Taiichi Saito

Orcid: 0000-0002-5016-9619

According to our database1, Taiichi Saito authored at least 24 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Race Condition Vulnerabilities in WordPress Plug-ins.
Proceedings of the Advances in Information and Computer Security, 2024

2023
Automated Collection of Redirect Chains from Search Results Pages to Prize Scam Pages.
J. Softw., February, 2023

Construction of brain area risk map for decision making using surgical navigation and motor evoked potential monitoring information.
Int. J. Comput. Assist. Radiol. Surg., February, 2023

DNS Rebinding Attacks Against Browsers on Azure Virtual Machines.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Analyzing Metadata in PDF Files Published by Police Agencies in Japan.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2020
Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
Integrated datasets of normalized brain with functional localization using intra-operative electrical stimulation.
Int. J. Comput. Assist. Radiol. Surg., 2019

2018
Python Deserialization Denial of Services Attacks and Their Mitigations.
Proceedings of the Computational Science/Intelligence & Applied Informatics, 2018

2014
Secure Hierarchical Identity-Based Identification without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
Security of Sequential Multiple Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Security Enhancement of Identity-Based Identification with Reversibility.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Security Enhancements by OR-Proof in Identity-Based Identification.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Strong Security Notions for Timed-Release Public-Key Encryption Revisited.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
On the q-Strong Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2010

2006
Candidate One-Way Functions on Non-Supersingular Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2002
A New Factoring Method of Integers <i>N</i>=<i>p</i><sup>r</sup> ✕ <i>q</i> for Large <i>r</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
Private Information Retrieval Based on the Subgroup Membership Problem.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1994
Recognition of Elevation Value in Topographic Maps by Multi-Angled Parallelism.
Int. J. Pattern Recognit. Artif. Intell., 1994

Recognition of elevation Value in Topographic Maps by Multi-Angled Parallelism.
Proceedings of the Document Image Analysis, 1994

1992
Laser-marked alphanumeric character recognition by multi-angled parallel matching method.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992

1991
MAP: Multi-angled parallelism for feature extraction from topographical maps.
Pattern Recognit., 1991

1990
A nonlinear normalization method for handprinted kanji character recognition - line density equalization.
Pattern Recognit., 1990


  Loading...