Остановите войну!
for scientists:
default search action
Toru Nakamura
- > Home > Persons > Toru Nakamura
Publications
- 2024
- [j20]Toru Nakamura, Hiroki Okada, Kazuhide Fukushima, Takamasa Isohara:
Private Verification in Multi-stakeholder Environment and its Application to Stable Matching. SN Comput. Sci. 5(3): 309 (2024) - [c50]Kittiphop Phalakarn, Toru Nakamura:
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets. ACNS (1) 2024: 119-134 - 2023
- [j19]Tomoaki Mimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Masayuki Hashimoto, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno:
Privacy-Preserving Correlation Coefficient. IEICE Trans. Inf. Syst. 106(5): 868-876 (2023) - [j17]Tomoaki Mimoto, Takashi Matsunaka, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara:
Hierarchical Local Differential Privacy. J. Inf. Process. 31: 821-828 (2023) - [j16]Haibo Zhang, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
A Review on Machine Unlearning. SN Comput. Sci. 4(4): 337 (2023) - [c49]Kei Ikebe, Yudai Hata, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT). ASSE 2023: 119-125 - [c45]Toru Nakamura, Hiroki Okada, Kazuhide Fukushima, Takamasa Isohara:
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching. ICEIS (1) 2023: 768-775 - [c42]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. NSS 2023: 155-176 - [c41]Sascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, Toru Nakamura:
Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning. PST 2023: 1-7 - [c40]Kittiphop Phalakarn, Toru Nakamura, Takamasa Isohara:
Privacy-Preserving Reputation System Against Dishonest Queries. PST 2023: 1-9 - 2022
- [j14]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j13]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. Cryptogr. 6(2): 20 (2022) - [c39]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [c38]Yukiko Sawaya, Ayane Sano, Toru Nakamura, Takamasa Isohara:
Analysis of Trust Factors in Children's Abilities to Use Digital Devices. GoodIT 2022: 82-88 - [c37]Tomoaki Mimoto, Masayuki Hashimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno:
Differential Privacy under Incalculable Sensitivity. CSP 2022: 27-31 - [c36]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities. ISPEC 2022: 554-572 - [c35]Vanessa Bracamonte, Seira Hidano, Toru Nakamura, Shinsaku Kiyomoto:
Feature-level Approach for the Evaluation of Text Classification Models. VISIGRAPP (3: IVAPP) 2022: 164-170 - 2021
- [j11]Sascha Löbner, Welderufael B. Tesfay, Toru Nakamura, Sebastian Pape:
Explainable Machine Learning for Default Privacy Setting Prediction. IEEE Access 9: 63700-63717 (2021) - [j9]Jun Kurihara, Toru Nakamura, Ryu Watanabe:
Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1271-1283 (2021) - [j8]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Kouichi Sakurai:
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. Theor. Comput. Sci. 891: 131-148 (2021) - [c33]Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi:
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. IWSEC 2021: 64-73 - [c32]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - 2020
- [j7]Shohei Kakei, Yoshiaki Shiraishi, Masami Mohri, Toru Nakamura, Masayuki Hashimoto, Shoichi Saito:
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric. IEEE Access 8: 135742-135757 (2020) - [c31]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132 - 2019
- [j6]Toru Nakamura, Andrew A. Adams, Kiyoshi Murata, Shinsaku Kiyomoto, Nobuo Suzuki:
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability. J. Inf. Process. 27: 787-801 (2019) - [c30]Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. DASC/PiCom/DataCom/CyberSciTech 2019: 338-343 - [c25]Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura, Masahito Ishizaka, Yasuaki Kobayashi:
A Framework for Secure and Trustworthy Data Management in Supply Chain. MobiWIS 2019: 148-159 - [c24]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices. NSS 2019: 675-684 - [c23]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR. WISA 2019: 126-140 - 2018
- [j5]Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto:
PPM: Privacy Policy Manager for Home Energy Management System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 42-56 (2018) - [c22]Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna:
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation. IWSPA@CODASPY 2018: 15-21 - [c21]Keishiro Fukushima, Toru Nakamura, Daisuke Ikeda, Shinsaku Kiyomoto:
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features. ICCSP 2018: 62-66 - [c20]Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna:
I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR. WWW (Companion Volume) 2018: 163-166 - 2017
- [c19]Toru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, Jetzabel M. Serna:
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences. DPM/CBT@ESORICS 2017: 107-123 - 2016
- [c17]Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna:
Easing the Burden of Setting Privacy Preferences: A Machine Learning Approach. ICISSP (Revised Selected Papers) 2016: 44-63 - [c16]Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna:
Personalised Privacy by Default Preferences - Experiment and Analysis. ICISSP 2016: 53-62 - [c15]Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg:
On Gender Specific Perception of Data Sharing in Japan. SEC 2016: 150-160 - 2015
- [c14]Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi:
Personal Agent for Services in ITS. ARES 2015: 493-500 - [c12]Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura:
Lightweight Practical Private One-Way Anonymous Messaging. IFIPTM 2015: 76-91 - [c11]Anirban Basu, Toru Nakamura, Seira Hidano, Shinsaku Kiyomoto:
k-anonymity: Risks and the Reality. TrustCom/BigDataSE/ISPA (1) 2015: 983-989 - [c10]Shinsaku Kiyomoto, Toru Nakamura, Yutaka Miyake:
Towards Tracing of k-Anonymized Datasets. TrustCom/BigDataSE/ISPA (1) 2015: 1237-1242 - 2013
- [c8]Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake:
PPM: Privacy Policy Manager for Personalized Services. CD-ARES Workshops 2013: 377-392 - [c7]Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake:
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. TrustCom/ISPA/IUCC 2013: 354-361 - 2011
- [j2]Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura:
Password Based Anonymous Authentication with Private Information Retrieval. J. Digit. Inf. Manag. 9(2): 72-78 (2011) - [c5]Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura:
An Anonymous Authentication Protocol with Single-database PIR. AISC 2011: 3-8 - 2010
- [c4]Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura:
An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services. ICCSA (4) 2010: 236-251 - 2007
- [c3]Tomomi Yamasaki, Toru Nakamura, Kensuke Baba, Hiroto Yasuura:
A Door Access Control System with Mobile Phones. PWC 2007: 230-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint