BibTeX records: Ryôichi Sasaki

download as .bib file

@article{DBLP:journals/sncs/HorikawaOTKMTSN23,
  author       = {Hiroshi Horikawa and
                  Hisamichi Ohtani and
                  Yuji Takahashi and
                  Takehisa Kato and
                  Fumihiko Magata and
                  Yoshimi Teshigawara and
                  Ry{\^{o}}ichi Sasaki and
                  Masakatsu Nishigaki},
  title        = {Enhancement of a Company-Wide Information Security Management System
                  Through Incident Learning},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {3},
  pages        = {211},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-01691-7},
  doi          = {10.1007/S42979-023-01691-7},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/HorikawaOTKMTSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metacom/SeyamaS23,
  author       = {Toshiya Seyama and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Trial of Risk Assessment for Business Application of Metaverse},
  booktitle    = {{IEEE} International Conference on Metaverse Computing, Networking
                  and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023},
  pages        = {632--636},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MetaCom57706.2023.00111},
  doi          = {10.1109/METACOM57706.2023.00111},
  timestamp    = {Thu, 21 Mar 2024 17:12:49 +0100},
  biburl       = {https://dblp.org/rec/conf/metacom/SeyamaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Sasaki23,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {{AI} and Security - What Changes with Generative {AI}},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {208--215},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00043},
  doi          = {10.1109/QRS-C60940.2023.00043},
  timestamp    = {Tue, 05 Mar 2024 11:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/Sasaki23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Sasaki23a,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Reconsideration of Risk Communication and Risk Assessment Support
                  Methods for Security},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {516--523},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00042},
  doi          = {10.1109/QRS-C60940.2023.00042},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/Sasaki23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiuSU23,
  author       = {Jigang Liu and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {An Ontology-Based Framework for Medical IoT Forensic Evidence},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {863--864},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00124},
  doi          = {10.1109/QRS-C60940.2023.00124},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiuSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Sasaki22,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Trial Application of Risk Assessment Method for Metaverse},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9,
                  2022},
  pages        = {120--128},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS-C57518.2022.00026},
  doi          = {10.1109/QRS-C57518.2022.00026},
  timestamp    = {Sat, 22 Apr 2023 17:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/Sasaki22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/HasegawaSS22,
  author       = {Taichi Hasegawa and
                  Taiichi Saito and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Analyzing Metadata in {PDF} Files Published by Police Agencies in
                  Japan},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9,
                  2022},
  pages        = {145--151},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS-C57518.2022.00029},
  doi          = {10.1109/QRS-C57518.2022.00029},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/HasegawaSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Sasaki21,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Application of Risk Assessment Method to Local Government Security
                  Models},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00121},
  doi          = {10.1109/QRS-C55045.2021.00121},
  timestamp    = {Tue, 12 Apr 2022 17:57:49 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/Sasaki21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/KanekoYS21,
  author       = {Tomoko Kaneko and
                  Nobukazu Yoshioka and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Cyber-Security Incident Analysis by Causal Analysis using System Theory
                  {(CAST)}},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {806--815},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00123},
  doi          = {10.1109/QRS-C55045.2021.00123},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/KanekoYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/KakizakiSOY20,
  author       = {Yoshio Kakizaki and
                  Ry{\^{o}}ichi Sasaki and
                  Tomohide Okochi and
                  Hiroshi Yasuda},
  editor       = {Leonard Barolli and
                  Kin Fun Li and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {CySec: Cybersecurity Review Program for Professionals in Japan},
  booktitle    = {Advances in Networked-Based Information Systems - The 23rd International
                  Conference on Network-Based Information Systems, NBiS 2020, Victoria,
                  BC, Canada, 31 August - 2 September 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1264},
  pages        = {280--289},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57811-4\_26},
  doi          = {10.1007/978-3-030-57811-4\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/KakizakiSOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/KanekoYS20,
  author       = {Tomoko Kaneko and
                  Nobukazu Yoshioka and
                  Ry{\^{o}}ichi Sasaki},
  title        = {{STAMP} S{\&}S: Safety {\&} Security Scenario for Specification
