BibTeX records: Tetsutaro Uehara

download as .bib file

@article{DBLP:journals/access/RaoTU23,
  author       = {Jingjing Rao and
                  Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {ResTran: Long Distance Relationship on Image Forgery Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {120492--120501},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3327761},
  doi          = {10.1109/ACCESS.2023.3327761},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RaoTU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NguyenU23,
  author       = {Hoang Viet Nguyen and
                  Tetsutaro Uehara},
  title        = {Multilayer Action Representation based on {MITRE} ATT{\&}CK for
                  Automated Penetration Testing},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {562--577},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.562},
  doi          = {10.2197/IPSJJIP.31.562},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/NguyenU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/DamkhamKTU23,
  author       = {Waris Damkham and
                  Shingo Kunihiro and
                  Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Detecting Vulnerable OAuth 2.0 Implementations in Android Applications},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {524--531},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00024},
  doi          = {10.1109/QRS-C60940.2023.00024},
  timestamp    = {Tue, 05 Mar 2024 11:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/DamkhamKTU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/YamaguchiGU23,
  author       = {Shuji Yamaguchi and
                  Hidehito Gomi and
                  Tetsutaro Uehara},
  title        = {Enhancing Account Recovery with Location-based Dynamic Questions},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {532--539},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00061},
  doi          = {10.1109/QRS-C60940.2023.00061},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/YamaguchiGU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/KimuraAIU23,
  author       = {Yuuki Kimura and
                  Soramichi Akiyama and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  title        = {On Collecting Onion Server Fingerprints and Identification of Their
                  Operators},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {540--548},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00045},
  doi          = {10.1109/QRS-C60940.2023.00045},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/KimuraAIU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/BukangwaU23,
  author       = {Andrew Bukangwa and
                  Tetsutaro Uehara},
  title        = {An Agent-Based Modeling Approach to Designing and Optimizing Bug Bounty
                  Programs for Cybersecurity in Developing Countries},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {572--581},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00096},
  doi          = {10.1109/QRS-C60940.2023.00096},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/BukangwaU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiuSU23,
  author       = {Jigang Liu and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {An Ontology-Based Framework for Medical IoT Forensic Evidence},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {863--864},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00124},
  doi          = {10.1109/QRS-C60940.2023.00124},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiuSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NguyenZIU22,
  author       = {Hoang Viet Nguyen and
                  Junjun Zheng and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  title        = {Code Aggregate Graph: Effective Representation for Graph Neural Networks
                  to Detect Vulnerable Code},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {123786--123800},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3216395},
  doi          = {10.1109/ACCESS.2022.3216395},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/NguyenZIU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/NguyenU22,
  author       = {Hoang Viet Nguyen and
                  Tetsutaro Uehara},
  title        = {Hierarchical Action Embedding for Effective Autonomous Penetration
                  Testing},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9,
                  2022},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS-C57518.2022.00030},
  doi          = {10.1109/QRS-C57518.2022.00030},
  timestamp    = {Sat, 22 Apr 2023 17:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/NguyenU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TeerakanokUI21,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara and
                  Atsuo Inomata},
  title        = {A Secure Cloud-centric IoT Framework for Smart Device Registration},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {381--391},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.381},
  doi          = {10.2197/IPSJJIP.29.381},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TeerakanokUI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YamakawaOTIU21,
  author       = {Daiki Yamakawa and
                  Takashi Okimoto and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  title        = {Enhancing Digital Certificate Usability in Long Lifespan IoT Devices
                  by Utilizing Private {CA}},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6610863:1--6610863:14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6610863},
  doi          = {10.1155/2021/6610863},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YamakawaOTIU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TeerakanokUI21,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara and
                  Atsuo Inomata},
  title        = {Migrating to Zero Trust Architecture: Reviews and Challenges},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9947347:1--9947347:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9947347},
  doi          = {10.1155/2021/9947347},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TeerakanokUI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21,
  author       = {Hai Ngoc Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {109--120},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010232301090120},
