
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search.
J. Inf. Process., 2015

Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating.
Hum. centric Comput. Inf. Sci., 2015

LCE in-network caching on vehicular networks for content distribution in urban environments.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Attribute Revocable Attribute-Based Encryption for Decentralized Disruption-Tolerant Military Networks.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Storage-Efficient Tree Structure with Level-Ordered Unary Degree Sequence for Packet Classification.
Proceedings of the Third International Symposium on Computing and Networking, 2015

A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Direct Accessible Filter Using Succinct Data Structure for Packet Filtering.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2012
On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Controlling signature verification of network coded packet on VANET.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

A distribution scheme of certificate revocation list by inter-vehicle communication using a random network coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

A reliability-based computation method for the weight distribution of LDPC codes using the probabilistic algorithm.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2009
A Probabilistic Algorithm for Computing the Weight Distribution of LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009


  Loading...