                  and Standard in the society of AI/IoT},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00037},
  doi          = {10.1109/QRS-C51114.2020.00037},
  timestamp    = {Tue, 26 Jan 2021 17:41:14 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/KanekoYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/KobayashiSS20,
  author       = {Haruki Kobayashi and
                  Taiichi Saito and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Trial Development of a Cyber Risk Visualization System with Function
                  of k-Anonymity and Compatibility with Other Organizations},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {184--189},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00039},
  doi          = {10.1109/QRS-C51114.2020.00039},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/KobayashiSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Sasaki20,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Risk Assessment Method for Balancing Safety, Security, and Privacy
                  in Medical IoT Systems with Remote Maintenance Function},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {190--197},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00040},
  doi          = {10.1109/QRS-C51114.2020.00040},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/Sasaki20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiuSU20,
  author       = {Jigang Liu and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {Towards a Holistic Approach to Medical IoT Forensics},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {686--687},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00121},
  doi          = {10.1109/QRS-C51114.2020.00121},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiuSU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/KakizakiNS18,
  author       = {Yoshio Kakizaki and
                  Shiomi Nishibiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Mixed Content Awareness Tool for Safe Browsing},
  journal      = {J. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {90--99},
  year         = {2018},
  url          = {https://doi.org/10.17706/jcp.13.1.90-99},
  doi          = {10.17706/JCP.13.1.90-99},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcp/KakizakiNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/KanekoTOS18,
  author       = {Tomoko Kaneko and
                  Yuji Takahashi and
                  Takao Okubo and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Nobukazu Yoshioka and
                  Hironori Washizaki and
                  Eduardo B. Fern{\'{a}}ndez and
                  Tomoko Kaneko and
                  Shuichiro Yamamoto and
                  Fuyuki Ishikawa and
                  Foutse Khomh and
                  Giuliano Antoniol},
  title        = {An Assurance Case Approach for Software Code Security},
  booktitle    = {Proceedings of the International Workshop on Evidence-based Security
                  and Privacy in the Wild and the 1st International Workshop on Machine
                  Learning Systems Engineering co-located with 25th Asia-Pacific Software
                  Engineering Conference {(APSEC} 2018), Nara, Japan, December 4, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2809},
  pages        = {10--17},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2809/WESPr-18\_02.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:12 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/KanekoTOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SasakiUL18,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Jigang Liu},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Md. Kamrul Hasan},
  title        = {Message from the {CFSE} 2018 Workshop Organizers},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {352},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10256},
  doi          = {10.1109/COMPSAC.2018.10256},
  timestamp    = {Mon, 19 Aug 2024 08:42:01 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/SasakiUL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icncc/HayakawaSHTKO18,
  author       = {Takuo Hayakawa and
                  Ry{\^{o}}ichi Sasaki and
                  Hiroshi Hayashi and
                  Yuji Takahashi and
                  Tomoko Kaneko and
                  Takao Okubo},
  title        = {Proposal and Application of Security/Safety Evaluation Method for
                  Medical Device System that Includes IoT},
  booktitle    = {Proceedings of the {VII} International Conference on Network, Communication
                  and Computing, {ICNCC} 2018, Taipei City, Taiwan, December 14-16,
                  2018},
  pages        = {157--164},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3301326.3301330},
  doi          = {10.1145/3301326.3301330},
  timestamp    = {Thu, 14 Mar 2019 08:28:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icncc/HayakawaSHTKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nof/KimiyamaYTSYUSK17,
  author       = {Hiroyuki Kimiyama and
                  Naoki Yonezaki and
                  Tomoaki Tsutsumi and
                  Kaori Sano and
                  Hirofumi Yamaki and
                  Yoichiro Ueno and
                  Ry{\^{o}}ichi Sasaki and
                  Hiroshi Kobayashi},
  editor       = {Toktam Mahmoodi and
                  Stefano Secci and
                  Antonio Cianfrani and
                  Filip Idzikowski},
  title        = {Autonomous and distributed internet security {(AIS)} infrastructure
                  for safe internet},
  booktitle    = {8th International Conference on the Network of the Future, {NOF} 2017,
                  London, United Kingdom, November 22-24, 2017},
  pages        = {106--113},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NOF.2017.8251228},
  doi          = {10.1109/NOF.2017.8251228},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nof/KimiyamaYTSYUSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiuKSU17,
  author       = {Jigang Liu and
