2011年度
-
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto,
Certificateless Ordered Sequential Aggregate Signature Scheme,
Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems, INCoS, IEEE
Computer Society, pp.662-667, December 2011.
2013年度
-
Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung Youl Youm,
Preventing Abuse of Cookies Stolen by XSS,
Proceedings of the 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013, pp.85-89, IEEE Computer
Society, Seoul, July 25, 2013.
-
Naoto Yanai, Masahiro Mambo, Eiji Okamoto,
Ordered Multisignature Schemes under the CDH Assumption without Random Oracles,
Pre-proceedings of ISC 2013, November 12-15, 2013.
-
Haruna Higo, Keisuke Tanaka, Kenji Yasunaga,
Game-theoretic security for bit commitment,
Proceedings of the 8th International Workshop on Security (IWSEC 2013), Lecture Notes in Computer
Science, Springer-Verlag, Vol.8231, pp.303-318, November 2013.
2014年度
-
Kenji Yasunaga,
Correction of samplable additive errors,
Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT 2014), pp.1066-1070, July 2014.
-
Naoto Yanai, Masahiro Mambo, Eiji Okamoto,
A CDH-based Ordered Multisignature Scheme in the Standard Model with Better Efficiency,
Proceedings of ISITA 2014, pp.236-240, October 26-29, 2014.
2015年度
-
Tomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo,
On the Traceability of the Accountable Anonymous Channel,
Proceedings of the 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015, pp.6-11, IEEE Computer
Society, May 25, 2015.
-
Naoto Yanai, Masahiro Mambo, Eiji Okamoto,
An Ordered Multisignature Scheme under the CDH Assumption Without Random Oracles,
Information Security, Y. Desmedt (Ed.), ISC 2013, LNCS 7807, pp.367-377, Springer-Verlag, December 2015.
-
Abdul Wahid, Yasushi Sengoku, Masahiro Mambo,
Toward Constructing a Secure Online Examination System,
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, ACM IMCOM
2015, Article No.95, January 9, 2015.
2016年度
-
Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto,
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs
Trusted Systems, M. Yung, J. Zhang, Z. Yang (Eds.), INTRUST 2015, LNCS 9565, pp.32-48, Springer-Verlag (March 16,
2016).
-
K. Yasunaga,
Error-correcting codes against chosen-codeword attacks,
Proceedings of the 9th International Conference on Information Theoretic Security (ICITS 2016), LNCS 10015,
pp.177-189, 2016.8.
2017年度
-
Dedi Gunawan, Masahiro Mambo,
Set-Valued Data Anonymization Maintaining Data Utility and Data Property,
Proc. of the 12th International Conference on Ubiquitous Information Management and Communication, IMCOM 2018,
No.8-2 (January 6, 2018).
-
Shogo Kitajima and Masahiro Mambo
Verifying the Validity of Public Key Certificates Using Edge Computing Security with Intelligent Computing and
Big-data Services,
SICBS 2017, Advances in Intelligent Systems and Computing, AISC vol.733, Springer, pp.330-336, (March 29, 2018).
2018年度
-
Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo,
Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions,
Proc. 2018 International Symposium on Information Theory and Its Application (ISITA 2018), pp. 457-461 , IEEE
(Oct. 30, 2018).
-
Favian Dewanta, Masahiro Mambo,
Bidding Price-based Transaction: Trust Establishment for Vehicular Fog Computing Service in Rural Area,
The Third International Workshop on Smart Edge Computing and Networking (SmartEdge), Proc. 2019 IEEE International
Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp.882-887 (March 15, 2019).
-
Dedi Gunawan, Masahiro Mambo,
Hiding Personal Tendency in Set-valued Database Publication,
Proc. the 2nd International Conference on Information Science and Systems, ICISS 2019, ACM, pp.284-289 (March 17,
2019).
2019年度
- Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo,
Privacy Risk Evaluation of Re-Identification of Pseudonyms,
Proc. The 14th Asia Joint Conference on Information Security (AsiaJCIS), Vol. 1, pp.165-172 (August 2, 2019).
-
Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo,
Signcryption from NTRU Lattices Without Random Oracles,
Proc. The 14th Asia Joint Conference on Information Security (AsiaJCIS), Vol. 1, pp.134-141 (August 2, 2019).
-
Kyi Thar Ko and Masahiro Mambo,
An Overview of Named Data Networking and its Challenging Security Issues,
Proc. the 10th International Conference on Science and Engineering (ICSE), pp.223-225 (December, 2019).
2020年度
-
Kyi Thar Ko, Masahiro Mambo,
Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks,
Proc. the 16th International Conference on Mobility, Sensing and Networking (MSN 2020), pp. 607-613, IEEE.
2021年度
-
Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo,
Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN,
Proc. the 17th International Conference on Mobility, Sensing and
Networking (MSN 2021), pp.622-627, IEEE (December 14, 2021).
https://doi.org/10.1109/MSN53354.2021
2022年度
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen,
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis,
Enhanced Security, and Quantum-resistant Instantiation,
Proc. ACM ASIA CCS 2022, pp.423-436 (June 1, 2022).
https://doi.org/10.1145/3488932.3497760
-
Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng and Masahiro Mambo,
Quantum-resistant 1-out-of-N Oblivious Signature from Lattices,
IWSEC 2022, LNCS 13504, pp.166-186, Springer-Verlag (August 2022)
-
Danu Dwi Sanjoyo, Masahiro Mambo, Zero-touch Provisioned Device
Lifecycle and Its Security in IoT, Science of Cyber Security -SciSec
2022 Workshops, AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022,
Communications in Computer and Information Science (CCIS), Vol.1680,
pp.215-218, (August 10, 2022) (Book published in January 2023).
-
Jan Wantoro, Masahiro Mambo, Separation of Activation Code Delivery on
V2X Pseudonym Certificate Revocation, Science of Cyber Security -SciSec
2022 Workshops, AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022,
Communications in Computer and Information Science (CCIS), Vol.1680,
pp.219-222, (August 10, 2022) (Book published in January 2023).
-
Hendra Kurniawan, Masahiro Mambo, Privacy-preserving Federated Active
Learning, Science of Cyber Security -SciSec 2022 Workshops,
AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Communications in
Computer and Information Science (CCIS), Vol.1680, pp.223-226, (August
10, 2022) (Book published in January 2023).
-
Takuya Kato, Hiroto Shiba, Masahiro Mambo,
On the Identity Match Rate in Web Browsing History Data,
9th International Workshop on Information and Communication Security,
WICS 2022.
-
Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo,
Public Key Encryption with Hierarchical Authorized Keyword Search,
ICISC 2022, LNCS 13849, pp.147-170, (Nov. 30, 2022).
https://doi.org/10.1007/978-3-031-29371-9_8
2023年度
-
Keita Emura.
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search.
The 22nd International Conference on Applied Cryptography and Network Security (ACNS 2024), 237-256 (Mar. 5,
2024).
2024年度
-
Keita Emura. On the Feasibility of Identity-Based Encryption with
Equality Test Against Insider Attacks.
The 29th Australasian Conference on Information Security and Privacy
(ACISP 2024), 261-280 (July 15, 2024).
-
Yuto Imura and Keita Emura. An Identity Management System using Group Signatures with
Message-Dependent Opening.
19th Asia Joint Conference on Information Security
(AsiaJCIS 2024), 40-47 (August 13, 2024).
-
Keita Emura, Shingo Sato, Atsushi Takayasu.
Attribute-Based Keyed Fully Homomorphic Encryption.
14th International Conference on Security and Cryptography for Networks (SCN 2024), 47-67 (September 11, 2024)
-
Yuta Takabayashi and Masahiro Mambo: Detection Evasion Using eBPF for Linux Fileless Malware.
IEEE Conference on Dependable and Secure Computing, DSC 2024: 74-75 (November 7, 2024)