Publication: Publication Date: 2020/02/01 Vol. E103-DNo. 2 ;
pp. 276-291 Type of Manuscript: Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications) Category: Network Security Keyword: mobile app, software library, vulnerability,
Publication: Publication Date: 2018/10/01 Vol. E101-DNo. 10 ;
pp. 2526-2529 Type of Manuscript: LETTER Category: Data Engineering, Web Information Systems Keyword: search-based, concolic execution, vulnerability,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2016/03/01 Vol. E99-DNo. 3 ;
pp. 769-772 Type of Manuscript: LETTER Category: Artificial Intelligence, Data Mining Keyword: power grids, complex networks, vulnerability, centrality, overall information,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2012/02/01 Vol. E95-DNo. 2 ;
pp. 588-595 Type of Manuscript: PAPER Category: Information Network Keyword: wireless LAN network, WPA-TKIP, falsification attack, QoS, vulnerability,
Publication: IEICE TRANSACTIONS on Communications Publication Date: 2010/05/01 Vol. E93-BNo. 5 ;
pp. 1122-1130 Type of Manuscript: Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet) Category: Keyword: security, web, vulnerability, application, malware,
Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks Daigo MURAMATSU
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2010/03/01 Vol. E93-DNo. 3 ;
pp. 448-457 Type of Manuscript: Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications) Category: Keyword: hill-climbing attack, online signature verification, biometrics, vulnerability, offline attack,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2006/06/01 Vol. E89-ANo. 6 ;
pp. 1607-1614 Type of Manuscript: Special Section PAPER (Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005)) Category: Keyword: quantum-dot cellular automata, vulnerability, unbalanced input path, sneak noise path, disciplinary guideline,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2005/12/01 Vol. E88-DNo. 12 ;
pp. 2691-2698 Type of Manuscript: Special Section PAPER (IEICE/IEEE Joint Special Section on Autonomous Decentralized Systems) Category: Keyword: Web services, Web services testing, test case generation, vulnerability, model checking,