                  Rashmi Kammar and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {Malware Behavior Ontology for Digital Evidence},
  booktitle    = {2017 {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS-C} 2017, Prague, Czech Republic, July
                  25-29, 2017},
  pages        = {585--586},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/QRS-C.2017.105},
  doi          = {10.1109/QRS-C.2017.105},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiuKSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SasakiUL16,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Jigang Liu},
  title        = {Message from the {CFSE} Workshop Organizers},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {355},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.278},
  doi          = {10.1109/COMPSAC.2016.278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SasakiUL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/TsuchiyaFTKMTSN16,
  author       = {Takashi Tsuchiya and
                  Masahiro Fujita and
                  Kenta Takahashi and
                  Takehisa Kato and
                  Fumihiko Magata and
                  Yoshimi Teshigawara and
                  Ry{\^{o}}ichi Sasaki and
                  Masakatsu Nishigaki},
  editor       = {Theo Tryfonas},
  title        = {Secure Communication Protocol Between a Human and a Bank Server for
                  Preventing Man-in-the-Browser Attacks},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - 4th International
                  Conference, {HAS} 2016, Held as Part of {HCI} International 2016,
                  Toronto, ON, Canada, July 17-22, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9750},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39381-0\_8},
  doi          = {10.1007/978-3-319-39381-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/TsuchiyaFTKMTSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/SamejimaS15,
  author       = {Masaki Samejima and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Chance-Constrained Programming Method of {IT} Risk Countermeasures
                  for Social Consensus Making},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {45},
  number       = {5},
  pages        = {725--733},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSMC.2014.2376491},
  doi          = {10.1109/TSMC.2014.2376491},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/SamejimaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SasakiUL15,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Jigang Liu},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Message from the {CFSE} 2015 Workshop Organizers},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {17},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.297},
  doi          = {10.1109/COMPSAC.2015.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SasakiUL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/OkayasuS15,
  author       = {Shota Okayasu and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Proposal and Evaluation of Methods Using the Quantification Theory
                  and Machine Learning for Detecting C{\&}C Server Used in a Botnet},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.165},
  doi          = {10.1109/COMPSAC.2015.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/OkayasuS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/UmeharaAS15,
  author       = {Yuhei Umehara and
                  Hayai Ando and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Proposal for Combinatorial Optimization Technology in Consideration
                  of the Dynamic Characteristic of {IT} Risks},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {40--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.172},
  doi          = {10.1109/COMPSAC.2015.172},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/UmeharaAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/WangUS15,
  author       = {Yifan Wang and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Fog Computing: Issues and Challenges in Security and Forensics},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.173},
  doi          = {10.1109/COMPSAC.2015.173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/WangUS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HashimotoHMKKYU15,
  author       = {Kazuki Hashimoto and
                  Hiroyuki Hiruma and
                  Takashi Matsumoto and
                  Kosetus Kayama and
                  Yoshio Kaikizaki and
                  Hiroshi Yamaki and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of Intellectual Network Forensic System {LIFT} against
                  Targeted Attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.13},
  doi          = {10.1109/CYBERSEC.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/HashimotoHMKKYU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/KoizumiS15,
  author       = {Ryohei Koizumi and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Study on Countermeasures Using Mitigation Software against Vulnerability
                  Attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.15},
  doi          = {10.1109/CYBERSEC.2015.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/KoizumiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/SatoSHIS15,
  author       = {Makoto Sato and
                  Akihiko Sugimoto and
                  Naoki Hayashi and
                  Yoshiaki Isobe and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Proposal of a Method for Identifying the Infection Route for Targeted
                  Attacks Based on Malware Behavior in a Network},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {40--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.17},
  doi          = {10.1109/CYBERSEC.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/SatoSHIS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/NakagawaTS15,
  author       = {Naoto Nakagawa and
                  Yoshimi Teshigawara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of a Detection and Responding System for Malware Communications
