Kengo MORI


Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
Haruna HIGO Toshiyuki ISSHIKI Kengo MORI Satoshi OBANA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 138-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
biometric authenticationfingerprint minutiaehill-climbing attackprivacy-preserving technology
 Summary | Full Text:PDF(1.6MB)

A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis
Yasunori ISHIHARA Yasuhiro USHIROZAKO Kengo MORI Jun FURUKAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/06/01
Vol. E98-D  No. 6  pp. 1161-1165
Type of Manuscript:  Special Section LETTER (Special Section on Formal Approach)
Category: Database Security
Keyword: 
encrypted databasesecrecyinference analysisdecidability
 Summary | Full Text:PDF(259.4KB)

Sufficient Conditions for Update Operations on Object-Oriented Databases to Preserve the Security against Inference Attacks
Yasunori ISHIHARA Kengo MORI Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/10/01
Vol. E86-D  No. 10  pp. 2187-2197
Type of Manuscript:  PAPER
Category: Databases
Keyword: 
object-oriented databaseauthorizationinference attacksecurityincremental checking
 Summary | Full Text:PDF(337.6KB)