Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Naoto YANAI"'
Autor:
Mine Arai, Koki Tejima, Yuya Yamada, Takayuki Miura, Kyosuke Yamashita, Chihiro Kado, Rei Shimizu, Masataka Tatsumi, Naoto Yanai, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 12, Pp 47359-47372 (2024)
Education in cybersecurity is crucial in the current society, and it will be extended into the artificial intelligence (AI) area, called AI security, in the near future. Although many video games for education in cybersecurity have been designed, we
Externí odkaz:
https://doaj.org/article/b721b94afbd4493daa5f07d31a148868
Publikováno v:
IEEE Access, Vol 11, Pp 62955-62969 (2023)
We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) a system manager broadcasts information to IoT devices, e.g., wireless environment, only the designated devices can identify operations se
Externí odkaz:
https://doaj.org/article/43ef327aa79b4f8484e3aed2df19c59c
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 4, Pp 269-306 (2023)
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called AS employs invalid routes. Recently, a data object called Autonomous System Provider Authorization (ASPA) was proposed as a new specification for verifying PATH
Externí odkaz:
https://doaj.org/article/e78b7dbe16994c75ae241adbf3001165
Publikováno v:
Blockchain: Research and Applications, Vol 3, Iss 4, Pp 100101- (2022)
Ethereum smart contracts are computer programs that are deployed and executed on the Ethereum blockchain to enforce agreements among untrusting parties. Being the most prominent platform that supports smart contracts, Ethereum has been targeted by ma
Externí odkaz:
https://doaj.org/article/112ce893f00b4527ad8e22ffc5ea4dc0
Autor:
Kazuki Iwahana, Tatsuya Takemura, Ju Chien Cheng, Nami Ashizawa, Naoki Umeda, Kodai Sato, Ryota Kawakami, Rei Shimizu, Yuichiro Chinen, Naoto Yanai
Publikováno v:
IEEE Access, Vol 9, Pp 78293-78314 (2021)
Fast and accurate malicious domain detection is an essential research theme to prevent cybercrime, and machine learning is an attractive approach for detecting unseen malicious domains in the past decade. In this paper, we present MADMAX (MAchine lea
Externí odkaz:
https://doaj.org/article/7687dcec26e7486692e49b3cc31523c0
Publikováno v:
IEEE Access, Vol 8, Pp 24153-24169 (2020)
In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp. 2016) proposed key-aggregate searchable encryption (KASE), which allow
Externí odkaz:
https://doaj.org/article/b86157783a6f4608a035c82c6a7ef5a4
Publikováno v:
IEEE Access, Vol 7, Pp 74849-74868 (2019)
In ad hoc networks that allow devices to dynamically configure networks via wireless communication, a secure routing protocol is a technology that guarantees the validity of routing with the use of cryptographic authentication. The secure DSR with ID
Externí odkaz:
https://doaj.org/article/9161eea6b2934a97ba384fab8c7bb9ea
Publikováno v:
IEEE Access, Vol 7, Pp 74941-74960 (2019)
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention. Some previous studies have adopted formal methods, but their models cannot express paral
Externí odkaz:
https://doaj.org/article/33c03eb804f34b6689a6dbc7f9b58d63
Autor:
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 7, Pp 139021-139034 (2019)
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ma
Externí odkaz:
https://doaj.org/article/0b6f5f7b90144a00be9f62d9ecbb6ace
Publikováno v:
IEEE Access, Vol 6, Pp 12240-12251 (2018)
The role-based access control (RBAC) framework is a mechanism that describes the access control principle. As a common interaction, an organization provides a service to a user who owns a certain role that was issued by a different organization. Such
Externí odkaz:
https://doaj.org/article/47bbd272be214a9baeed135e06e2d138