                  by Using OpenFlow and Its Evaluation},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {46--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.18},
  doi          = {10.1109/CYBERSEC.2015.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/NakagawaTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/AkiyamaOKS15,
  author       = {Takumi Akiyama and
                  Kazuya Otani and
                  Yoshio Kakizaki and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Evaluation of a Risk-Based Management Method for Online Accounts},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {52--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.19},
  doi          = {10.1109/CYBERSEC.2015.19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersec/AkiyamaOKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/KobayashiS14,
  author       = {Naoki Kobayashi and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Proposal and Evaluation of Safe and Efficient Log Signature Scheme
                  for the Preservation of Evidence},
  booktitle    = {{IEEE} 38th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014},
  pages        = {343--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMPSACW.2014.60},
  doi          = {10.1109/COMPSACW.2014.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/KobayashiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/YajimaTS14,
  author       = {Hiroshi Yajima and
                  Naohisa Tanabe and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Masaaki Kurosu},
  title        = {Proposal of Collaborative Learning Support Method in Risk Communications},
  booktitle    = {Human-Computer Interaction. Theories, Methods, and Tools - 16th International
                  Conference, {HCI} International 2014, Heraklion, Crete, Greece, June
                  22-27, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8510},
  pages        = {457--465},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07233-3\_42},
  doi          = {10.1007/978-3-319-07233-3\_42},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/YajimaTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  title        = {Double Encryption for Data Authenticity and Integrity in Privacy-
                  preserving Confidential Forensic Investigation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {104--113},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.104},
  doi          = {10.22667/JOWUA.2013.06.31.104},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakahashiSU13,
  author       = {Wataru Takahashi and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {Development and Evaluation of Guideline Total Support System for Evidence
                  Preservation by Using an Android Phone},
  booktitle    = {{IEEE} 37th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013},
  pages        = {21--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMPSACW.2013.20},
  doi          = {10.1109/COMPSACW.2013.20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TakahashiSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Verifying Data Authenticity and Integrity in Server-Aided Confidential
                  Forensic Investigation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {312--317},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_33},
  doi          = {10.1007/978-3-642-36818-9\_33},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/SatoSS13,
  author       = {Katsunori Sato and
                  Masaki Samejima and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Chance-Constrained Programming Method by Constraints Aggregation for
                  Social Consensus Making on {IT} Risk Countermeasure},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},
  pages        = {4789--4793},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SMC.2013.815},
  doi          = {10.1109/SMC.2013.815},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/SatoSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/shonan-reports/EchizenMST13,
  author       = {Isao Echizen and
                  G{\"{u}}nter M{\"{u}}ller and
                  Ry{\^{o}}ichi Sasaki and
                  A Min Tjoa},
  title        = {Privacy by Transparency for Data-Centric Services {(NII} Shonan Meeting
                  2013-5)},
  journal      = {{NII} Shonan Meet. Rep.},
  volume       = {2013},
  year         = {2013},
  url          = {https://shonan.nii.ac.jp/seminars/032/},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/shonan-reports/EchizenMST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AhmedNSSW12,
  author       = {Irfan Ahmed and
                  Martin Naedele and
                  Bradley L. Schatz and
                  Ry{\^{o}}ichi Sasaki and
                  Andrew West},
  title        = {Message from the guest editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {213},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0168-3},
  doi          = {10.1007/S10207-012-0168-3},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AhmedNSSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/Sasaki12,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Considerations on Risk Communication for {IT} Systems and Development
                  of Support Systems},
  journal      = {Inf. Media Technol.},
  volume       = {7},
  number       = {4},
  pages        = {1606--1614},
  year         = {2012},
  url          = {https://doi.org/10.11185/imt.7.1606},
  doi          = {10.11185/IMT.7.1606},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imt/Sasaki12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Sasaki12,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Considerations on Risk Communication for {IT} Systems and Development
                  of Support Systems},
  journal      = {J. Inf. Process.},
  volume       = {20},
  number       = {4},
  pages        = {814--822},
  year         = {2012},
  url          = {https://doi.org/10.2197/ipsjjip.20.814},
