Yuji Suga
Orcid: 0000-0002-9244-907X
According to our database1,
Yuji Suga
authored at least 32 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A classification for commutative three-element semigroups with local XOR structure and its implementability of card-based protocols.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
ICH 3-party model for claims distribution on the blockchain and their application to the e-KYC-e model.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022
A classification proof for commutative three-element semigroups with local AND structure and its application to card-based protocols.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022
How to implement non-committed card protocols to realize AND operations satisfying the three-valued logics.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2020
J. Inf. Process., 2020
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Formulation of Information Hiding Model for One-Time Authentication Methods Using the Merkle Tree.
Proceedings of the Advances in Internet, 2019
2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Classification of Generalized Graph-type (2, n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple Secrets.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
2013
A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
New Constructions of (2, n)-Threshold Secret Sharing Schemes Using Exclusive-OR Operations.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access Structure.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Proceedings of the Computational Science and Its Applications, 2010
2005
New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005