Hiroaki KIKUCHI


Study on Record Linkage of Anonymizied Data
Hiroaki KIKUCHI Takayasu YAMAGUCHI Koki HAMADA Yuji YAMAOKA Hidenobu OGURI Jun SAKUMA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 19-28
Type of Manuscript:  INVITED PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
data privacyanonymizationre-identification riskbig data
 Summary | Full Text:PDF(2.1MB)

Privacy-Preserving Decision Tree Learning with Boolean Target Class
Hiroaki KIKUCHI Kouichi ITOH Mebae USHIDA Hiroshi TSUDA Yuji YAMAOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/11/01
Vol. E98-A  No. 11  pp. 2291-2300
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
privacydecision tree learningBoolean querypiecewise linear function
 Summary | Full Text:PDF(1.3MB)

Time Zone Correlation Analysis of Malware/Bot Downloads
Khamphao SISAAT Hiroaki KIKUCHI Shunji MATSUO Masato TERADA Masashi FUJIWARA Surin KITTITORNKUN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/07/01
Vol. E96-B  No. 7  pp. 1753-1763
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures, Protocols, and Management Methods that Enable Sustainable Development)
Category: 
Keyword: 
malwarebotnetbot downloadtime zone correlationhoneypot
 Summary | Full Text:PDF(2MB)

Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
Hiroaki KIKUCHI Daisuke KAGAWA Anirban BASU Kazuhiko ISHII Masayuki TERADA Sadayuki HONGO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 111-120
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
privacycryptographical protocolprivacy-preserving data miningnaive Bayes classification
 Summary | Full Text:PDF(1.4MB)

Analysis on the Sequential Behavior of Malware Attacks
Nur Rohman ROSYID Masayuki OHRUI Hiroaki KIKUCHI Pitikhate SOORAKSA Masato TERADA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2139-2149
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
PrefixSpanmalwarebotnetscoordinated attacksequential pattern
 Summary | Full Text:PDF(1.5MB)

FOREWORD
Hiroaki KIKUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1018-1019
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(62.5KB)

Multiparty Computation from El Gamal/Paillier Conversion
Koji CHIDA Hiroaki KIKUCHI Keiichi HIROTA Gembu MOROHASHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 137-146
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
encryption conversionmultiparty protocolhomomorphic encryptionprivacy-preserving statistical computation
 Summary | Full Text:PDF(276.2KB)

Secure Multiparty Computation for Comparator Networks
Gembu MOROHASHI Koji CHIDA Keiichi HIROTA Hiroaki KIKUCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2349-2355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secure function evaluationcomparator networkmultiparty protocolstatistical analysis(M+1)-st price auction
 Summary | Full Text:PDF(225.2KB)

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information
Mitsuo OKADA Hiroaki KIKUCHI Yasuo OKABE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1348-1358
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Watermarking
Keyword: 
asymmetric digital watermarkingstatistical digital watermarkingpublic-key encryption
 Summary | Full Text:PDF(497.3KB)

(M+1)st-Price Auction Protocol
Hiroaki KIKUCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/03/01
Vol. E85-A  No. 3  pp. 676-683
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
electronic auctionanonymitysecret multiparty computation
 Summary | Full Text:PDF(205.5KB)

Certificate Revocation Protocol Using k-Ary Hash Tree
Hiroaki KIKUCHI Kensuke ABE Shohachiro NAKANISHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/08/01
Vol. E84-B  No. 8  pp. 2026-2032
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology)
Category: Internet Architecture
Keyword: 
public-key certificatepublic key infrastructurecertificate revocationone-way hash function
 Summary | Full Text:PDF(461.9KB)

Multi-Round Anonymous Auction Protocols
Hiroaki KIKUCHI Michael HAKAVY Doug TYGAR 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/04/25
Vol. E82-D  No. 4  pp. 769-777
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology and Its Applications)
Category: 
Keyword: 
auctionmultiparty computationanonymitycommunication cost
 Summary | Full Text:PDF(226.3KB)

Identification of P-Fuzzy Switching Functions
Hiroaki KIKUCHI Masao MUKAIDONO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/07/25
Vol. E78-A  No. 7  pp. 860-868
Type of Manuscript:  PAPER
Category: Artificial Intelligence and Knowledge
Keyword: 
fuzzy switching functionsprime implicantP-functionsfuzzy logicuniformity
 Summary | Full Text:PDF(607.3KB)