  doi          = {10.2197/IPSJJIP.20.814},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/Sasaki12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SakumaS12,
  author       = {Takashi Sakuma and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Xiaoying Bai and
                  Fevzi Belli and
                  Elisa Bertino and
                  Carl K. Chang and
                  Atilla El{\c{c}}i and
                  Cristina Cerschi Seceleanu and
                  Haihua Xie and
                  Mohammad Zulkernine},
  title        = {Proposal and Evaluation of the Digital Certificate System with Sumi-coating
                  Module for Privacy Protection},
  booktitle    = {36th Annual {IEEE} Computer Software and Applications Conference Workshops,
                  {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {200--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/COMPSACW.2012.45},
  doi          = {10.1109/COMPSACW.2012.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SakumaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/SamejimaS12,
  author       = {Masaki Samejima and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Approximation method for chance-constrained programming of social
                  consensus formation concerning {IT} risk countermeasure},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man,
                  and Cybernetics, {SMC} 2012, Seoul, Korea (South), October 14-17,
                  2012},
  pages        = {2751--2755},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICSMC.2012.6378164},
  doi          = {10.1109/ICSMC.2012.6378164},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/SamejimaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiuUS11,
  author       = {Jigang Liu and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of digital forensics practice and research in Japan},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {240--253},
  year         = {2011},
  url          = {https://doi.org/10.1002/wcm.981},
  doi          = {10.1002/WCM.981},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiuUS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SasakiTOYMK11,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Kazushige Takakusaki and
                  Masaru Ohkawara and
                  Hiroshi Yajima and
                  Hidetaka Masuda and
                  Tetsuro Kobayashi},
  title        = {Development and Trial Application of Prototype Program for "Social-MRC":
                  Social Consensus Formation Support System Concerning {IT} Risk Countermeasures},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {499--506},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.76},
  doi          = {10.1109/ARES.2011.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SasakiTOYMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/UemuraTKS11,
  author       = {Takashi Uemura and
                  Shota Takagi and
                  Yusuke Kosuda and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Proposed Web Access Control System Request Policy Framework for
                  Cooperation of {DNS} and a Web Browser},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {549--554},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.84},
  doi          = {10.1109/ARES.2011.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/UemuraTKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/TanakaKTS11,
  author       = {Tatsuya Tanaka and
                  Toshifumi Kai and
                  Yusuke Tamura and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Development and Evaluation of Defaced Sites Automatic Detection System
                  {DICE}},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {196--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.61},
  doi          = {10.1109/IIHMSP.2011.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/TanakaKTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SakuraiAUYS10,
  author       = {Yui Sakurai and
                  Yuki Ashino and
                  Tetsutaro Uehara and
                  Hiroshi Yoshiura and
                  Ry{\^{o}}ichi Sasaki},
  title        = {HiGate (High Grade Anti-Tamper Equipment) Prototype and Application
                  to e-Discovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {21--34},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1073},
  doi          = {10.15394/JDFSL.2010.1073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SakuraiAUYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/YamamotoUMTSN10,
  author       = {Takumi Yamamoto and
                  Yuma Usui and
                  Fumihiko Magata and
                  Yoshimi Teshigawara and
                  Ry{\^{o}}ichi Sasaki and
                  Masakatsu Nishigaki},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {A Security Measure Selection Scheme with Consideration of Potential
                  Lawsuits},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {104--110},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Wed, 05 Nov 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/YamamotoUMTSN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/SamejimaAKS10,
  author       = {Masaki Samejima and
                  Masanori Akiyoshi and
                  Norihisa Komoda and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Social consensus making support system by qualitative and quantitative
                  hybrid simulation},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Istanbul, Turkey, 10-13 October 2010},
  pages        = {896--901},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICSMC.2010.5641872},
  doi          = {10.1109/ICSMC.2010.5641872},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/SamejimaAKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ItakuraSAS10,
  author       = {Kota Itakura and
                  Masaki Samejima and
