Yutaka Miyake

According to our database1, Yutaka Miyake authored at least 87 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data.
Enterp. Inf. Syst., September, 2023

Combining Stochastic and Deterministic Modeling of IPFIX Records to Infer Connected IoT Devices in Residential ISP Networks.
IEEE Internet Things J., 2023

2022
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Identification of an IoT Device Model in the Home Domain Using IPFIX Records.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

2021
Automatic Security Inspection Framework for Trustworthy Supply Chain.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest.
Proceedings of the 6th International Conference on Internet of Things, 2021

2020
Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data.
Proceedings of the 5th International Conference on Internet of Things, 2020

A Liveness Detection Method for Palmprint Authentication.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Consideration on Data Conformance Toward Building Trust in Supply Chain.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2018
Message from the NETSAP 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Standards News.
IEEE Commun. Stand. Mag., 2017

2016
Portable Implementation of Lattice-based Cryptography using JavaScript.
Int. J. Netw. Comput., 2016

Message from the NETSAP and SIMICE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An agent-based framework for Informed Consent in the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Towards Tracing of k-Anonymized Datasets.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Message from the NETSAP 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Security issues on IT systems during disasters: a survey.
J. Ambient Intell. Humaniz. Comput., 2014

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Trans. Inf. Syst., 2014

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Pre-processing Composition for Secret Key Recovery on Android Smartphone.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

How to Find an Appropriate K for K-Anonymization.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Privacy Risk Model for Trajectory Data.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Beyond proofs of data possession: Finding defective blocks in outsourced storage.
Proceedings of the IEEE Global Communications Conference, 2014

Key Extraction Attack Using Statistical Analysis of Memory Dump Data.
Proceedings of the Risks and Security of Internet and Systems, 2014

Data Storage on the Cloud under User Control.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

XOR network coding pollution prevention without homomorphic functions.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Implementation and evaluation of a remote authentication system using touchless palmprint recognition.
Multim. Syst., 2013

Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptol. ePrint Arch., 2013

P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

LMM - A Common Component for Software License Management on Cloud.
Proceedings of the SECRYPT 2013, 2013

A Key-revocable Attribute-based Encryption for Mobile Cloud Environments.
Proceedings of the SECRYPT 2013, 2013

A Proposal for the Deterrence of Information Leakage Using Anti-virus Software.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

PPM: Privacy Policy Manager for Personalized Services.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Design of Categorization Mechanism for Disaster-Information-Gathering System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Software Protection Combined with Tamper-Proof Device.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Privacy Preservation of User History Graph.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Memory Access Pattern Protection for Resource-Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Security-and-Privacy-Related Issues on IT Systems During Disasters.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electron., 2011

Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011

Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation.
J. Inf. Process., 2011

Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists.
J. Inf. Process., 2011

Foreword.
IEICE Trans. Inf. Syst., 2011

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Automatic security verification for 3-party authentication and key exchange protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011

On Data Importance Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Data Anonymity in Multi-Party Service Model.
Proceedings of the Security Technology, 2011

Privacy Frost: A User-Oriented Data Anonymization Tool.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Remote Attestation for HDD Files Using Kernel Protection Mechanism.
Proceedings of IEEE International Conference on Communications, 2010

Web Tracking Site Detection Based on Temporal Link Analysis.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

LSM-Based Secure System Monitoring Using Kernel Protection Schemes.
Proceedings of the ARES 2010, 2010

2009
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Trans. Inf. Syst., 2009

Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking.
Proceedings of IEEE International Conference on Communications, 2009

Visual similarity-based phishing detection without victim site information.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Anomaly Detection for DNS Servers Using Frequent Host Selection.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Service Independent Access Control Architecture for User Generated Content (UGC).
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Development of security functions for a medical information sharing platform.
Syst. Comput. Jpn., 2007

A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Combating Against Attacks on Encrypted Protocols.
Proceedings of IEEE International Conference on Communications, 2007

Intrusion Detection for Encrypted Web Accesses.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Secure Host Name Resolution Infrastructure for Overlay Networks.
IEICE Trans. Commun., 2006

L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2002
TCP gateway for satellite-based Internet service accommodating multiple subscribers.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002

Cross-Domain Access Control via PKI.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2000
Interoperability Testing System of TCP/IP Based Systems in Operational Environment.
Proceedings of the Testing of Communicating Systems: Tools and Techniques, IFIP TC6/WG6.1 13<sup>th</sup> International Conference on Testing Communicating Systems (TestCom 2000), August 29, 2000

Acceleration of TCP Throughput over Satellite-Based Internet Access Using TCP Gateway.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1995
Implementation method of high speed protocol as transport library.
Proceedings of the 1995 International Conference on Network Protocols, 1995

1989
A new timing extraction method and data interpolation for block demodulation.
Proceedings of the IEEE International Conference on Acoustics, 1989


  Loading...