検索コンセプト
|
選択されたフィルタ
|
検索結果
-
Secured information service platforms effective in case of disasters-Using multilayered communications network
Adachi, F., Tokuda, K. & Ohmori, S., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012. IEEE Computer Society, p. 348-349 2 p. 6398813. (International Symposium on Wireless Personal Multimedia Communications, WPMC).研究成果: Conference contribution
1 被引用数 (Scopus) -
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., 2019 3月 8, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).研究成果: Conference contribution
5 被引用数 (Scopus) -
Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing
Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H. & Yamana, H., 2016, Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Proceedings. Springer Verlag, Vol. 9963 LNCS. p. 181-195 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9963 LNCS).研究成果: Conference contribution
7 被引用数 (Scopus) -
Secure Image Inference Using Pairwise Activation Functions
Agyepong, J. T., Soliman, M., Wada, Y., Kimura, K. & El-Mahdy, A., 2021, In: IEEE Access. 9, p. 118271-118290 20 p., 9521226.研究成果: Article › 査読
Open Access -
Secure information flow as a safety problem
Terauchi, T. & Aiken, A., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 352-367 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3672 LNCS).研究成果: Conference contribution
173 被引用数 (Scopus) -
Secure interoperability between cooperating XML systems by dynamic role translation
Chatvichienchai, S., Iwaihara, M. & Kambayashi, Y., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2736, p. 866-875 10 p.研究成果: Article › 査読
1 被引用数 (Scopus) -
Secure key distribution using correlated randomness in lasers driven by common random light
Yoshimura, K., Muramatsu, J., Davis, P., Harayama, T., Okumura, H., Morikatsu, S., Aida, H. & Uchida, A., 2012 2月 14, In: Physical Review Letters. 108, 7, 070602.研究成果: Article › 査読
97 被引用数 (Scopus) -
Secure naïve bayes classification protocol over encrypted data using fully homomorphic encryption
Yasumura, Y., Ishimaki, Y. & Yamana, H., 2019 12月 2, 21st International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2019 - Proceedings. Indrawan-Santiago, M., Pardede, E., Salvadori, I. L., Steinbauer, M., Khalil, I. & Anderst-Kotsis, G. (eds.). Association for Computing Machinery, (ACM International Conference Proceeding Series).研究成果: Conference contribution
2 被引用数 (Scopus) -
Secure non-transferable proxy re-encryption for group membership and non-membership
Cho, E. M., San, L. & Koshiba, T., 2018, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 876-887 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 7).研究成果: Chapter
-
Secure pattern matching using somewhat homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).研究成果: Conference contribution
73 被引用数 (Scopus) -
Secure scan design using improved random order and its evaluations
Oya, M., Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2015 2月 5, 2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014. February ed. Institute of Electrical and Electronics Engineers Inc., p. 555-558 4 p. 7032842. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS; vol. 2015-February, no. February).研究成果: Conference contribution
4 被引用数 (Scopus) -
Secure scan design with dynamically configurable connection
Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2013 1月 1, Proceedings - 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013. IEEE Computer Society, p. 256-262 7 p. 6820873. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).研究成果: Conference contribution
23 被引用数 (Scopus) -
Secure SMS transmission based on verifiable hash convergent group signcryption