                  Masanori Akiyoshi and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A consensus support system for deciding a combination of risk-reducing
                  plans under uncertain parameters},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Istanbul, Turkey, 10-13 October 2010},
  pages        = {2083--2087},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICSMC.2010.5641710},
  doi          = {10.1109/ICSMC.2010.5641710},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/ItakuraSAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3},
  doi          = {10.1007/978-3-642-16825-3},
  isbn         = {978-3-642-16824-6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010s,
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  isbn         = {978-4-915256-78-3},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2010s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/KosudaS09,
  author       = {Yusuke Kosuda and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Claude Godart and
                  Norbert Gronau and
                  Sushil K. Sharma and
                  G{\'{e}}r{\^{o}}me Canals},
  title        = {Proposal and Implementation of {SSH} Client System Using Ajax},
  booktitle    = {Software Services for e-Business and e-Society, 9th {IFIP} {WG} 6.1
                  Conference on e-Business, e-Services and e-Society, {I3E} 2009, Nancy,
                  France, September 23-25, 2009. Proceedings},
  series       = {{IFIP}},
  volume       = {305},
  pages        = {184--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04280-5\_16},
  doi          = {10.1007/978-3-642-04280-5\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/KosudaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/AshinoFFUS09,
  author       = {Yuki Ashino and
                  Keisuke Fujita and
                  Maiko Furusawa and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Implementing Boot Control for Windows Vista},
  booktitle    = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, Florida, USA, January 26-28,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {306},
  pages        = {133--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04155-6\_10},
  doi          = {10.1007/978-3-642-04155-6\_10},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/AshinoFFUS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ManabeYSS09,
  author       = {Hirokazu Manabe and
                  Yuta Yamakawa and
                  Tomohiro Sasamoto and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Jeng{-}Shyang Pan and
                  Yen{-}Wei Chen and
                  Lakhmi C. Jain},
  title        = {Security Evaluation of Biometrics Authentications for Cellular Phones},
  booktitle    = {Fifth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
                  September, 2009, Proceedings},
  pages        = {34--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IIH-MSP.2009.51},
  doi          = {10.1109/IIH-MSP.2009.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ManabeYSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egve/ShibataNSKT08,
  author       = {Fumihisa Shibata and
                  Hiroyuki Nakamoto and
                  Ry{\^{o}}ichi Sasaki and
                  Asako Kimura and
                  Hideyuki Tamura},
  editor       = {Robert van Liere and
                  Betty J. Mohler},
  title        = {A View Management Method for Mobile Mixed Reality Systems},
  booktitle    = {14th Eurographics Symposium on Virtual Environments, {EGVE} 2008,
                  Eindhoven, The Netherlands, May 29-30, 2008},
  pages        = {17--24},
  publisher    = {Eurographics Association},
  year         = {2008},
  url          = {https://doi.org/10.2312/EGVE/EGVE08/017-024},
  doi          = {10.2312/EGVE/EGVE08/017-024},
  timestamp    = {Thu, 23 Jul 2020 16:43:44 +0200},
  biburl       = {https://dblp.org/rec/conf/egve/ShibataNSKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/FujitaAUS08,
  author       = {Keisuke Fujita and
                  Yuki Ashino and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Indrajit Ray and
                  Sujeet Shenoi},
  title        = {Using Boot Control to Preserve the Integrity of Evidence},
  booktitle    = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference
                  on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30,
                  2008},
  series       = {{IFIP}},
  volume       = {285},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-84927-0\_6},
  doi          = {10.1007/978-0-387-84927-0\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/FujitaAUS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/UematsuS08,
  author       = {Kenshi Uematsu and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {A Proposal of Falsification Detection System in Structural Design},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {137--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.288},
  doi          = {10.1109/IIH-MSP.2008.288},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/UematsuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/TakatsukaTS07,
  author       = {Mitsuyuki Takatsuka and
                  Masataka Tada and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Proposal of the e-Discovery System for Sanitizing Disclosure Information
                  and for Securing Evidence},
  booktitle    = {Future Generation Communication and Networking, {FGCN} 2007, Ramada
                  Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings},
  pages        = {102--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FGCN.2007.187},
  doi          = {10.1109/FGCN.2007.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/TakatsukaTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/YajimaWS07,
  author       = {Hiroshi Yajima and
                  Tomohiro Watanabe and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Michael J. Smith and
                  Gavriel Salvendy},
  title        = {Evaluation of the Participant-Support Method for Information Acquisition
                  in the "Multiplex Risk Communicator"},
  booktitle    = {Human Interface and the Management of Information. Interacting in
                  Information Environments, Symposium on Human Interface 2007, Held
                  as Part of {HCI} International 2007, Beijing, China, July 22-27, 2007,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4558},
  pages        = {195--203},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73354-6\_22},
  doi          = {10.1007/978-3-540-73354-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/YajimaWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/AshinoS07,
  author       = {Yuki Ashino and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {Proposal of Digital Forensic System Using Security Device and Hysteresis
                  Signature},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {3--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIH-MSP.2007.249},
  doi          = {10.1109/IIH-MSP.2007.249},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/AshinoS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/IrisawaAFS07,
  author       = {Mariko Irisawa and
                  Yuki Ashino and
                  Keisuke Fujita and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {Development and Application of Digital Forensic Logging System for
                  Data from a Keyboard and Camera},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {8--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIHMSP.2007.4457641},
  doi          = {10.1109/IIHMSP.2007.4457641},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/IrisawaAFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/YajimaMS06,
  author       = {Hiroshi Yajima and
                  Shinichi Matsumoto and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Proposal of Risk Communications Supporting Method in Multiplex Risk
                  Communicator},
  booktitle    = {Proceedings of 11th {IEEE} International Conference on Emerging Technologies
                  and Factory Automation, {ETFA} 2006, September 20-22, 2006, Diplomat
                  Hotel Prague, Czech Republic},
  pages        = {255--260},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ETFA.2006.355352},
  doi          = {10.1109/ETFA.2006.355352},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/etfa/YajimaMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/MasubuchiTS06,
  author       = {Takanobu Masubuchi and
                  Mitsuyuki Takatsuka and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Digital Document Flexible Sanitizing Scheme},
  booktitle    = {Second International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California,
                  USA, December 18-20, 2006, Proceedings},
  pages        = {89--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IIH-MSP.2006.264961},
  doi          = {10.1109/IIH-MSP.2006.264961},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/MasubuchiTS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MiyazakiIMSYTI05,
  author       = {Kunihiko Miyazaki and
                  Mitsuru Iwamura and
                  Tsutomu Matsumoto and
                  Ry{\^{o}}ichi Sasaki and
                  Hiroshi Yoshiura and
                  Satoru Tezuka and
                  Hideki Imai},
  title        = {Digitally Signed Document Sanitizing Scheme with Disclosure Condition
                  Control},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {239--246},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_239\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MiyazakiIMSYTI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/YasuAOSS05,
  author       = {Kenji Yasu and
                  Yasuhiko Akahane and
                  Masami Ozaki and
                  Koji Semoto and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Matohisa Funabashi and
                  Adam Grzech},
  title        = {Development and Evaluation of a System for Checking for Improper Sending
                  of Personal Information in Encrypted E-Mail},
  booktitle    = {Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government,
                  5th {IFIP} Conference e-Commerce, e-Business, and e-Government (I3E'2OO5),
                  October 28-30, 2005, Poznan, Poland},
  series       = {{IFIP}},
  volume       = {189},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-29773-1\_14},
  doi          = {10.1007/0-387-29773-1\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/YasuAOSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/SasakiIHYYM05,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Saneyuki Ishii and
                  Yuu Hidaka and
                  Hiroshi Yajima and
                  Hiroshi Yoshiura and
                  Yuko Murayama},
  editor       = {Matohisa Funabashi and
                  Adam Grzech},
  title        = {Development Concept for and Trial Application of a "Mulutiplex
                  Risk Communicator"},
  booktitle    = {Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government,
                  5th {IFIP} Conference e-Commerce, e-Business, and e-Government (I3E'2OO5),
                  October 28-30, 2005, Poznan, Poland},
  series       = {{IFIP}},
  volume       = {189},
  pages        = {607--621},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-29773-1\_40},
  doi          = {10.1007/0-387-29773-1\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/SasakiIHYYM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2005,
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b135818},
  doi          = {10.1007/B135818},
  isbn         = {0-387-25658-X},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraMITS02,
  author       = {Hiroshi Yoshiura and
                  Kunihiko Miyazaki and
                  Shinji Itoh and
                  Kazuo Takaragi and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Legally Authorized and Unauthorized Digital Evidence},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {67--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_7},
