Ryôichi Sasaki

According to our database1, Ryôichi Sasaki authored at least 77 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancement of a Company-Wide Information Security Management System Through Incident Learning.
SN Comput. Sci., May, 2023

Reconsideration of Risk Communication and Risk Assessment Support Methods for Security.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

AI and Security - What Changes with Generative AI.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

An Ontology-Based Framework for Medical IoT Forensic Evidence.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Trial of Risk Assessment for Business Application of Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2022
Trial Application of Risk Assessment Method for Metaverse.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Analyzing Metadata in PDF Files Published by Police Agencies in Japan.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
Application of Risk Assessment Method to Local Government Security Models.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST).
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Towards a Holistic Approach to Medical IoT Forensics.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

CySec: Cybersecurity Review Program for Professionals in Japan.
Proceedings of the Advances in Networked-Based Information Systems, 2020

2018
A Mixed Content Awareness Tool for Safe Browsing.
J. Comput., 2018

Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

Message from the CFSE 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

An Assurance Case Approach for Software Code Security.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

2017
Malware Behavior Ontology for Digital Evidence.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Autonomous and distributed internet security (AIS) infrastructure for safe internet.
Proceedings of the 8th International Conference on the Network of the Future, 2017

2016
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Message from the CFSE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Chance-Constrained Programming Method of IT Risk Countermeasures for Social Consensus Making.
IEEE Trans. Syst. Man Cybern. Syst., 2015

Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network.
Proceedings of the Fourth International Conference on Cyber Security, 2015

Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation.
Proceedings of the Fourth International Conference on Cyber Security, 2015

Study on Countermeasures Using Mitigation Software against Vulnerability Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

Development of Intellectual Network Forensic System LIFT against Targeted Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

Evaluation of a Risk-Based Management Method for Online Accounts.
Proceedings of the Fourth International Conference on Cyber Security, 2015

Fog Computing: Issues and Challenges in Security and Forensics.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT Risks.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Message from the CFSE 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a Botnet.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Proposal of Collaborative Learning Support Method in Risk Communications.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Tools, 2014

Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of Evidence.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5).
NII Shonan Meet. Rep., 2013

Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Chance-Constrained Programming Method by Constraints Aggregation for Social Consensus Making on IT Risk Countermeasure.
Proceedings of the IEEE International Conference on Systems, 2013

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Considerations on Risk Communication for IT Systems and Development of Support Systems.
J. Inf. Process., 2012

Message from the guest editors.
Int. J. Inf. Sec., 2012

Approximation method for chance-constrained programming of social consensus formation concerning IT risk countermeasure.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy Protection.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Development of digital forensics practice and research in Japan.
Wirel. Commun. Mob. Comput., 2011

Development and Evaluation of Defaced Sites Automatic Detection System DICE.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser.
Proceedings of the Sixth International Conference on Availability, 2011

Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures.
Proceedings of the Sixth International Conference on Availability, 2011

2010
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery.
J. Digit. Forensics Secur. Law, 2010

Social consensus making support system by qualitative and quantitative hybrid simulation.
Proceedings of the IEEE International Conference on Systems, 2010

A consensus support system for deciding a combination of risk-reducing plans under uncertain parameters.
Proceedings of the IEEE International Conference on Systems, 2010

A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Security Evaluation of Biometrics Authentications for Cellular Phones.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Implementing Boot Control for Windows Vista.
Proceedings of the Advances in Digital Forensics V, 2009

Proposal and Implementation of SSH Client System Using Ajax.
Proceedings of the Software Services for e-Business and e-Society, 2009

2008
A Proposal of Falsification Detection System in Structural Design.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Using Boot Control to Preserve the Integrity of Evidence.
Proceedings of the Advances in Digital Forensics IV, 2008

A View Management Method for Mobile Mixed Reality Systems.
Proceedings of the 14th Eurographics Symposium on Virtual Environments, 2008

2007
Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Proposal of Digital Forensic System Using Security Device and Hysteresis Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Evaluation of the Participant-Support Method for Information Acquisition in the "Multiplex Risk Communicator".
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007

Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence.
Proceedings of the Future Generation Communication and Networking, 2007

2006
A Digital Document Flexible Sanitizing Scheme.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Proposal of Risk Communications Supporting Method in Multiplex Risk Communicator.
Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, 2006

2005
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

Development Concept for and Trial Application of a "Mulutiplex Risk Communicator".
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

2002
Legally Authorized and Unauthorized Digital Evidence.
Proceedings of the Security Protocols, 2002

Combinatorial Optimization of Countermeasures against Illegal Copying.
Proceedings of the Security Protocols, 2002

2001
A Multi-OS Approach to Trusted Computer Systems.
Proceedings of the Security Protocols, 2001

2000
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis.
Proceedings of the Security Protocols, 2000

Internet-Marks: the secure seal for WWW site authentication.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

Seamless Object Authentication in Different Security Policy Domains.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

1999
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.
Proceedings of the Security Protocols, 1999

1998
Secure Fingerprinting Using Public-Key Cryptography (Position Paper).
Proceedings of the Security Protocols, 1998

Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

1991
Development and Performance Evaluation of Point to Multipoint Communication Control Scheme Via Satellite.
Perform. Evaluation, 1991

1990
A Method for Rapid RSA Key Generation.
Syst. Comput. Jpn., 1990


  Loading...