Shin'ichiro Matsuo
Orcid: 0000-0002-3208-4531
According to our database1,
Shin'ichiro Matsuo
authored at least 45 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Analyzing the Performance Impact of HPC Workloads with Gramine+SGX on 3rd Generation Xeon Scalable Processors.
Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, 2023
Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022
2021
CoRR, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
2020
Proceedings of the Financial Cryptography and Data Security, 2020
Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020.
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
2017
Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 2017 Formal Methods in Computer Aided Design, 2017
2015
Int. J. Commun. Syst., 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
CoRR, 2014
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.
Proceedings of the 2014 IEEE World Congress on Services, 2014
2013
IEEE Veh. Technol. Mag., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012
2011
Proceedings of the Trusted Systems - Third International Conference, 2011
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Proceedings of the Financial Cryptography and Data Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the HOST 2010, 2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003