Takato Hirano
According to our database1,
Takato Hirano
authored at least 20 papers
between 2008 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Determination of Parameters Balancing between Security and Search Performance on Searchable Encryption.
Proceedings of the Thirteenth International Conference on Mobile Computing and Ubiquitous Network, 2021
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
J. Inf. Process., 2020
2019
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2018
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
J. Inf. Process., 2018
Proceedings of the Provable Security, 2018
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption.
Proceedings of the Information Security Practice and Experience, 2018
2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016
A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.
Proceedings of the Advances in Information and Computer Security, 2013
2012
Homomorphic encryption based cancelable biometrics secure against replay and its related attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008