  doi          = {10.5220/0010232301090120},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenTIU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21a,
  author       = {Hoang Viet Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Proposal of Double Agent Architecture using Actor-critic Algorithm
                  for Penetration Testing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {440--449},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010232504400449},
  doi          = {10.5220/0010232504400449},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenTIU21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/OkawaYGU21,
  author       = {Yuto Okawa and
                  Shuji Yamaguchi and
                  Hidehito Gomi and
                  Tetsutaro Uehara},
  title        = {Implementation of an extended {FIDO2} authenticator using Attribute-Based
                  Signatures},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {825--832},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00125},
  doi          = {10.1109/QRS-C55045.2021.00125},
  timestamp    = {Tue, 12 Apr 2022 17:57:49 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/OkawaYGU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/NguyenNU20,
  author       = {Hoang Viet Nguyen and
                  Hai Ngoc Nguyen and
                  Tetsutaro Uehara},
  title        = {Multiple Level Action Embedding for Penetration Testing},
  booktitle    = {{ICFNDS} '20: The 4th International Conference on Future Networks
                  and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020},
  pages        = {53:1--53:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3440749.3442660},
  doi          = {10.1145/3440749.3442660},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfnds/NguyenNU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/NgocVU20,
  author       = {Hai Ngoc Nguyen and
                  Hoang Nguyen Viet and
                  Tetsutaro Uehara},
  title        = {An Extended Benchmark System of Word Embedding Methods for Vulnerability
                  Detection},
  booktitle    = {{ICFNDS} '20: The 4th International Conference on Future Networks
                  and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020},
  pages        = {54:1--54:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3440749.3442661},
  doi          = {10.1145/3440749.3442661},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfnds/NgocVU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KosakataniUT20,
  author       = {Satoshi Kosakatani and
                  Tetsutaro Uehara and
                  Songpon Teerakanok},
  title        = {Japan's Act on Wiretapping for Criminal Investigation: How the system
                  is implemented and how it should be},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351320},
  doi          = {10.23919/ICITST51030.2020.9351320},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KosakataniUT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/TeerakanokYU20,
  author       = {Songpon Teerakanok and
                  Hiroaki Yasuki and
                  Tetsutaro Uehara},
  title        = {A Practical Solution Against Business Email Compromise {(BEC)} Attack
                  using Invoice Checksum},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00036},
  doi          = {10.1109/QRS-C51114.2020.00036},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/TeerakanokYU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiuSU20,
  author       = {Jigang Liu and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {Towards a Holistic Approach to Medical IoT Forensics},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {686--687},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00121},
  doi          = {10.1109/QRS-C51114.2020.00121},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiuSU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TeerakanokU19,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Copy-Move Forgery Detection: {A} State-of-the-Art Technical Review
                  and Analysis},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {40550--40568},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2907316},
  doi          = {10.1109/ACCESS.2019.2907316},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TeerakanokU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TeerakanokU19,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {574--584},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.574},
  doi          = {10.2197/IPSJJIP.27.574},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TeerakanokU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TeerakanokU18,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Enhancement of Media Splicing Detection: {A} General Framework},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {2},
  pages        = {8:1--8:12},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1481},
  doi          = {10.15394/JDFSL.2018.1481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TeerakanokU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SasakiUL18,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Jigang Liu},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Message from the {CFSE} 2018 Workshop Organizers},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {352},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10256},
  doi          = {10.1109/COMPSAC.2018.10256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SasakiUL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TeerakanokU18,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature:
                  {A} Preliminary Research},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {365--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10259},
  doi          = {10.1109/COMPSAC.2018.10259},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TeerakanokU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TeerakanokU17,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Digital Media Tampering Detection Techniques: An Overview},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2},
  pages        = {170--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.109},
  doi          = {10.1109/COMPSAC.2017.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TeerakanokU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiuKSU17,
  author       = {Jigang Liu and
