Eitaro SHIOJI


1-day, 2 Countries — A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States
Asuka NAKAJIMA Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Maverick WOO 
Publication:   
Publication Date: 2020/07/01
Vol. E103-D  No. 7  pp. 1524-1540
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network and System Security
Keyword: 
consumer IoTvulnerability disclosurepatchexploitmeasurement
 Summary | Full Text:PDF(1MB)

Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel
Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 239-255
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
web security and privacyside channeluser identification
 Summary | Full Text:PDF(1.4MB)

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 276-291
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
mobile appsoftware libraryvulnerability
 Summary | Full Text:PDF(1.7MB)

Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro SHIOJI Ryutaroh MATSUMOTO Tomohiko UYEMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2026-2033
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
network codingsecure network codinglinear network codinguniversal securityMRD code
 Summary | Full Text:PDF(336.8KB)