Yoshiaki SHIRAISHI


CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments
Haiyan TIAN Yoshiaki SHIRAISHI Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1653-1664
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
vehicular networksnon-safety applicationdedicated short range communication (DSRC)content-centric network (CCN)in-network caching
 Summary | Full Text:PDF

A Malicious Web Site Identification Technique Using Web Structure Clustering
Tatsuya NAGAI Masaki KAMIZONO Yoshiaki SHIRAISHI Kelin XIA Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1665-1672
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
website structuremalicious websiteexploit kitclustering
 Summary | Full Text:PDF

Authentication Scheme Using Pre-Registered Information on Blockchain
Toshiki TSUCHIDA Makoto TAKITA Yoshiaki SHIRAISHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1676-1678
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
blockchainauthenticationInternet of Thingspseudo-random functionservice cooperation
 Summary | Full Text:PDF

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
Shunta NAKAGAWA Tatsuya NAGAI Hideaki KANEHARA Keisuke FURUMOTO Makoto TAKITA Yoshiaki SHIRAISHI Takeshi TAKAHASHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1679-1682
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
CVECVSSConvolutional Neural Network
 Summary | Full Text:PDF

Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki ITO Kenta NOMURA Masaki KAMIZONO Yoshiaki SHIRAISHI Yasuhiro TAKANO Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2658-2664
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Forensics and Risk Analysis
Keyword: 
diamond modelthreat intelligencecyber kill chainincident report
 Summary | Full Text:PDF

Zero-Knowledge Identification Scheme Using LDPC Codes
Haruka ITO Masanori HIROTOMO Youji FUKUTA Masami MOHRI Yoshiaki SHIRAISHI 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2688-2697
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
zero-knowledge proofidentificationLDPC codessyndrome decoding problem
 Summary | Full Text:PDF

Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior
Yoshiaki SHIRAISHI Masaki KAMIZONO Masanori HIROTOMO Masami MOHRI 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2449-2457
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
drive-by download attackweb site analysismulti-environment analysisforensicrisk hedge
 Summary | Full Text:PDF

Delivering CRL with Low Bit Rate Network Coded Communication for ITS
Yoshiaki SHIRAISHI Masanori HIROTOMO Masami MOHRI Taisuke YAMAMOTO 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2440-2448
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
intelligent transport systemroad-to-vehicle communicationinter-vehicle communicationnetwork codingpublic key infrastructurecertificate revocation list
 Summary | Full Text:PDF

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Yoshiaki SHIRAISHI Kenta NOMURA Masami MOHRI Takeru NARUSE Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2432-2439
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
cryptographic cloud storageciphertext-policy attribute-based encryptionsemantic securityattribute revocationproxy re-encryption
 Summary | Full Text:PDF

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2420-2431
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
ciphertext-policy attribute-based encryptionmultiple key authoritiesattribute revocationforward secrecy
 Summary | Full Text:PDF

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1770-1779
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Schemes
Keyword: 
internet of thingslocal broadcastdigital signaturefiat-shamir transformlow energy
 Summary | Full Text:PDF

SSL Client Authentication with TPM
Shohei KAKEI Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 1052-1061
Type of Manuscript:  Special Section PAPER (Special Section on Cyberworlds)
Category: 
Keyword: 
Trusted Platform Modulepublic key certificateOpenIDSSLclient certificate
 Summary | Full Text:PDF

New Weakness in the Key-Scheduling Algorithm of RC4
Toshihiro OHIGASHI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 3-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4key scheduling algorithm
 Summary | Full Text:PDF

Internal-State Reconstruction of a Stream Cipher RC4
Yoshiaki SHIRAISHI Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10  pp. 2636-2638
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
stream cipherRC4internal-state reconstruction
 Summary | Full Text:PDF

A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications
Youji FUKUTA Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8  pp. 2155-2158
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
stream ciphernonlinear combiner generatorfast correlation attackparity check equations
 Summary | Full Text:PDF