Toru Nakanishi
Orcid: 0000-0001-8796-9508Affiliations:
- Hiroshima University, Japan
According to our database1,
Toru Nakanishi
authored at least 98 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
2023
A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing Crowdsensing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023
Zero-Knowledge Proofs of Connectivity for Labeled Directed Graphs Using Bilinear-Map Accumulator.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
2022
J. Inf. Process., 2022
Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
2021
IEICE Trans. Inf. Syst., 2021
Reducing Revocation Lists in CS-Based Revocable Group Signature Scheme Using Vector Commitment.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
2020
Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator.
IET Inf. Secur., 2020
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020
2019
J. Inf. Process., 2019
Speeding Up Revocable Group Signature with Compact Revocation List Using Vector Commitments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
An Efficient Blacklistable Anonymous Credentials without TTP of Tracing Authority Using Pairing-Based Accumulator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2018
An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based Accumulator.
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
J. Inf. Process., 2017
Accumulator for Monotone Formulas and its Application to Anonymous Credential System.
J. Inf. Process., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Implementation of Revocable Group Signatures with Compact Revocation List Using Vector Commitments.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
An Efficient Blacklistable Anonymous Credentials without TTPs Using Pairing-Based Accumulator.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Reduction of certificates in an anonymous credential system with proofs for monotone formulas on attributes.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016
Implementation of a Revocable Group Signature Scheme with Compact Revocation List Using Accumulator.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
2015
Extensions of Access-Point Aggregation Algorithm for Large-scale Wireless Local Area Networks.
Int. J. Netw. Comput., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes.
Proceedings of the Advances in Information and Computer Security, 2015
Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015
An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
A proposal of routing algorithm under practical conditions for Wireless Internet-Access Mesh NETworks.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2014
An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Second International Symposium on Computing and Networking, 2014
Implementation of Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction.
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
A Fixed Backoff-Time Switching Method for CSMA/CA Protocol in Wireless Mesh Networks.
IEICE Trans. Commun., 2013
IEICE Trans. Commun., 2013
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013
A modified routing tree algorithm considering link speed change in IEEE 802.11n for wireless mesh network.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
An Extension of Access-Point Aggregation Algorithm to Ensure Minimum Host Throughput for Wireless Local Area Networks.
Proceedings of the First International Symposium on Computing and Networking, 2013
Extensions of cooking guidance function on Android tablet for homemade cooking assistance system.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
A Modified Active Access-Point Selection Algorithm Considering Link Speed Change in IEEE 802.11n for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Complex, 2013
2012
J. Inf. Process., 2012
An Extension of Routing Tree Algorithm Considering Link Speed Change in IEEE 802.11n Protocol for Wireless Mesh Network.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations.
Proceedings of the Third International Conference on Networking and Computing, 2012
A Proposal of Access-Point Aggregation Approach for Multiple Wireless Local Area Networks.
Proceedings of the Sixth International Conference on Complex, 2012
An Extension of Wireless Internet-Access Mesh Network Simulator for Use of Smart Antenna.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
A Proposal of CSMA Fixed Backoff-time Switching Protocol and Its Implementation on QualNet Simulator for Wireless Mesh Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming Education.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
J. Interconnect. Networks, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
An Extension of Active Access-Point Selection Algorithm for Throughput Maximization in Wireless Mesh Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the International Conference on Complex, 2011
2010
J. Inf. Process., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Commun., 2010
Software Architecture and Characteristic Functions in Learning Management System "NOBASU".
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
An Extension of the Web-Page Layout Optimization Method for Multimodal Browsing Sizes.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
2009
A node configuration algorithm with bandwidth bottleneck resolution for WDM ring networks.
Photonic Netw. Commun., 2009
A web-based lecture scene playback system using digital picture-card show with structured learning assistance function.
Int. J. Web Grid Serv., 2009
An Access Point Allocation Algorithm for Indoor Environments in Wireless Mesh Networks.
IEICE Trans. Commun., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
A Heuristic Optimization Algorithm for Panoramic Image Generation Problem from Multiple Cameras.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
A Proposal of Structured Learning Assistance Function in Lecture-Scene Playback System Using Digital Picture-Card Show.
Proceedings of the 2009 International Conference on Complex, 2009
2008
A Proposal of an Installation Manual Generation Method for Open Source Software Using Operation Logs.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
A minimum-delay routingtree algorithm for access-point communications in Wireless Mesh Networks.
Proceedings of the 2008 IEEE International Conference on Research, 2008
A short anonymously revocable group signature scheme from decision linear assumption.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
A Lecture Scene Playback System Using Digital Picture-Card Show for Distance Learning.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proposal of a hierarchical heuristic algorithm for node assignment in bidirectional Manhattan street networks.
Syst. Comput. Jpn., 2007
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A Channel Configuration Problem for Access-Point Communications in Wireless Mesh Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
A Group Signature Scheme with Efficient Membership Revocation for Middle-Scale Groups.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
An Optical-Drop Wavelength Assignment Algorithm for Efficient Wavelength Reuse under Heterogeneous Traffic in WDM Ring Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
An Efficient Anonymous Survey for Attribute Statistics Using a Group Signature Scheme with Attribute Tracing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Information Security and Cryptology, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Quasi-Solution State Evolution Algorithm for Channel Assignment Problems in Cellular Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Proposal of a Quasi-Solution State Evolution Algorithm for Channel Assignment Problems.
Proceedings of the Information Networking, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security, Third International Workshop, 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999