Cho, E. M. & Koshiba, T., 2017 6月 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472. (Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017).研究成果: Conference contribution
2 被引用数 (Scopus) -
Secure statistical analysis using RLWE-based homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).研究成果: Conference contribution
18 被引用数 (Scopus) -
Secure voting using partially compatible homomorphisms
Sako, K. & Kilian, J., 1994, Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 411-424 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 839 LNCS).研究成果: Conference contribution
Open Access91 被引用数 (Scopus) -
Secure wavelet matrix: Alphabet-friendly privacy-preserving string search for bioinformatics
Sudo, H., Jimbo, M., Nuida, K. & Shimizu, K., 2019 9月, In: IEEE/ACM Transactions on Computational Biology and Bioinformatics. 16, 5, p. 1675-1684 10 p., 3370684.研究成果: Article › 査読
7 被引用数 (Scopus) -
Securing big data and IoT networks in smart cyber-physical environments
Das, S. K. & Yamana, H., 2017 7月 21, 2017 International Conference on Smart Digital Environment, ICSDE 2017 - Proceedings. Benhaddou, D., Habbani, A., Al-Fuqahaa, A. & El Bouanani, F. (eds.). Association for Computing Machinery, p. 189-194 6 p. (ACM International Conference Proceeding Series; vol. Part F130526).研究成果: Conference contribution
-
Securing compliance through the WTO dispute settlement system: Implementation of DSB recommendations
Fukunaga, Y., 2006 6月 1, In: Journal of International Economic Law. 9, 2, p. 383-426 44 p.研究成果: Review article › 査読
26 被引用数 (Scopus) -
Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
Yu, K., Tan, L., Mumtaz, S., Al-Rubaye, S., Al-Dulaimi, A., Bashir, A. K. & Khan, F. A., 2021 10月 1, In: IEEE Communications Magazine. 59, 10, p. 76-82 7 p.研究成果: Article › 査読
24 被引用数 (Scopus) -
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement
Wu, J., Dong, M., Ota, K., Liang, L. & Zhou, Z., 2015 11月 21, In: Peer-to-Peer Networking and Applications. 8, 6, p. 1133-1142 10 p.研究成果: Article › 査読
25 被引用数 (Scopus) -
Securing Radio Resources Allocation with Deep Reinforcement Learning for IoE Services in Next-generation Wireless Networks
Yuhuai, P., Xue, X., Bashir, A. K., Zhu, X., Al-Otaibi, Y. D., Tariq, U. & Yu, K., 2022, (Accepted/In press) In: IEEE Transactions on Network Science and Engineering.研究成果: Article › 査読
-
Security
Ohta, H., 2014 7月 11, Essential Concepts of Global Environmental Governance. Taylor and Francis Inc., p. 191-193 3 p.研究成果: Chapter
-
Security
Ohta, H., 2020 8月 31, Essential Concepts of Global Environmental Governance. Taylor and Francis Inc., p. 236-237 2 p.研究成果: Chapter
-
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things
Feng, X., Wu, J., Wang, K., Li, J. & Wang, M., 2018 3月 29, Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc., p. 326-330 5 p. (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017; vol. 2018-January).研究成果: Conference contribution
3 被引用数 (Scopus) -
Security and guidance: Two roles for a humanoid robot in an interaction experiment
Trovato, G., Lopez, A., Paredes, R. & Cuellar, F., 2017 12月 8, RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication. Institute of Electrical and Electronics Engineers Inc., p. 230-235 6 p. (RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication; vol. 2017-January).研究成果: Conference contribution
7 被引用数 (Scopus) -
Security and intelligent management for fog/edge computing resources
Wu, J., 2021, Advances in Information Security. Springer, p. 213-234 22 p. (Advances in Information Security; vol. 83).研究成果: Chapter
-
Security and privacy behavior definition for behavior driven development
Okubo, T., Kakizaki, Y., Kobashi, T., Washizaki, H., Ogata, S., Kaiya, H. & Yoshioka, N., 2014, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8892, p. 306-309 4 p.研究成果: Article › 査読
1 被引用数 (Scopus) -
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)
Park, N., Hu, H. & Jin, Q., 2016, In: International Journal of Distributed Sensor Networks. 2016, 2965438.研究成果: Editorial › 査読
22 被引用数 (Scopus) -
Security-aware distributed service composition for wireless sensor networks based smart metering in smart grid using software defined networks
Li, G., Wu, Y., Wu, J., Li, J. & Zhao, C., 2018, Wireless Internet - 9th International Conference, WICON 2016, Proceedings. Huang, M., Jing, W., Mehmood, A. & Zhang, Y. (eds.). Springer Verlag, p. 91-97 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 214).研究成果: Conference contribution
1 被引用数 (Scopus) -
Security driven requirements refinement and exploration of architecture with multiple NFR points of view
Okubo, T., Yoshioka, N. & Kaiya, H., 2014, p. 201-205. 5 p.研究成果: Paper › 査読
2 被引用数 (Scopus) -
Security enhancement of electric power systems by approximate reasoning
Niimura, T. & Yokoyama, R., 1995, IEEE International Conference on Fuzzy Systems. Anon (ed.). Piscataway, NJ, United States: IEEE, Vol. 1. p. 205-210 6 p.研究成果: Conference contribution
2 被引用数 (Scopus) -
Security for IEEE P1451.0-Based IoT Sensor Networks
Zhou, K., Wu, J., Lee, K. B. & Song, E. Y., 2021 10月 13, IECON 2021 - 47th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society, (IECON Proceedings (Industrial Electronics Conference); vol. 2021-October).研究成果: Conference contribution
-
Security for mobile agents
Yoshioka, N., Tahara, Y., Ohsuga, A. & Honiden, S., 2001 12月 1, Agent-Oriented Software Engineering - First International Workshop, AOSE 2000, Revised Papers. p. 223-234 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1957 LNCS).研究成果: Conference contribution
3 被引用数 (Scopus) -
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Lin, G., Dong, M., Ota, K., Li, J., Yang, W. & Wu, J., 2019 5月, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8761217. (IEEE International Conference on Communications; vol. 2019-May).研究成果: Conference contribution
2 被引用数 (Scopus) -
Security in photonic networks: Threats and security enhancement
Kitayama, K. I., Sasaki, M., Araki, S., Tsubokawa, M., Tomita, A., Inoue, K., Harasawa, K., Nagasako, Y. & Takada, A., 2011, In: Journal of Lightwave Technology. 29, 21, p. 3210-3222 13 p., 6003728.研究成果: Article › 査読
68 被引用数 (Scopus) -
Security patterns: Comparing modeling approaches
Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C. B., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, T. T., Washizaki, H., Yoshioka, N. & Yu, Y., 2010 12月 1, Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global, p. 75-111 37 p.研究成果: Chapter
21 被引用数 (Scopus) -
Security patterns: A method for constructing secure and efficient inter-company coordination systems
Yoshioka, N., Honiden, S. & Finkelstein, A., 2004, Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. p. 84-97 14 p. (Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC).研究成果: Conference contribution
17 被引用数 (Scopus) -
Security patterns: Research direction, metamodel, application and verification
Washizaki, H., 2018 1月 29, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).研究成果: Conference contribution
5 被引用数 (Scopus) -
Security Requirement Modeling Support System Using Software Security Knowledge Base
Hazeyama, A., Tanaka, SI., Tanaka, T., Hashiura, H., Munetoh, S., Okubo, T., Kaiya, H., Washizaki, H. & Yoshioka, N., 2018 6月 8, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 234-239 6 p. 8377863. (Proceedings - International Computer Software and Applications Conference; vol. 2).研究成果: Conference contribution
