Mitsuhiro Hattori

According to our database1, Mitsuhiro Hattori authored at least 17 papers between 1972 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Proposal of anonymization dictionary using disclosed statements by business operators.
Internet Things, 2022

2021
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

2020
Public-key Searchable Encryption with Index Generation for Shared Database.
J. Inf. Process., 2020

Basic Idea of Quadrant Dynamic Programming for Adaptive Cruise Control to Create Energy Efficient Velocity Trajectory of Electric Vehicle.
Proceedings of the 16th IEEE International Workshop on Advanced Motion Control, 2020

2018
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
J. Inf. Process., 2018

2017
On methods for privacy-preserving energy disaggregation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016

2013
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation.
J. Inf. Process., 2012

Homomorphic encryption based cancelable biometrics secure against replay and its related attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2005
Complexity of Differential Attacks on SHA-0 with Various Message Schedules.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules.
IACR Cryptol. ePrint Arch., 2004

2003
Analysis of Double Block Length Hash Functions.
Proceedings of the Cryptography and Coding, 2003

1972
MPGS: a high-level language for microprogram generating system.
Proceedings of the ACM annual conference, 1972


  Loading...