Follow
Akira Kanaoka (金岡 晃)
Akira Kanaoka (金岡 晃)
Professor, Toho University
Verified email at is.sci.toho-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
FPGA and ASIC implementations of the çT pairing in characteristic three
JL Beuchat, H Doi, K Fujita, A Inomata, P Ith, A Kanaoka, M Katouno, ...
Computers & electrical engineering 36 (1), 73-87, 2010
322010
Toward practical searchable symmetric encryption
W Ogata, K Koiwa, A Kanaoka, S Matsuo
Advances in Information and Computer Security: 8th International Workshop on …, 2013
312013
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
262015
New methods to ensure security to increase user's sense of safety in cloud services
Y Miyanishi, A Kanaoka, F Sato, X Han, S Kitagami, Y Urano, N Shiratori
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 …, 2014
262014
Multivariate statistical analysis of network traffic for intrusion detection
A Kanaoka, E Okamoto
14th International Workshop on Database and Expert Systems Applications …, 2003
232003
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded …, 2013
192013
Building secure and anonymous communication channel: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, T Takahashi
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1641-1648, 2014
182014
Identifying potentially-impacted area by vulnerabilities in networked systems using CVSS
T Harada, A Kanaoka, E Okamoto, M Kato
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010
172010
32-bit AS number based IP Traceback
M Okada, Y Katsuno, A Kanaoka, E Okamoto
2011 Fifth International Conference on Innovative Mobile and Internet …, 2011
162011
Tracing advanced persistent threats in networked systems
M Kato, T Matsunami, A Kanaoka, H Koide, E Okamoto
Automated Security Management, 179-187, 2013
142013
IEICE Technical Report
H Tahara, K Iwanaga, M Hirano, R Baba, T Sagara, H Murakami, ...
121971
Key-updatable public-key encryption with keyword search: Models and generic constructions
H Anada, A Kanaoka, N Matsuzaki, Y Watanabe
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
112018
A KEM/DEM-based construction for secure and anonymous communication
K Emura, A Kanaoka, S Ohta, T Takahashi
2015 IEEE 39th Annual Computer Software and Applications Conference 3, 680-681, 2015
112015
Time series analysis of copy-and-paste impact on Android application security
H Imai, A Kanaoka
2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 15-22, 2018
102018
安全なネットワークシステム設計のためのマルチレイヤネットワークモデルの提案と応用
金岡晃, 原田敏樹, 加藤雅彦, 勝野恭治, 岡本栄司
情報処理学会論文誌 51 (9), 1726-1735, 2010
102010
Extraction of parameters from well managed networked system in access control
A Kanaoka, M Katoh, N Toudou, E Okamoto
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
102009
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
H Anada, A Kanaoka, N Matsuzaki, Y Watanabe
International Journal of Information Security 19 (1), 15-38, 2020
92020
Probabilistic packet marking method considering topology property for efficiently re-building dos attack paths
A Kanaoka, M Okada, Y Katsuno, E Okamoto
情報処理学会論文誌ジャーナル (CD-ROM) 52 (3), 929-939, 2011
92011
Helping johnny to search: Encrypted search on webmail system
T Midorikawa, A Tachikawa, A Kanaoka
2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 47-53, 2018
82018
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation
K Emura, A Kanaoka, S Ohta, T Takahashi
Journal of Information Security and Applications 34, 84-91, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20