                  Rashmi Kammar and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {Malware Behavior Ontology for Digital Evidence},
  booktitle    = {2017 {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS-C} 2017, Prague, Czech Republic, July
                  25-29, 2017},
  pages        = {585--586},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/QRS-C.2017.105},
  doi          = {10.1109/QRS-C.2017.105},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiuKSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siguccs/WadaFOTUUNTM17,
  author       = {Tomohito Wada and
                  Izumi Fuse and
                  Shigeto Okabe and
                  Tatsumi Takeo and
                  Hiroshi Ueda and
                  Tetsutaro Uehara and
                  Michio Nakanishi and
                  Takahiro Tagawa and
                  Ikuya Murata},
  editor       = {Cate Lyon and
                  Kristen Dietiker and
                  Chris Wiesemann},
  title        = {Producing Video Clips for Information Ethics and Security in Higher
                  Education},
  booktitle    = {Proceedings of the 2017 {ACM} Annual Conference on SIGUCCS, Seattle,
                  WA, USA, October 1-4, 2017},
  pages        = {129--131},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3123458.3123497},
  doi          = {10.1145/3123458.3123497},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/siguccs/WadaFOTUUNTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SasakiUL16,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Jigang Liu},
  title        = {Message from the {CFSE} Workshop Organizers},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {355},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.278},
  doi          = {10.1109/COMPSAC.2016.278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SasakiUL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/TeerakanokU16,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Enhancing Image Forgery Detection Using 2-D Cross Products},
  booktitle    = {Advances in Digital Forensics {XII} - 12th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 4-6, 2016, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {484},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46279-0\_15},
  doi          = {10.1007/978-3-319-46279-0\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/TeerakanokU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SasakiUL15,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Jigang Liu},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Message from the {CFSE} 2015 Workshop Organizers},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {17},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.297},
  doi          = {10.1109/COMPSAC.2015.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SasakiUL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TeerakanokU15,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Enhancment of Image Tampering Detection Using JPEG's Quantization
                  and Re-interpolation Processes},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {35--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.167},
  doi          = {10.1109/COMPSAC.2015.167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TeerakanokU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/WangUS15,
  author       = {Yifan Wang and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Fog Computing: Issues and Challenges in Security and Forensics},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.173},
  doi          = {10.1109/COMPSAC.2015.173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/WangUS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersec/HashimotoHMKKYU15,
  author       = {Kazuki Hashimoto and
                  Hiroyuki Hiruma and
                  Takashi Matsumoto and
                  Kosetus Kayama and
                  Yoshio Kaikizaki and
                  Hiroshi Yamaki and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of Intellectual Network Forensic System {LIFT} against
                  Targeted Attacks},
  booktitle    = {Fourth International Conference on Cyber Security, Cyber Warfare,
                  and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31,
                  2015},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSec.2015.13},
  doi          = {10.1109/CYBERSEC.2015.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersec/HashimotoHMKKYU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuLU14,
  author       = {Anyi Liu and
                  Jigang Liu and
                  Tetsutaro Uehara},
  editor       = {Noureddine Boudriga and
                  Slim Rekhis},
  title        = {Secure streaming forensic data transmission for trusted cloud},
  booktitle    = {Proceedings of the 2nd International Workshop on Security and Forensics
                  in Communication Systems, {SFCS} 2014, Kyoto, Japan, June 3, 2014},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2598918.2598922},
  doi          = {10.1145/2598918.2598922},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuLU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YamanoueFONNFTTMUYU14,
  author       = {Takashi Yamanoue and
                  Izumi Fuse and
                  Shigeto Okabe and
                  Atsushi Nakamura and
                  Michio Nakanishi and
                  Shozo Fukada and
                  Takahiro Tagawa and
                  Tatsumi Takeo and
                  Ikuya Murata and
                  Tetsutaro Uehara and
                  Tsuneo Yamada and
                  Hiroshi Ueda},
  title        = {Computer Ethics Video Clips for University Students in Japan from
                  2003 until 2013},
  booktitle    = {{IEEE} 38th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014},
  pages        = {96--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMPSACW.2014.21},
  doi          = {10.1109/COMPSACW.2014.21},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/YamanoueFONNFTTMUYU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  title        = {Double Encryption for Data Authenticity and Integrity in Privacy-
                  preserving Confidential Forensic Investigation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {104--113},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.104},
  doi          = {10.22667/JOWUA.2013.06.31.104},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakahashiSU13,
