Masami MOHRI


CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments
Haiyan TIAN Yoshiaki SHIRAISHI Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1653-1664
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
vehicular networksnon-safety applicationdedicated short range communication (DSRC)content-centric network (CCN)in-network caching
 Summary | Full Text:PDF

A Malicious Web Site Identification Technique Using Web Structure Clustering
Tatsuya NAGAI Masaki KAMIZONO Yoshiaki SHIRAISHI Kelin XIA Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1665-1672
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
website structuremalicious websiteexploit kitclustering
 Summary | Full Text:PDF

Authentication Scheme Using Pre-Registered Information on Blockchain
Toshiki TSUCHIDA Makoto TAKITA Yoshiaki SHIRAISHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1676-1678
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
blockchainauthenticationInternet of Thingspseudo-random functionservice cooperation
 Summary | Full Text:PDF

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
Shunta NAKAGAWA Tatsuya NAGAI Hideaki KANEHARA Keisuke FURUMOTO Makoto TAKITA Yoshiaki SHIRAISHI Takeshi TAKAHASHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1679-1682
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
CVECVSSConvolutional Neural Network
 Summary | Full Text:PDF

Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki ITO Kenta NOMURA Masaki KAMIZONO Yoshiaki SHIRAISHI Yasuhiro TAKANO Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2658-2664
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Forensics and Risk Analysis
Keyword: 
diamond modelthreat intelligencecyber kill chainincident report
 Summary | Full Text:PDF

Zero-Knowledge Identification Scheme Using LDPC Codes
Haruka ITO Masanori HIROTOMO Youji FUKUTA Masami MOHRI Yoshiaki SHIRAISHI 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2688-2697
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
zero-knowledge proofidentificationLDPC codessyndrome decoding problem
 Summary | Full Text:PDF

Delivering CRL with Low Bit Rate Network Coded Communication for ITS
Yoshiaki SHIRAISHI Masanori HIROTOMO Masami MOHRI Taisuke YAMAMOTO 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2440-2448
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
intelligent transport systemroad-to-vehicle communicationinter-vehicle communicationnetwork codingpublic key infrastructurecertificate revocation list
 Summary | Full Text:PDF

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Yoshiaki SHIRAISHI Kenta NOMURA Masami MOHRI Takeru NARUSE Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2432-2439
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
cryptographic cloud storageciphertext-policy attribute-based encryptionsemantic securityattribute revocationproxy re-encryption
 Summary | Full Text:PDF

Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior
Yoshiaki SHIRAISHI Masaki KAMIZONO Masanori HIROTOMO Masami MOHRI 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2449-2457
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
drive-by download attackweb site analysismulti-environment analysisforensicrisk hedge
 Summary | Full Text:PDF

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2420-2431
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
ciphertext-policy attribute-based encryptionmultiple key authoritiesattribute revocationforward secrecy
 Summary | Full Text:PDF

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1770-1779
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Schemes
Keyword: 
internet of thingslocal broadcastdigital signaturefiat-shamir transformlow energy
 Summary | Full Text:PDF

SSL Client Authentication with TPM
Shohei KAKEI Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 1052-1061
Type of Manuscript:  Special Section PAPER (Special Section on Cyberworlds)
Category: 
Keyword: 
Trusted Platform Modulepublic key certificateOpenIDSSLclient certificate
 Summary | Full Text:PDF

On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes
Masanori HIROTOMO Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/04/01
Vol. E95-A  No. 4  pp. 790-800
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesweight distributionprobabilistic algorithm
 Summary | Full Text:PDF

A Probabilistic Algorithm for Computing the Weight Distribution of LDPC Codes
Masanori HIROTOMO Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7  pp. 1677-1689
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesweight distributionprobabilistic methodminimum distance
 Summary | Full Text:PDF

On Good Convolutional Codes with Optimal Free Distance for Rates 1/2, 1/3 and 1/4
Naoto SONE Masami MOHRI Masakatu MORII Hiroshi SASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/01/01
Vol. E84-B  No. 1  pp. 116-119
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
convolutional codeoptimum free distance (OFD)minimum free distanceCedervall-Johannesson algorithm
 Summary | Full Text:PDF

A Probabilistic Algorithm for Determining the Minimum Weight of Cyclic Codes
Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2170-2173
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
minimum weightcyclic codesprobabilistic algorithm
 Summary | Full Text:PDF