Youji Fukuta

Orcid: 0009-0001-0693-1039

According to our database1, Youji Fukuta authored at least 12 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Method for Solving Problems in Acquiring Communication Logs on End Hosts.
Digit., June, 2024

2019
A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Designing Authentication and Authorization System with Blockchain.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Zero-Knowledge Identification Scheme Using LDPC Codes.
IEICE Trans. Inf. Syst., 2018

2017
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2012
Controlling signature verification of network coded packet on VANET.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

A distribution scheme of certificate revocation list by inter-vehicle communication using a random network coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

2004
Port randomized VPN by mobile codes.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Remote Access VPN with Port Protection Function by Mobile Codes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003


  Loading...