Yoshio Kakizaki

Orcid: 0000-0003-2865-2361

According to our database1, Yoshio Kakizaki authored at least 22 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Development of the Edge Computing Platform based on Modular Architecture using Intel SGX.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Implementing passive authentication with enhanced risk-based security.
Proceedings of the 16th International Conference on Signal-Image Technology & Internet-Based Systems, 2022

2021
Editor's Message to Special Issue of Information Systems.
J. Inf. Process., 2021

2020
CySec: Cybersecurity Review Program for Professionals in Japan.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Evaluation to Classify Ransomware Variants based on Correlations between APIs.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Password Strength Measurement without Password Disclosure.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
A Mixed Content Awareness Tool for Safe Browsing.
J. Comput., 2018

2015
Evaluation of a Risk-Based Management Method for Online Accounts.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2014
Security and Privacy Behavior Definition for Behavior Driven Development.
Proceedings of the Product-Focused Software Process Improvement, 2014

E-butler: A User-Centric High Reliability Personal Portal Site.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Identifier Migration for Identity Continuance in Single Sign-On.
J. Information Security, 2012

Proposal of a watermarking scheme using winding number and unneeded synchronism.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Identity Continuance in Single Sign-On with Authentication Server Failure.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Identifier Migration in OpenID.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Key Management Scheme Applicable to Various Topologies of Sensor Networks.
Proceedings of the Sixth International Conference on Availability, 2011

Fast Implementation of the Advanced Encryption Standard Using Atmega1281.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A Consideration of the Reliability of Registration and Attribute Exchange.
Proceedings of the ARES 2010, 2010

2009
An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information.
Proceedings of the The Forth International Conference on Availability, 2009

2007
A New Method for Reducing the Revocation Delay in the Attribute Authentication.
Proceedings of the The Second International Conference on Availability, 2007

2006
A Method of An Anonymous Authentication For Flat-rate Service.
J. Comput., 2006

A Proposal of An Anonymous Authentication Method For Flat-rate Service.
Proceedings of the The First International Conference on Availability, 2006


  Loading...