  author       = {Wataru Takahashi and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara},
  title        = {Development and Evaluation of Guideline Total Support System for Evidence
                  Preservation by Using an Android Phone},
  booktitle    = {{IEEE} 37th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013},
  pages        = {21--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMPSACW.2013.20},
  doi          = {10.1109/COMPSACW.2013.20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TakahashiSU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Verifying Data Authenticity and Integrity in Server-Aided Confidential
                  Forensic Investigation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {312--317},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_33},
  doi          = {10.1007/978-3-642-36818-9\_33},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiuUS11,
  author       = {Jigang Liu and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Development of digital forensics practice and research in Japan},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {240--253},
  year         = {2011},
  url          = {https://doi.org/10.1002/wcm.981},
  doi          = {10.1002/WCM.981},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiuUS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HouUYHC11,
  author       = {Shuhui Hou and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow},
  editor       = {Xiamu Niu and
                  Mingchu Li and
                  Y{\^{o}}iti Suzuki and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain},
  title        = {Privacy Preserving Confidential Forensic Investigation for Shared
                  or Remote Servers},
  booktitle    = {Seventh International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October
                  14-16, 2011},
  pages        = {378--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IIHMSP.2011.28},
  doi          = {10.1109/IIHMSP.2011.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/HouUYHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SakuraiAUYS10,
  author       = {Yui Sakurai and
                  Yuki Ashino and
                  Tetsutaro Uehara and
                  Hiroshi Yoshiura and
                  Ry{\^{o}}ichi Sasaki},
  title        = {HiGate (High Grade Anti-Tamper Equipment) Prototype and Application
                  to e-Discovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {21--34},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1073},
  doi          = {10.15394/JDFSL.2010.1073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SakuraiAUYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c5/SaitoAIOMUK10,
  author       = {Hiroki Saito and
                  Tetsuya Abe and
                  Kokolo Ikeda and
                  Kenji Ohira and
                  Mikihiko Mori and
                  Tetsutaro Uehara and
                  Hajime Kita},
  title        = {An Agent-Based Approach to Evaluation of Workflow Support Systems},
  booktitle    = {The Eighth International Conference on Creating, Connecting and Collaborating
                  through Computing, C\({}^{\mbox{5}}\) 2010, La Jolla, CA, USA, 25-28
                  January 2010},
  pages        = {51--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/C5.2010.17},
  doi          = {10.1109/C5.2010.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c5/SaitoAIOMUK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/OkadaOU10,
  author       = {Mitsuo Okada and
                  Yasuo Okabe and
                  Tetsutaro Uehara},
  title        = {A Web-Based Privacy-Secure Content Trading System for Small Content
                  Providers Using Semi-Blind Digital Watermarking},
  booktitle    = {7th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2010, Las Vegas, NV, USA, January 9-12, 2010},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CCNC.2010.5421697},
  doi          = {10.1109/CCNC.2010.5421697},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/OkadaOU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HouUSMM09,
  author       = {Shuhui Hou and
                  Tetsutaro Uehara and
                  Takashi Satoh and
                  Yoshitaka Morimura and
                  Michihiko Minoh},
  title        = {Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced
                  Incomplete Block Designs},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {876--887},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.876},
  doi          = {10.1587/TRANSINF.E92.D.876},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HouUSMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiuU09,
  author       = {Jigang Liu and
                  Tetsutaro Uehara},
  title        = {Computer Forensics in Japan: {A} Preliminary Study},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {1006--1011},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.94},
  doi          = {10.1109/ARES.2009.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiuU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c5/SagaIMUKNNUOO09,
  author       = {Masaki Saga and
                  Kokolo Ikeda and
                  Mikihiko Mori and
                  Tetsutaro Uehara and
                  Hajime Kita and
                  Yohei Naya and
                  Naomi Nagata and
                  Hiroto Ueda and
                  Akio Okumura and
                  Terufumi Ohno},
  title        = {Development of a Multiple User Quiz System on a Shared Display},
  booktitle    = {The Seventh International Conference on Creating, Connecting and Collaborating
                  through Computing, C\({}^{\mbox{5}}\) 2009, Kyoto, Japan, 19-22 January
                  2009},
  pages        = {103--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/C5.2009.28},
  doi          = {10.1109/C5.2009.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c5/SagaIMUKNNUOO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/DomaGUL09,
  author       = {Supraja Doma and
                  Larry Gottschalk and
                  Tetsutaro Uehara and
                  Jigang Liu},
  editor       = {Osvaldo Gervasi and
                  David Taniar and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {Resource Allocation Optimization for {GSD} Projects},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2009, International