  doi          = {10.1007/978-3-540-39871-4\_7},
  timestamp    = {Sat, 05 Sep 2020 18:04:37 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraMITS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SasakiYI02,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Hiroshi Yoshiura and
                  Shinji Itoh},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Combinatorial Optimization of Countermeasures against Illegal Copying},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_12},
  doi          = {10.1007/978-3-540-39871-4\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SasakiYI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraMITS01,
  author       = {Hiroshi Yoshiura and
                  Kunihiko Miyazaki and
                  Shinji Itoh and
                  Kazuo Takaragi and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Multi-OS Approach to Trusted Computer Systems},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {107--114},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_17},
  doi          = {10.1007/3-540-45807-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraMITS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/TezukaSK00,
  author       = {Satoru Tezuka and
                  Ry{\^{o}}ichi Sasaki and
                  Masanori Kataoka},
  title        = {Seamless Object Authentication in Different Security Policy Domains},
  booktitle    = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33),
                  4-7 January, 2000, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/HICSS.2000.927028},
  doi          = {10.1109/HICSS.2000.927028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/TezukaSK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/HonjoSYATSST00,
  author       = {Shinsuke Honjo and
                  Seiichi Susaki and
                  Hiroshi Yoshiura and
                  Hirokazu Aoshima and
                  Satoru Tezuka and
                  Ry{\^{o}}ichi Sasaki and
                  Tsukasa Saitoh and
                  Hisashi Toyoshima},
  editor       = {Yoshitaka Shibata},
  title        = {Internet-Marks: the secure seal for {WWW} site authentication},
  booktitle    = {Seventh International Conference on Parallel and Distributed Systems
                  Workshops, {ICPADS} 2000 Workshops, Iwate, Japan, July 4-7, 2000},
  pages        = {393--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/PADSW.2000.884657},
  doi          = {10.1109/PADSW.2000.884657},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/HonjoSYATSST00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraSSSTKTS00,
  author       = {Hiroshi Yoshiura and
                  Takaaki Shigematsu and
                  Seiichi Susaki and
                  Tsukasa Saitoh and
                  Hisashi Toyoshima and
                  Chikako Kurita and
                  Satoru Tezuka and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks
                  - {A} Practical Analysis},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_31},
  doi          = {10.1007/3-540-44810-1\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraSSSTKTS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraSNSTST99,
  author       = {Hiroshi Yoshiura and
                  Seiichi Susaki and
                  Yasuhiko Nagai and
                  Tsukasa Saitoh and
                  Hisashi Toyoshima and
                  Ry{\^{o}}ichi Sasaki and
                  Satoru Tezuka},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber
                  Worlds},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_26},
  doi          = {10.1007/10720107\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraSNSTST99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraST98,
  author       = {Hiroshi Yoshiura and
                  Ry{\^{o}}ichi Sasaki and
                  Kazuo Takaragi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Secure Fingerprinting Using Public-Key Cryptography (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {83--89},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_13},
  doi          = {10.1007/3-540-49135-X\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Sasaki98,
  author       = {Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Secure Fingerprinting Using Public-Key Cryptography (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {90--94},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_14},
  doi          = {10.1007/3-540-49135-X\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Sasaki98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/NakamuraFSMHNTM91,
  author       = {Tsutomu Nakamura and
                  Nobuyuki Fujikura and
                  Ry{\^{o}}ichi Sasaki and
                  Hiroshi Morita and
                  Masat Hayashi and
                  Satoru Nishino and
                  Hiroaki Takahashi and
                  Akio Matsuura},
  title        = {Development and Performance Evaluation of Point to Multipoint Communication
                  Control Scheme Via Satellite},
  journal      = {Perform. Evaluation},
  volume       = {12},
  number       = {3},
  pages        = {169--179},
  year         = {1991},
  url          = {https://doi.org/10.1016/0166-5316(91)90023-V},
  doi          = {10.1016/0166-5316(91)90023-V},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/NakamuraFSMHNTM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/GotohTS90,
  author       = {Yasuko Gotoh and
                  Kazuo Takaragi and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Method for Rapid {RSA} Key Generation},
  journal      = {Syst. Comput. Jpn.},
  volume       = {21},
  number       = {8},
  pages        = {11--20},
  year         = {1990},
  url          = {https://doi.org/10.1002/scj.4690210802},
  doi          = {10.1002/SCJ.4690210802},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/GotohTS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}