default search action
BibTeX records: Ryôichi Sasaki
@article{DBLP:journals/sncs/HorikawaOTKMTSN23, author = {Hiroshi Horikawa and Hisamichi Ohtani and Yuji Takahashi and Takehisa Kato and Fumihiko Magata and Yoshimi Teshigawara and Ry{\^{o}}ichi Sasaki and Masakatsu Nishigaki}, title = {Enhancement of a Company-Wide Information Security Management System Through Incident Learning}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {3}, pages = {211}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-01691-7}, doi = {10.1007/S42979-023-01691-7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/HorikawaOTKMTSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metacom/SeyamaS23, author = {Toshiya Seyama and Ry{\^{o}}ichi Sasaki}, title = {Trial of Risk Assessment for Business Application of Metaverse}, booktitle = {{IEEE} International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023}, pages = {632--636}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MetaCom57706.2023.00111}, doi = {10.1109/METACOM57706.2023.00111}, timestamp = {Thu, 21 Mar 2024 17:12:49 +0100}, biburl = {https://dblp.org/rec/conf/metacom/SeyamaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Sasaki23, author = {Ry{\^{o}}ichi Sasaki}, title = {{AI} and Security - What Changes with Generative {AI}}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023}, pages = {208--215}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS-C60940.2023.00043}, doi = {10.1109/QRS-C60940.2023.00043}, timestamp = {Tue, 05 Mar 2024 11:59:07 +0100}, biburl = {https://dblp.org/rec/conf/qrs/Sasaki23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Sasaki23a, author = {Ry{\^{o}}ichi Sasaki}, title = {Reconsideration of Risk Communication and Risk Assessment Support Methods for Security}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023}, pages = {516--523}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS-C60940.2023.00042}, doi = {10.1109/QRS-C60940.2023.00042}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/Sasaki23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/LiuSU23, author = {Jigang Liu and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara}, title = {An Ontology-Based Framework for Medical IoT Forensic Evidence}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023}, pages = {863--864}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS-C60940.2023.00124}, doi = {10.1109/QRS-C60940.2023.00124}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/LiuSU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Sasaki22, author = {Ry{\^{o}}ichi Sasaki}, title = {Trial Application of Risk Assessment Method for Metaverse}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9, 2022}, pages = {120--128}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS-C57518.2022.00026}, doi = {10.1109/QRS-C57518.2022.00026}, timestamp = {Sat, 22 Apr 2023 17:02:06 +0200}, biburl = {https://dblp.org/rec/conf/qrs/Sasaki22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/HasegawaSS22, author = {Taichi Hasegawa and Taiichi Saito and Ry{\^{o}}ichi Sasaki}, title = {Analyzing Metadata in {PDF} Files Published by Police Agencies in Japan}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9, 2022}, pages = {145--151}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS-C57518.2022.00029}, doi = {10.1109/QRS-C57518.2022.00029}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/HasegawaSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Sasaki21, author = {Ry{\^{o}}ichi Sasaki}, title = {Application of Risk Assessment Method to Local Government Security Models}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00121}, doi = {10.1109/QRS-C55045.2021.00121}, timestamp = {Tue, 12 Apr 2022 17:57:49 +0200}, biburl = {https://dblp.org/rec/conf/qrs/Sasaki21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/KanekoYS21, author = {Tomoko Kaneko and Nobukazu Yoshioka and Ry{\^{o}}ichi Sasaki}, title = {Cyber-Security Incident Analysis by Causal Analysis using System Theory {(CAST)}}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {806--815}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00123}, doi = {10.1109/QRS-C55045.2021.00123}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/KanekoYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/KakizakiSOY20, author = {Yoshio Kakizaki and Ry{\^{o}}ichi Sasaki and Tomohide Okochi and Hiroshi Yasuda}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Makoto Takizawa}, title = {CySec: Cybersecurity Review Program for Professionals in Japan}, booktitle = {Advances in Networked-Based Information Systems - The 23rd International Conference on Network-Based Information Systems, NBiS 2020, Victoria, BC, Canada, 31 August - 2 September 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1264}, pages = {280--289}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57811-4\_26}, doi = {10.1007/978-3-030-57811-4\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/KakizakiSOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/KanekoYS20, author = {Tomoko Kaneko and Nobukazu Yoshioka and Ry{\^{o}}ichi Sasaki}, title = {{STAMP} S{\&}S: Safety {\&} Security Scenario for Specification and Standard in the society of AI/IoT}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2020, Macau, China, December 11-14, 2020}, pages = {168--175}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS-C51114.2020.00037}, doi = {10.1109/QRS-C51114.2020.00037}, timestamp = {Tue, 26 Jan 2021 17:41:14 +0100}, biburl = {https://dblp.org/rec/conf/qrs/KanekoYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/KobayashiSS20, author = {Haruki Kobayashi and Taiichi Saito and Ry{\^{o}}ichi Sasaki}, title = {Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2020, Macau, China, December 11-14, 2020}, pages = {184--189}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS-C51114.2020.00039}, doi = {10.1109/QRS-C51114.2020.00039}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/KobayashiSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/Sasaki20, author = {Ry{\^{o}}ichi Sasaki}, title = {Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2020, Macau, China, December 11-14, 2020}, pages = {190--197}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS-C51114.2020.00040}, doi = {10.1109/QRS-C51114.2020.00040}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/Sasaki20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/LiuSU20, author = {Jigang Liu and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara}, title = {Towards a Holistic Approach to Medical IoT Forensics}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2020, Macau, China, December 11-14, 2020}, pages = {686--687}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS-C51114.2020.00121}, doi = {10.1109/QRS-C51114.2020.00121}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/LiuSU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/KakizakiNS18, author = {Yoshio Kakizaki and Shiomi Nishibiro and Ry{\^{o}}ichi Sasaki}, title = {A Mixed Content Awareness Tool for Safe Browsing}, journal = {J. Comput.}, volume = {13}, number = {1}, pages = {90--99}, year = {2018}, url = {https://doi.org/10.17706/jcp.13.1.90-99}, doi = {10.17706/JCP.13.1.90-99}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcp/KakizakiNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/KanekoTOS18, author = {Tomoko Kaneko and Yuji Takahashi and Takao Okubo and Ry{\^{o}}ichi Sasaki}, editor = {Nobukazu Yoshioka and Hironori Washizaki and Eduardo B. Fern{\'{a}}ndez and Tomoko Kaneko and Shuichiro Yamamoto and Fuyuki Ishikawa and Foutse Khomh and Giuliano Antoniol}, title = {An Assurance Case Approach for Software Code Security}, booktitle = {Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference {(APSEC} 2018), Nara, Japan, December 4, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2809}, pages = {10--17}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2809/WESPr-18\_02.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:12 +0100}, biburl = {https://dblp.org/rec/conf/apsec/KanekoTOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SasakiUL18, author = {Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Jigang Liu}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Md. Kamrul Hasan}, title = {Message from the {CFSE} 2018 Workshop Organizers}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {352}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10256}, doi = {10.1109/COMPSAC.2018.10256}, timestamp = {Mon, 19 Aug 2024 08:42:01 +0200}, biburl = {https://dblp.org/rec/conf/compsac/SasakiUL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icncc/HayakawaSHTKO18, author = {Takuo Hayakawa and Ry{\^{o}}ichi Sasaki and Hiroshi Hayashi and Yuji Takahashi and Tomoko Kaneko and Takao Okubo}, title = {Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT}, booktitle = {Proceedings of the {VII} International Conference on Network, Communication and Computing, {ICNCC} 2018, Taipei City, Taiwan, December 14-16, 2018}, pages = {157--164}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3301326.3301330}, doi = {10.1145/3301326.3301330}, timestamp = {Thu, 14 Mar 2019 08:28:46 +0100}, biburl = {https://dblp.org/rec/conf/icncc/HayakawaSHTKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nof/KimiyamaYTSYUSK17, author = {Hiroyuki Kimiyama and Naoki Yonezaki and Tomoaki Tsutsumi and Kaori Sano and Hirofumi Yamaki and Yoichiro Ueno and Ry{\^{o}}ichi Sasaki and Hiroshi Kobayashi}, editor = {Toktam Mahmoodi and Stefano Secci and Antonio Cianfrani and Filip Idzikowski}, title = {Autonomous and distributed internet security {(AIS)} infrastructure for safe internet}, booktitle = {8th International Conference on the Network of the Future, {NOF} 2017, London, United Kingdom, November 