Ryo Nojima
Orcid: 0000-0002-2955-2920
According to our database1,
Ryo Nojima
authored at least 32 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
2023
Construction of a Support Tool for Japanese User Reading of Privacy Policies and Assessment of its User Impact.
IEICE Trans. Inf. Syst., May, 2023
Proc. Priv. Enhancing Technol., January, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
2022
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
2021
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
2020
Proceedings of the Advances in Information and Computer Security, 2020
2018
2016
J. Internet Serv. Inf. Secur., 2016
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Information and Communication Technology, 2015
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
IACR Cryptol. ePrint Arch., 2013
2010
IACR Cryptol. ePrint Arch., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security, 12th International Conference, 2009
2008
Des. Codes Cryptogr., 2008
2006
Proceedings of the Progress in Cryptology, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005