                  Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5593},
  pages        = {13--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02457-3\_2},
  doi          = {10.1007/978-3-642-02457-3\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/DomaGUL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/AshinoFFUS09,
  author       = {Yuki Ashino and
                  Keisuke Fujita and
                  Maiko Furusawa and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Implementing Boot Control for Windows Vista},
  booktitle    = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, Florida, USA, January 26-28,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {306},
  pages        = {133--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04155-6\_10},
  doi          = {10.1007/978-3-642-04155-6\_10},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/AshinoFFUS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/OkadaOU09,
  author       = {Mitsuo Okada and
                  Yasuo Okabe and
                  Tetsutaro Uehara},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking
                  Techniques},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_5},
  doi          = {10.1007/978-3-642-03688-0\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/OkadaOU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/OkadaOU09,
  author       = {Mitsuo Okada and
                  Yasuo Okabe and
                  Tetsutaro Uehara},
  title        = {Security Analysis on Privacy-Secure Image Trading Framework Using
                  Blind Watermarking},
  booktitle    = {Ninth Annual International Symposium on Applications and the Internet,
                  {SAINT} 2009, Bellevue, Washington, USA, July 20-24, 2009, Proceedings},
  pages        = {243--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SAINT.2009.52},
  doi          = {10.1109/SAINT.2009.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/OkadaOU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HankinsUL09,
  author       = {Ryan Q. Hankins and
                  Tetsutaro Uehara and
                  Jigang Liu},
  title        = {A Comparative Study of Forensic Science and Computer Forensics},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {230--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.42},
  doi          = {10.1109/SSIRI.2009.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HankinsUL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HankinsUL09a,
  author       = {Ryan Q. Hankins and
                  Tetsutaro Uehara and
                  Jigang Liu},
  title        = {A Turing Machine-Based Model for Computer Forensic Reconstruction},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {289--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.41},
  doi          = {10.1109/SSIRI.2009.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HankinsUL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HouUSMM08,
  author       = {Shuhui Hou and
                  Tetsutaro Uehara and
                  Takashi Satoh and
                  Yoshitaka Morimura and
                  Michihiko Minoh},
  title        = {Integrating fingerprint with cryptosystem for internet-based live
                  pay-TV system},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {6},
  pages        = {461--472},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.80},
  doi          = {10.1002/SEC.80},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HouUSMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/FujitaAUS08,
  author       = {Keisuke Fujita and
                  Yuki Ashino and
                  Tetsutaro Uehara and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Indrajit Ray and
                  Sujeet Shenoi},
  title        = {Using Boot Control to Preserve the Integrity of Evidence},
  booktitle    = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference
                  on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30,
                  2008},
  series       = {{IFIP}},
  volume       = {285},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-84927-0\_6},
  doi          = {10.1007/978-0-387-84927-0\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/FujitaAUS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jsai/MoriIHSUK08,
  author       = {Mikihiko Mori and
                  Kokolo Ikeda and
                  Gaku Hagiwara and
                  Masaki Saga and
                  Tetsutaro Uehara and
                  Hajime Kita},
  editor       = {Hiromitsu Hattori and
                  Takahiro Kawamura and
                  Tsuyoshi Id{\'{e}} and
                  Makoto Yokoo and
                  Yohei Murakami},
  title        = {Socialized Computers and Collaborative Learning},
  booktitle    = {New Frontiers in Artificial Intelligence, {JSAI} 2008 Conference and
                  Workshops, Asahikawa, Japan, June 11-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5447},
  pages        = {48--61},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00609-8\_6},
  doi          = {10.1007/978-3-642-00609-8\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/jsai/MoriIHSUK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siguccs/FuseOYNNFTTMUY08,
  author       = {Izumi Fuse and
                  Shigeto Okabe and
                  Takashi Yamanoue and
                  Atsushi Nakamura and
                  Michio Nakanishi and
                  Shozo Fukada and
                  Takahiro Tagawa and
                  Tatsumi Takeo and
                  Ikuya Murata and
                  Tetsutaro Uehara and
                  Tsuneo Yamada},
  editor       = {Terris B. Wolff and
                  Parrish Nnambi and
                  Elizabeth Wagnon},
  title        = {Improving computer ethics video clips for higher education},
  booktitle    = {Proceedings of the 36th Annual {ACM} {SIGUCCS} Conference on User
                  Services 2008, Portland, OR, USA, October 19-22, 2008},
  pages        = {235--242},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1449956.1450028},
  doi          = {10.1145/1449956.1450028},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siguccs/FuseOYNNFTTMUY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c5/HagiwaraIMUK07,
  author       = {Gaku Hagiwara and