22-24, 2017}, pages = {106--113}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NOF.2017.8251228}, doi = {10.1109/NOF.2017.8251228}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/nof/KimiyamaYTSYUSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/LiuKSU17, author = {Jigang Liu and Rashmi Kammar and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara}, title = {Malware Behavior Ontology for Digital Evidence}, booktitle = {2017 {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS-C} 2017, Prague, Czech Republic, July 25-29, 2017}, pages = {585--586}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/QRS-C.2017.105}, doi = {10.1109/QRS-C.2017.105}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/LiuKSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SasakiUL16, author = {Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Jigang Liu}, title = {Message from the {CFSE} Workshop Organizers}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {355}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.278}, doi = {10.1109/COMPSAC.2016.278}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SasakiUL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/TsuchiyaFTKMTSN16, author = {Takashi Tsuchiya and Masahiro Fujita and Kenta Takahashi and Takehisa Kato and Fumihiko Magata and Yoshimi Teshigawara and Ry{\^{o}}ichi Sasaki and Masakatsu Nishigaki}, editor = {Theo Tryfonas}, title = {Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - 4th International Conference, {HAS} 2016, Held as Part of {HCI} International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9750}, pages = {77--88}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39381-0\_8}, doi = {10.1007/978-3-319-39381-0\_8}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/TsuchiyaFTKMTSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/SamejimaS15, author = {Masaki Samejima and Ry{\^{o}}ichi Sasaki}, title = {Chance-Constrained Programming Method of {IT} Risk Countermeasures for Social Consensus Making}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {45}, number = {5}, pages = {725--733}, year = {2015}, url = {https://doi.org/10.1109/TSMC.2014.2376491}, doi = {10.1109/TSMC.2014.2376491}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/SamejimaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SasakiUL15, author = {Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Jigang Liu}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Message from the {CFSE} 2015 Workshop Organizers}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {17}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.297}, doi = {10.1109/COMPSAC.2015.297}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SasakiUL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/OkayasuS15, author = {Shota Okayasu and Ry{\^{o}}ichi Sasaki}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C{\&}C Server Used in a Botnet}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.165}, doi = {10.1109/COMPSAC.2015.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/OkayasuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/UmeharaAS15, author = {Yuhei Umehara and Hayai Ando and Ry{\^{o}}ichi Sasaki}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of {IT} Risks}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {40--46}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.172}, doi = {10.1109/COMPSAC.2015.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/UmeharaAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/WangUS15, author = {Yifan Wang and Tetsutaro Uehara and Ry{\^{o}}ichi Sasaki}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Fog Computing: Issues and Challenges in Security and Forensics}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {53--59}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.173}, doi = {10.1109/COMPSAC.2015.173}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/WangUS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/HashimotoHMKKYU15, author = {Kazuki Hashimoto and Hiroyuki Hiruma and Takashi Matsumoto and Kosetus Kayama and Yoshio Kaikizaki and Hiroshi Yamaki and Tetsutaro Uehara and Ry{\^{o}}ichi Sasaki}, title = {Development of Intellectual Network Forensic System {LIFT} against Targeted Attacks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {16--21}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.13}, doi = {10.1109/CYBERSEC.2015.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/HashimotoHMKKYU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/KoizumiS15, author = {Ryohei Koizumi and Ry{\^{o}}ichi Sasaki}, title = {Study on Countermeasures Using Mitigation Software against Vulnerability Attacks}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {28--33}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.15}, doi = {10.1109/CYBERSEC.2015.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/KoizumiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/SatoSHIS15, author = {Makoto Sato and Akihiko Sugimoto and Naoki Hayashi and Yoshiaki Isobe and Ry{\^{o}}ichi Sasaki}, title = {Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {40--45}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.17}, doi = {10.1109/CYBERSEC.2015.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/SatoSHIS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/NakagawaTS15, author = {Naoto Nakagawa and Yoshimi Teshigawara and Ry{\^{o}}ichi Sasaki}, title = {Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {46--51}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.18}, doi = {10.1109/CYBERSEC.2015.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersec/NakagawaTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec/AkiyamaOKS15, author = {Takumi Akiyama and Kazuya Otani and Yoshio Kakizaki and Ry{\^{o}}ichi Sasaki}, title = {Evaluation of a Risk-Based Management Method for Online Accounts}, booktitle = {Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015}, pages = {52--57}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberSec.2015.19}, doi = {10.1109/CYBERSEC.2015.19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec/AkiyamaOKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/KobayashiS14, author = {Naoki Kobayashi and Ry{\^{o}}ichi Sasaki}, title = {Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of Evidence}, booktitle = {{IEEE} 38th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014}, pages = {343--347}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/COMPSACW.2014.60}, doi = {10.1109/COMPSACW.2014.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/KobayashiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/YajimaTS14, author = {Hiroshi Yajima and Naohisa Tanabe and Ry{\^{o}}ichi Sasaki}, editor = {Masaaki Kurosu}, title = {Proposal of Collaborative Learning Support Method in Risk Communications}, booktitle = {Human-Computer Interaction. Theories, Methods, and Tools - 16th International Conference, {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8510}, pages = {457--465}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07233-3\_42}, doi = {10.1007/978-3-319-07233-3\_42}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/YajimaTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, title = {Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {104--113}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.104}, doi = {10.22667/JOWUA.2013.06.31.104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakahashiSU13, author = {Wataru Takahashi and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara}, title = {Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone}, booktitle = {{IEEE} 37th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013}, pages = {21--26}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/COMPSACW.2013.20}, doi = {10.1109/COMPSACW.2013.20}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TakahashiSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {312--317}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_33}, doi = {10.1007/978-3-642-36818-9\_33}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/SatoSS13, author = {Katsunori Sato and Masaki Samejima and Ry{\^{o}}ichi Sasaki}, title = {Chance-Constrained Programming Method by Constraints Aggregation for Social Consensus Making on {IT} Risk Countermeasure}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013}, pages = {4789--4793}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SMC.2013.815}, doi = {10.1109/SMC.2013.815}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/SatoSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/shonan-reports/EchizenMST13, author = {Isao Echizen and G{\"{u}}nter M{\"{u}}ller and Ry{\^{o}}ichi Sasaki and A Min Tjoa}, title = {Privacy by Transparency for Data-Centric Services {(NII} Shonan Meeting 2013-5)}, journal = {{NII} Shonan Meet. Rep.}, volume = {2013}, year = {2013}, url = {https://shonan.nii.ac.jp/seminars/032/}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/shonan-reports/EchizenMST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AhmedNSSW12, author = {Irfan Ahmed and Martin Naedele and Bradley L. Schatz and Ry{\^{o}}ichi Sasaki and Andrew West}, title = {Message from the guest editors}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {213}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0168-3}, doi = {10.1007/S10207-012-0168-3}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AhmedNSSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imt/Sasaki12, author = {Ry{\^{o}}ichi Sasaki}, title = {Considerations on Risk Communication for {IT} Systems and Development of Support Systems}, journal = {Inf. Media Technol.}, volume = {7}, number = {4}, pages = {1606--1614}, year = {2012}, url = {https://doi.org/10.11185/imt.7.1606}, doi = {10.11185/IMT.7.1606}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imt/Sasaki12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Sasaki12, author = {Ry{\^{o}}ichi Sasaki}, title = {Considerations on Risk Communication for {IT} Systems and Development of Support Systems}, journal = {J. Inf. Process.}, volume = {20}, number = {4}, pages = {814--822}, year = {2012}, url = {https://doi.org/10.2197/ipsjjip.20.814}, doi = {10.2197/IPSJJIP.20.814}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/Sasaki12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SakumaS12, author = {Takashi Sakuma and Ry{\^{o}}ichi Sasaki}, editor = {Xiaoying Bai and Fevzi Belli and Elisa Bertino and Carl K. Chang and Atilla El{\c{c}}i and Cristina Cerschi Seceleanu and Haihua Xie and Mohammad Zulkernine}, title = {Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy Protection}, booktitle = {36th Annual {IEEE} Computer Software and Applications Conference Workshops, {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {200--205}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/COMPSACW.2012.45}, doi = {10.1109/COMPSACW.2012.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SakumaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/SamejimaS12, author = {Masaki Samejima and Ry{\^{o}}ichi Sasaki}, title = {Approximation method for chance-constrained programming of social consensus formation concerning {IT} risk countermeasure}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2012, Seoul, Korea (South), October 14-17, 2012}, pages = {2751--2755}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICSMC.2012.6378164}, doi = {10.1109/ICSMC.2012.6378164}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/SamejimaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiuUS11, author = {Jigang Liu and Tetsutaro Uehara and Ry{\^{o}}ichi Sasaki}, title = {Development of digital forensics practice and research in Japan}, journal = {Wirel. Commun. Mob. Comput.}, volume = {11}, number = {2}, pages = {240--253}, year = {2011}, url = {https://doi.org/10.1002/wcm.981}, doi = {10.1002/WCM.981}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/LiuUS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SasakiTOYMK11, author = {Ry{\^{o}}ichi Sasaki and Kazushige Takakusaki and Masaru Ohkawara and Hiroshi Yajima and Hidetaka Masuda and Tetsuro Kobayashi}, title = {Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning {IT} Risk Countermeasures}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {499--506}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.76}, doi = {10.1109/ARES.2011.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SasakiTOYMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/UemuraTKS11, author = {Takashi Uemura and Shota Takagi and Yusuke Kosuda and Ry{\^{o}}ichi Sasaki}, title = {A Proposed Web Access Control System Request Policy Framework for Cooperation of {DNS} and a Web Browser}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {549--554}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.84}, doi = {10.1109/ARES.2011.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/UemuraTKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/TanakaKTS11, author = {Tatsuya Tanaka and Toshifumi Kai and Yusuke Tamura and Ry{\^{o}}ichi Sasaki}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {Development and Evaluation of Defaced Sites Automatic Detection System {DICE}}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {196--201}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.61}, doi = {10.1109/IIHMSP.2011.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/TanakaKTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SakuraiAUYS10, author = {Yui Sakurai and Yuki Ashino and Tetsutaro Uehara and Hiroshi Yoshiura and Ry{\^{o}}ichi Sasaki}, title = {HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {21--34}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1073}, doi = {10.15394/JDFSL.2010.1073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SakuraiAUYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/YamamotoUMTSN10, author = {Takumi Yamamoto and Yuma Usui and Fumihiko Magata and Yoshimi Teshigawara and Ry{\^{o}}ichi Sasaki and Masakatsu Nishigaki}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {A Security Measure Selection Scheme with Consideration of Potential Lawsuits}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {104--110}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Wed, 05 Nov 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/YamamotoUMTSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/SamejimaAKS10, author = {Masaki Samejima and Masanori Akiyoshi and Norihisa Komoda and Ry{\^{o}}ichi Sasaki}, title = {Social consensus making support system by qualitative and quantitative hybrid simulation}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Istanbul, Turkey, 10-13 October 2010}, pages = {896--901}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICSMC.2010.5641872}, doi = {10.1109/ICSMC.2010.5641872}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/SamejimaAKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/ItakuraSAS10, author = {Kota Itakura and Masaki Samejima and Masanori Akiyoshi and Ry{\^{o}}ichi Sasaki}, title = {A consensus support system for deciding a combination of risk-reducing plans under uncertain parameters}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Istanbul, Turkey, 10-13 October 2010}, pages = {2083--2087}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICSMC.2010.5641710}, doi = {10.1109/ICSMC.2010.5641710}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/ItakuraSAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2010, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3}, doi = {10.1007/978-3-642-16825-3}, isbn = {978-3-642-16824-6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2010s, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, isbn = {978-4-915256-78-3}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2010s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/KosudaS09, author = {Yusuke Kosuda and Ry{\^{o}}ichi Sasaki}, editor = {Claude Godart and Norbert Gronau and Sushil K. Sharma and G{\'{e}}r{\^{o}}me Canals}, title = {Proposal and Implementation of {SSH} Client System Using Ajax}, booktitle = {Software Services for e-Business and e-Society, 9th {IFIP} {WG} 6.1 Conference on e-Business, e-Services and e-Society, {I3E} 2009, Nancy, France, September 23-25, 2009. Proceedings}, series = {{IFIP}}, volume = {305}, pages = {184--196}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04280-5\_16}, doi = {10.1007/978-3-642-04280-5\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/KosudaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/AshinoFFUS09, author = {Yuki Ashino and Keisuke Fujita and Maiko Furusawa and Tetsutaro Uehara and Ry{\^{o}}ichi Sasaki}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Implementing Boot Control for Windows Vista}, booktitle = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {306}, pages = {133--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04155-6\_10}, doi = {10.1007/978-3-642-04155-6\_10}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/AshinoFFUS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ManabeYSS09, author = {Hirokazu Manabe and Yuta Yamakawa and Tomohiro Sasamoto and Ry{\^{o}}ichi Sasaki}, editor = {Jeng{-}Shyang Pan and Yen{-}Wei Chen and Lakhmi C. Jain}, title = {Security Evaluation of Biometrics Authentications for Cellular Phones}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings}, pages = {34--39}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IIH-MSP.2009.51}, doi = {10.1109/IIH-MSP.2009.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ManabeYSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egve/ShibataNSKT08, author = {Fumihisa Shibata and Hiroyuki Nakamoto and Ry{\^{o}}ichi Sasaki and Asako Kimura and Hideyuki Tamura}, editor = {Robert van Liere and Betty J. Mohler}, title = {A View Management Method for Mobile Mixed Reality Systems}, booktitle = {14th Eurographics Symposium on Virtual Environments, {EGVE} 2008, Eindhoven, The Netherlands, May 29-30, 2008}, pages = {17--24}, publisher = {Eurographics Association}, year = {2008}, url = {https://doi.org/10.2312/EGVE/EGVE08/017-024}, doi = {10.2312/EGVE/EGVE08/017-024}, timestamp = {Thu, 23 Jul 2020 16:43:44 +0200}, biburl = {https://dblp.org/rec/conf/egve/ShibataNSKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/FujitaAUS08, author = {Keisuke Fujita and Yuki Ashino and Tetsutaro Uehara and Ry{\^{o}}ichi Sasaki}, editor = {Indrajit Ray and Sujeet Shenoi}, title = {Using Boot Control to Preserve the Integrity of Evidence}, booktitle = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008}, series = {{IFIP}}, volume = {285}, pages = {61--74}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-84927-0\_6}, doi = {10.1007/978-0-387-84927-0\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/FujitaAUS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/UematsuS08, author = {Kenshi Uematsu and Ry{\^{o}}ichi Sasaki}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {A Proposal of Falsification Detection System in Structural Design}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {137--142}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.288}, doi = {10.1109/IIH-MSP.2008.288}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/UematsuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/TakatsukaTS07, author = {Mitsuyuki Takatsuka and Masataka Tada and Ry{\^{o}}ichi Sasaki}, title = {Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {102--107}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.187}, doi = {10.1109/FGCN.2007.187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/TakatsukaTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/YajimaWS07, author = {Hiroshi Yajima and Tomohiro Watanabe and Ry{\^{o}}ichi Sasaki}, editor = {Michael J. Smith and Gavriel Salvendy}, title = {Evaluation of the Participant-Support Method for Information Acquisition in the "Multiplex Risk Communicator"}, booktitle = {Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of {HCI} International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4558}, pages = {195--203}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73354-6\_22}, doi = {10.1007/978-3-540-73354-6\_22}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/YajimaWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/AshinoS07, author = {Yuki Ashino and Ry{\^{o}}ichi Sasaki}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Proposal of Digital Forensic System Using Security Device and Hysteresis Signature}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {3--7}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.249}, doi = {10.1109/IIH-MSP.2007.249}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/AshinoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/IrisawaAFS07, author = {Mariko Irisawa and Yuki Ashino and Keisuke Fujita and Ry{\^{o}}ichi Sasaki}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {8--11}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIHMSP.2007.4457641}, doi = {10.1109/IIHMSP.2007.4457641}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/IrisawaAFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/YajimaMS06, author = {Hiroshi Yajima and Shinichi Matsumoto and Ry{\^{o}}ichi Sasaki}, title = {Proposal of Risk Communications Supporting Method in Multiplex Risk Communicator}, booktitle = {Proceedings of 11th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2006, September 20-22, 2006, Diplomat Hotel Prague, Czech Republic}, pages = {255--260}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ETFA.2006.355352}, doi = {10.1109/ETFA.2006.355352}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/etfa/YajimaMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/MasubuchiTS06, author = {Takanobu Masubuchi and Mitsuyuki Takatsuka and Ry{\^{o}}ichi Sasaki}, title = {A Digital Document Flexible Sanitizing Scheme}, booktitle = {Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings}, pages = {89--92}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IIH-MSP.2006.264961}, doi = {10.1109/IIH-MSP.2006.264961}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/MasubuchiTS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MiyazakiIMSYTI05, author = {Kunihiko Miyazaki and Mitsuru Iwamura and Tsutomu Matsumoto and Ry{\^{o}}ichi Sasaki and Hiroshi Yoshiura and Satoru Tezuka and Hideki Imai}, title = {Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {239--246}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_239\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MiyazakiIMSYTI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/YasuAOSS05, author = {Kenji Yasu and Yasuhiko Akahane and Masami Ozaki and Koji Semoto and Ry{\^{o}}ichi Sasaki}, editor = {Matohisa Funabashi and Adam Grzech}, title = {Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail}, booktitle = {Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, 5th {IFIP} Conference e-Commerce, e-Business, and e-Government (I3E'2OO5), October 28-30, 2005, Poznan, Poland}, series = {{IFIP}}, volume = {189}, pages = {203--217}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-29773-1\_14}, doi = {10.1007/0-387-29773-1\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/YasuAOSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/SasakiIHYYM05, author = {Ry{\^{o}}ichi Sasaki and Saneyuki Ishii and Yuu Hidaka and Hiroshi Yajima and Hiroshi Yoshiura and Yuko Murayama}, editor = {Matohisa Funabashi and Adam Grzech}, title = {Development Concept for and Trial Application of a "Mulutiplex Risk Communicator"}, booktitle = {Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, 5th {IFIP} Conference e-Commerce, e-Business, and e-Government (I3E'2OO5), October 28-30, 2005, Poznan, Poland}, series = {{IFIP}}, volume = {189}, pages = {607--621}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-29773-1\_40}, doi = {10.1007/0-387-29773-1\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/SasakiIHYYM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2005, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b135818}, doi = {10.1007/B135818}, isbn = {0-387-25658-X}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraMITS02, author = {Hiroshi Yoshiura and Kunihiko Miyazaki and Shinji Itoh and Kazuo Takaragi and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Legally Authorized and Unauthorized Digital Evidence}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {67--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_7}, doi = {10.1007/978-3-540-39871-4\_7}, timestamp = {Sat, 05 Sep 2020 18:04:37 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraMITS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SasakiYI02, author = {Ry{\^{o}}ichi Sasaki and Hiroshi Yoshiura and Shinji Itoh}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Combinatorial Optimization of Countermeasures against Illegal Copying}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {128--144}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_12}, doi = {10.1007/978-3-540-39871-4\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SasakiYI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraMITS01, author = {Hiroshi Yoshiura and Kunihiko Miyazaki and Shinji Itoh and Kazuo Takaragi and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Multi-OS Approach to Trusted Computer Systems}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {107--114}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_17}, doi = {10.1007/3-540-45807-7\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraMITS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/TezukaSK00, author = {Satoru Tezuka and Ry{\^{o}}ichi Sasaki and Masanori Kataoka}, title = {Seamless Object Authentication in Different Security Policy Domains}, booktitle = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/HICSS.2000.927028}, doi = {10.1109/HICSS.2000.927028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/TezukaSK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/HonjoSYATSST00, author = {Shinsuke Honjo and Seiichi Susaki and Hiroshi Yoshiura and Hirokazu Aoshima and Satoru Tezuka and Ry{\^{o}}ichi Sasaki and Tsukasa Saitoh and Hisashi Toyoshima}, editor = {Yoshitaka Shibata}, title = {Internet-Marks: the secure seal for {WWW} site authentication}, booktitle = {Seventh International Conference on Parallel and Distributed Systems Workshops, {ICPADS} 2000 Workshops, Iwate, Japan, July 4-7, 2000}, pages = {393--398}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/PADSW.2000.884657}, doi = {10.1109/PADSW.2000.884657}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/HonjoSYATSST00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraSSSTKTS00, author = {Hiroshi Yoshiura and Takaaki Shigematsu and Seiichi Susaki and Tsukasa Saitoh and Hisashi Toyoshima and Chikako Kurita and Satoru Tezuka and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - {A} Practical Analysis}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {238--248}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_31}, doi = {10.1007/3-540-44810-1\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraSSSTKTS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraSNSTST99, author = {Hiroshi Yoshiura and Seiichi Susaki and Yasuhiko Nagai and Tsukasa Saitoh and Hisashi Toyoshima and Ry{\^{o}}ichi Sasaki and Satoru Tezuka}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {195--207}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_26}, doi = {10.1007/10720107\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraSNSTST99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraST98, author = {Hiroshi Yoshiura and Ry{\^{o}}ichi Sasaki and Kazuo Takaragi}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Secure Fingerprinting Using Public-Key Cryptography (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {83--89}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_13}, doi = {10.1007/3-540-49135-X\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Sasaki98, author = {Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {90--94}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_14}, doi = {10.1007/3-540-49135-X\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Sasaki98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/NakamuraFSMHNTM91, author = {Tsutomu Nakamura and Nobuyuki Fujikura and Ry{\^{o}}ichi Sasaki and Hiroshi Morita and Masat Hayashi and Satoru Nishino and Hiroaki Takahashi and Akio Matsuura}, title = {Development and Performance Evaluation of Point to Multipoint Communication Control Scheme Via Satellite}, journal = {Perform. Evaluation}, volume = {12}, number = {3}, pages = {169--179}, year = {1991}, url = {https://doi.org/10.1016/0166-5316(91)90023-V}, doi = {10.1016/0166-5316(91)90023-V}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/NakamuraFSMHNTM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/GotohTS90, author = {Yasuko Gotoh and Kazuo Takaragi and Ry{\^{o}}ichi Sasaki}, title = {A Method for Rapid {RSA} Key Generation}, journal = {Syst. Comput. Jpn.}, volume = {21}, number = {8}, pages = {11--20}, year = {1990}, url = {https://doi.org/10.1002/scj.4690210802}, doi = {10.1002/SCJ.4690210802}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/GotohTS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.