Nori Matsuda

According to our database1, Nori Matsuda authored at least 18 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Your Health Is Leaked: PPG Waveform Reconstruction Using Stealthily Recorded Physiological Signals.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

2022
Proposal of anonymization dictionary using disclosed statements by business operators.
Internet Things, 2022

Identification of PPG Measurement Sites Toward Countermeasures Against Biometric Presentation Attacks.
IEEE Access, 2022

Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential.
Proceedings of the Advances in Network-Based Information Systems, 2022

2021
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

2020
Public-key Searchable Encryption with Index Generation for Shared Database.
J. Inf. Process., 2020

2018
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
J. Inf. Process., 2018

2017
On methods for privacy-preserving energy disaggregation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016

A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2013
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation.
J. Inf. Process., 2012

Homomorphic encryption based cancelable biometrics secure against replay and its related attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2005
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

1997
Efficient construction of secure hyperelliptic discrete logarithm problems.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...