1 被引用数 (Scopus) -
Security requirements analysis using knowledge in CAPEC
Kaiya, H., Kono, S., Ogata, S., Okubo, T., Yoshioka, N., Washizaki, H. & Kaijiri, K., 2014, Advanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops, Proceedings. Springer Verlag, p. 343-348 6 p. (Lecture Notes in Business Information Processing; vol. 178 LNBIP).研究成果: Conference contribution
6 被引用数 (Scopus) -
Security system for power plant with wireless sensor network using WHM-1 wireless module
Yu, T. R., Yamauchi, N. & Shimokado, S., 2008 11月 28, 2008 7th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT. p. 75-80 6 p. 4653543. (2008 7th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT).研究成果: Conference contribution
-
Sedentary behavior and estimated nephron number in middle-aged and older adults with or without chronic kidney disease
Kosaki, K., Takahashi, K., Matsui, M., Yoshioka, M., Mori, S., Nishitani, N., Shibata, A., Saito, C., Kuro-o, M., Yamagata, K., Oka, K. & Maeda, S., 2021 10月 15, In: Experimental Gerontology. 154, 111531.研究成果: Article › 査読
-
Sedentary behaviour, physical activity, and renal function in older adults: Isotemporal substitution modelling
Kosaki, K., Tanahashi, K., Matsui, M., Akazawa, N., Osuka, Y., Tanaka, K., Dunstan, D. W., Owen, N., Shibata, A., Oka, K. & Maeda, S., 2020 6月 3, In: BMC Nephrology. 21, 1, 211.研究成果: Article › 査読
Open Access5 被引用数 (Scopus) -
Sedentary behaviour and health: Mapping environmental and social contexts to underpin chronic disease prevention
Owen, N., Salmon, J., Koohsari, M. J., Turrell, G. & Giles-Corti, B., 2014 2月, In: British journal of sports medicine. 48, 3, p. 174-177 4 p.研究成果: Article › 査読
Open Access132 被引用数 (Scopus) -
Sedentary time in a nationally representative sample of adults in Japan: Prevalence and sociodemographic correlates
Kitayama, A., Koohsari, M. J., Ishii, K., Shibata, A. & Oka, K., 2021 9月, In: Preventive Medicine Reports. 23, 101439.研究成果: Article › 査読
Open Access1 被引用数 (Scopus) -
Sedentary time in older adults: A critical review of measurement, associations with health, and interventions
Copeland, J. L., Ashe, M. C., Biddle, S. J., Brown, W. J., Buman, M. P., Chastin, S., Gardiner, P. A., Inoue, S., Jefferis, B. J., Oka, K., Owen, N., Sardinha, L. B., Skelton, D. A., Sugiyama, T. & Dogra, S., 2017 11月, In: British journal of sports medicine. 51, 21, 1539.研究成果: Review article › 査読
Open Access118 被引用数 (Scopus) -
Sedentary time in older men and women: An international consensus statement and research priorities
Dogra, S., Ashe, M. C., Biddle, S. J. H., Brown, W. J., Buman, M. P., Chastin, S., Gardiner, P. A., Inoue, S., Jefferis, B. J., Oka, K., Owen, N., Sardinha, L. B., Skelton, D. A., Sugiyama, T. & Copeland, J. L., 2017 11月, In: British journal of sports medicine. 51, 21, p. 1526-1532 7 p.研究成果: Article › 査読
Open Access50 被引用数 (Scopus) -
Sediment accumulation owing to backwater effect in the lower reach of the Stung Sen River, Cambodia
Nagumo, N., Kubo, S., Sugai, T. & Egashira, S., 2017 11月 1, In: Geomorphology. 296, p. 182-192 11 p.研究成果: Article › 査読
3 被引用数 (Scopus) -
Sedimentary features of the seismo-turbidites, Lake Biwa, Japan
Shiki, T., Kumon, F., Inouchi, Y., Kontani, Y., Sakamoto, T., Tateishi, M., Matsubara, H. & Fukuyama, K., 2000, In: Sedimentary Geology. 135, 1-4, p. 37-50 14 p.研究成果: Article › 査読
80 被引用数 (Scopus) -
Sedimentary PGE signatures in the Late Triassic ejecta deposits from Japan: Implications for the identification of impactor
Sato, H., Shirai, N., Ebihara, M., Onoue, T. & Kiyokawa, S., 2016 1月 15, In: Palaeogeography, Palaeoclimatology, Palaeoecology. 442, p. 36-47 12 p.研究成果: Article › 査読
8 被引用数 (Scopus)