                  Kokolo Ikeda and
                  Mikihiko Mori and
                  Tetsutaro Uehara and
                  Hajime Kita},
  title        = {On Socialization of Personal Computing},
  booktitle    = {Fifth International Conference on Creating, Connecting and Collaborating
                  through Computing (C\({}^{\mbox{5}}\) 2007), 24-26 January 2007, Kyoto,
                  Japan},
  pages        = {71--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/C5.2007.22},
  doi          = {10.1109/C5.2007.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c5/HagiwaraIMUK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcam/HouUMM07,
  author       = {Shuhui Hou and
                  Tetsutaro Uehara and
                  Yoshitaka Morimura and
                  Michihiko Minoh},
  editor       = {Nicu Sebe and
                  Yuncai Liu and
                  Yueting Zhuang and
                  Thomas S. Huang},
  title        = {Fingerprinting Codes for Live Pay-Television Broadcast Via Internet},
  booktitle    = {Multimedia Content Analysis and Mining, International Workshop, {MCAM}
                  2007, Weihai, China, June 30 - July 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4577},
  pages        = {252--261},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73417-8\_32},
  doi          = {10.1007/978-3-540-73417-8\_32},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mcam/HouUMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/OnishiSUY05,
  author       = {Hiroki Onishi and
                  Takashi Satoh and
                  Tetsutaro Uehara and
                  Katsunori Yamaoka},
  title        = {{IP} Multicast Video Broadcasting System with User Authentication},
  booktitle    = {Proceedings of the 2005 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2005, July 6-9, 2005, Amsterdam, The Netherlands},
  pages        = {1186--1189},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICME.2005.1521639},
  doi          = {10.1109/ICME.2005.1521639},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/OnishiSUY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/NobuharaMUSK03,
  author       = {Hirofumi Nobuhara and
                  Masaaki Mineo and
                  Tetsutaro Uehara and
                  Shoichi Saito and
                  Yoshitoshi Kunieda},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Design and Implementation of the Loop Restructuring Feature for the
                  {MIRAI} Parallelizing Complier},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} '03, June 23 - 26,
                  2003, Las Vegas, Nevada, USA, Volume 3},
  pages        = {1134--1140},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Fri, 05 Dec 2003 09:24:17 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/NobuharaMUSK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/MineoYUSK02,
  author       = {Masaaki Mineo and
                  Satoshi Yokote and
                  Tetsutaro Uehara and
                  Shoichi Saito and
                  Yoshitoshi Kunieda},
  editor       = {Hamid R. Arabnia},
  title        = {An Automatic Parallelizing Compiler {MIRAI} with Data Distribution
                  Function and its Runtime Support System Fagus for Distributed Memory
                  Architecture},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} '02, June 24 - 27,
                  2002, Las Vegas, Nevada, USA, Volume 3},
  pages        = {1451--1457},
  publisher    = {{CSREA} Press},
  year         = {2002},
  timestamp    = {Mon, 09 Feb 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/MineoYUSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/OkunoYSUK02,
  author       = {Kazuya Okuno and
                  Satoshi Yokote and
                  Shoichi Saito and
                  Tetsutaro Uehara and
                  Yoshitoshi Kunieda},
  editor       = {Hamid R. Arabnia},
  title        = {A Wavefront Method on Distributed Shared Memory Systems for Protein
                  Homology Analysis},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} '02, June 24 - 27,
                  2002, Las Vegas, Nevada, USA, Volume 3},
  pages        = {1458--1464},
  publisher    = {{CSREA} Press},
  year         = {2002},
  timestamp    = {Mon, 09 Feb 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/OkunoYSUK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/SaitoHUJK00,
  author       = {Shoichi Saito and
                  Akihito Hayashi and
                  Tetsutaro Uehara and
                  Kazuki Joe and
                  Yoshitoshi Kunieda},
  editor       = {Hamid R. Arabnia},
  title        = {Wind : a Low-Costs Communication Module for Software {DSM} Systems},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2000, June 24-29,
                  2000, Las Vegas, Nevada, {USA}},
  publisher    = {{CSREA} Press},
  year         = {2000},
  timestamp    = {Mon, 08 Dec 2003 16:35:08 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/SaitoHUJK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/UeharaSJK99,
  author       = {Tetsutaro Uehara and
                  Shoichi Saito and
                  Kazuki Joe and
                  Yoshitoshi Kunieda},
  editor       = {Hamid R. Arabnia},
  title        = {The Design and Implementation of cc-COMA as a Platform for Distributed-Memory
                  Machines},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {1946--1952},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Tue, 20 Apr 2004 14:47:51 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/UeharaSJK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ishpc/UeharaKT97,
  author       = {Tetsutaro Uehara and
                  Yoshitoshi Kunieda and
                  Takao Tsuda},
  editor       = {Constantine D. Polychronopoulos and
                  Kazuki Joe and
                  Keijiro Araki and
                  Makoto Amamiya},
  title        = {An Automatic Vectorizing/Parallelizing Pascal Compiler V-Pascal {V.3}},
  booktitle    = {High Performance Computing, International Symposium, ISHPC'97, Fukuoka,
                  Japan, November 4-6, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1336},
  pages        = {205--216},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0024217},
  doi          = {10.1007/BFB0024217},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ishpc/UeharaKT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics