Search concepts
|
Selected filters
|
- 64,300 - 64,350 out of 79,961 results
Search results
-
Secular bar mode instabilities in rotating relativistic stars
Saijo, M. & Gourgoulhon, E., 2006, Proceedings of the 16th Workshop on General Relativity and Gravitation in Japan, JGRG 2006. p. 86-89 4 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secular Stagnation and Low Interest Rates under the Fear of a Government Debt Crisis
Kobayashi, K. & Ueda, K., 2022, (Accepted/In press) In: Journal of Money, Credit and Banking.Research output: Contribution to journal › Article › peer-review
Open Access2 Citations (Scopus) -
Secure Agents for Supporting Best-Balanced Multilingual Communication
Pituxcoosuvarn, M., Nakaguchi, T., Lin, D. & Ishida, T., 2020, Cross-Cultural Design. Applications in Health, Learning, Communication, and Creativity - 12th International Conference, CCD 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Proceedings. Patrick Rau, P-L. (ed.). Springer, p. 376-388 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12193 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure and efficient mobile agent application reuse using patterns
Tahara, Y., Yoshioka, N., Ohsuga, A. & Honiden, S., 2001, Proceedings of SSR'01 2001 Symposium on Software Reusability. Association for Computing Machinery (ACM), p. 78-85 8 p. (Proceedings of SSR'01 2001 Symposium on Software Reusability).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secure and efficient tag searching in RFID systems using serverless search protocol
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F. & Nakajima, T., 2008 Dec 1, In: International Journal of Security and its Applications. 2, 4, p. 57-66 10 p.Research output: Contribution to journal › Article › peer-review
12 Citations (Scopus) -
Secure and manageable virtual private networks for end-users
Kourai, K., Hirotsu, T., Sato, K., Akashi, O., Fukuda, K., Sugawara, T. & Chiba, S., 2003, Proceedings - 28th Annual IEEE International Conference on Local Computer Networks, LCN 2003, Held in conjunction with the Workshop on High-Speed Local Networks, HSLN 2003 and Workshop on Wireless Local Networks, WLN 2003. IEEE Computer Society, p. 385-394 10 p. 1243164. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2003-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Citations (Scopus) -
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness
Tan, L., Yu, K., Ming, F., Cheng, X. & Srivastava, G., 2022 May 1, IEEE Consumer Electronics Magazine, 11, 3, p. 69-78 10 p.Research output: Contribution to specialist publication › Article
67 Citations (Scopus) -
Secure Artificial Intelligence of Things for Implicit Group Recommendations
Yu, K., Guo, Z., Shen, Y., Wang, W., Lin, J. C. W. & Sato, T., 2022 Feb 15, In: IEEE Internet of Things Journal. 9, 4, p. 2698-2707 10 p.Research output: Contribution to journal › Article › peer-review
108 Citations (Scopus) -
Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption
Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure deduplication in a multiple group signature setting
Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure Digital Twin Migration in Edge-based Autonomous Driving System
Zhou, Y., Bashir, A. K., Wu, J., Al-Otaibi, Y. D., Lin, X. & Xu, H., 2022, (Accepted/In press) IEEE Consumer Electronics Magazine, p. 1-9 9 p.Research output: Contribution to specialist publication › Article
-
Secured information service platforms effective in case of disasters-Using multilayered communications network
Adachi, F., Tokuda, K. & Ohmori, S., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012. IEEE Computer Society, p. 348-349 2 p. 6398813. (International Symposium on Wireless Personal Multimedia Communications, WPMC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., 2019 Mar 8, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing
Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H. & Yamana, H., 2016, Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Proceedings. Springer Verlag, Vol. 9963 LNCS. p. 181-195 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9963 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Secure Image Inference Using Pairwise Activation Functions
Agyepong, J. T., Soliman, M., Wada, Y., Kimura, K. & El-Mahdy, A., 2021, In: IEEE Access. 9, p. 118271-118290 20 p., 9521226.Research output: Contribution to journal › Article › peer-review
Open Access2 Citations (Scopus) -
Secure information flow as a safety problem
Terauchi, T. & Aiken, A., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 352-367 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3672 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
179 Citations (Scopus) -
Secure interoperability between cooperating XML systems by dynamic role translation
Chatvichienchai, S., Iwaihara, M. & Kambayashi, Y., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2736, p. 866-875 10 p.Research output: Contribution to journal › Article › peer-review
2 Citations (Scopus) -
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE
Cong, R., Liu, Y., Wang, Y., Tago, K., Li, R., Asaeda, H. & Jin, Q., 2022, HCI for Cybersecurity, Privacy and Trust - 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Proceedings. Moallem, A. (ed.). Springer Science and Business Media Deutschland GmbH, p. 30-41 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13333 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure key distribution using correlated randomness in lasers driven by common random light
Yoshimura, K., Muramatsu, J., Davis, P., Harayama, T., Okumura, H., Morikatsu, S., Aida, H. & Uchida, A., 2012 Feb 14, In: Physical Review Letters. 108, 7, 070602.Research output: Contribution to journal › Article › peer-review
109 Citations (Scopus) -
Secure naïve bayes classification protocol over encrypted data using fully homomorphic encryption
Yasumura, Y., Ishimaki, Y. & Yamana, H., 2019 Dec 2, 21st International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2019 - Proceedings. Indrawan-Santiago, M., Pardede, E., Salvadori, I. L., Steinbauer, M., Khalil, I. & Anderst-Kotsis, G. (eds.). Association for Computing Machinery, (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Secure non-transferable proxy re-encryption for group membership and non-membership
Cho, E. M., San, L. & Koshiba, T., 2018, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 876-887 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 7).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secure pattern matching using somewhat homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
83 Citations (Scopus) -
Secure scan design using improved random order and its evaluations
Oya, M., Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2015 Feb 5, 2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014. February ed. Institute of Electrical and Electronics Engineers Inc., p. 555-558 4 p. 7032842. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS; vol. 2015-February, no. February).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Secure scan design with dynamically configurable connection
Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2013 Jan 1, Proceedings - 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013. IEEE Computer Society, p. 256-262 7 p. 6820873. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
25 Citations (Scopus) -
Secure SMS transmission based on verifiable hash convergent group signcryption
Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472. (Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Secure statistical analysis using RLWE-based homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
19 Citations (Scopus) -
Secure voting using partially compatible homomorphisms
Sako, K. & Kilian, J., 1994, Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 411-424 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 839 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access53 Citations (Scopus) -
Secure wavelet matrix: Alphabet-friendly privacy-preserving string search for bioinformatics
Sudo, H., Jimbo, M., Nuida, K. & Shimizu, K., 2019 Sept, In: IEEE/ACM Transactions on Computational Biology and Bioinformatics. 16, 5, p. 1675-1684 10 p., 3370684.Research output: Contribution to journal › Article › peer-review
Open Access10 Citations (Scopus) -
Securing big data and IoT networks in smart cyber-physical environments
Das, S. K. & Yamana, H., 2017 Jul 21, 2017 International Conference on Smart Digital Environment, ICSDE 2017 - Proceedings. Benhaddou, D., Habbani, A., Al-Fuqahaa, A. & El Bouanani, F. (eds.). Association for Computing Machinery, p. 189-194 6 p. (ACM International Conference Proceeding Series; vol. Part F130526).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Securing compliance through the WTO dispute settlement system: Implementation of DSB recommendations
Fukunaga, Y., 2006 Jun 1, In: Journal of International Economic Law. 9, 2, p. 383-426 44 p.Research output: Contribution to journal › Review article › peer-review
19 Citations (Scopus) -
Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
Yu, K., Tan, L., Mumtaz, S., Al-Rubaye, S., Al-Dulaimi, A., Bashir, A. K. & Khan, F. A., 2021 Oct 1, In: IEEE Communications Magazine. 59, 10, p. 76-82 7 p.Research output: Contribution to journal › Article › peer-review
119 Citations (Scopus) -
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement
Wu, J., Dong, M., Ota, K., Liang, L. & Zhou, Z., 2015 Nov 21, In: Peer-to-Peer Networking and Applications. 8, 6, p. 1133-1142 10 p.Research output: Contribution to journal › Article › peer-review
30 Citations (Scopus) -
Securing Radio Resources Allocation With Deep Reinforcement Learning for IoE Services in Next-Generation Wireless Networks
Peng, Y., Xue, X., Bashir, A. K., Zhu, X., Al-Otaibi, Y. D., Tariq, U. & Yu, K., 2022, In: IEEE Transactions on Network Science and Engineering. 9, 5, p. 2991-3003 13 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Security
Ohta, H., 2014 Jul 11, Essential Concepts of Global Environmental Governance. Taylor and Francis Inc., p. 191-193 3 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Security
Ohta, H., 2020 Aug 31, Essential Concepts of Global Environmental Governance. Taylor and Francis Inc., p. 236-237 2 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things
Feng, X., Wu, J., Wang, K., Li, J. & Wang, M., 2018 Mar 29, Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc., p. 326-330 5 p. (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017; vol. 2018-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security and guidance: Two roles for a humanoid robot in an interaction experiment
Trovato, G., Lopez, A., Paredes, R. & Cuellar, F., 2017 Dec 8, RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication. Institute of Electrical and Electronics Engineers Inc., p. 230-235 6 p. (RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication; vol. 2017-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Citations (Scopus) -
Security and intelligent management for fog/edge computing resources
Wu, J., 2021, Advances in Information Security. Springer, p. 213-234 22 p. (Advances in Information Security; vol. 83).Research output: Chapter in Book/Report/Conference proceeding › Chapter
2 Citations (Scopus) -
Security and privacy behavior definition for behavior driven development
Okubo, T., Kakizaki, Y., Kobashi, T., Washizaki, H., Ogata, S., Kaiya, H. & Yoshioka, N., 2014, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8892, p. 306-309 4 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)
Park, N., Hu, H. & Jin, Q., 2016, In: International Journal of Distributed Sensor Networks. 2016, 2965438.Research output: Contribution to journal › Editorial › peer-review
Open Access22 Citations (Scopus) -
Security-aware distributed service composition for wireless sensor networks based smart metering in smart grid using software defined networks
Li, G., Wu, Y., Wu, J., Li, J. & Zhao, C., 2018, Wireless Internet - 9th International Conference, WICON 2016, Proceedings. Huang, M., Jing, W., Mehmood, A. & Zhang, Y. (eds.). Springer Verlag, p. 91-97 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 214).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security driven requirements refinement and exploration of architecture with multiple NFR points of view
Okubo, T., Yoshioka, N. & Kaiya, H., 2014, p. 201-205. 5 p.Research output: Contribution to conference › Paper › peer-review
2 Citations (Scopus) -
Security enhancement of electric power systems by approximate reasoning
Niimura, T. & Yokoyama, R., 1995, IEEE International Conference on Fuzzy Systems. Anon (ed.). Piscataway, NJ, United States: IEEE, Vol. 1. p. 205-210 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security for IEEE P1451.0-Based IoT Sensor Networks
Zhou, K., Wu, J., Lee, K. B. & Song, E. Y., 2021 Oct 13, IECON 2021 - 47th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society, (IECON Proceedings (Industrial Electronics Conference); vol. 2021-October).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Security for mobile agents
Yoshioka, N., Tahara, Y., Ohsuga, A. & Honiden, S., 2001, Agent-Oriented Software Engineering - First International Workshop, AOSE 2000, Revised Papers. p. 223-234 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1957 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Lin, G., Dong, M., Ota, K., Li, J., Yang, W. & Wu, J., 2019 May, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8761217. (IEEE International Conference on Communications; vol. 2019-May).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Security in photonic networks: Threats and security enhancement
Kitayama, K. I., Sasaki, M., Araki, S., Tsubokawa, M., Tomita, A., Inoue, K., Harasawa, K., Nagasako, Y. & Takada, A., 2011, In: Journal of Lightwave Technology. 29, 21, p. 3210-3222 13 p., 6003728.Research output: Contribution to journal › Article › peer-review
74 Citations (Scopus) -
Security patterns: Comparing modeling approaches
Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C. B., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, T. T., Washizaki, H., Yoshioka, N. & Yu, Y., 2010 Dec 1, Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global, p. 75-111 37 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
22 Citations (Scopus) -
Security patterns: A method for constructing secure and efficient inter-company coordination systems
Yoshioka, N., Honiden, S. & Finkelstein, A., 2004, Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. p. 84-97 14 p. (Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Citations (Scopus) -
Security patterns: Research direction, metamodel, application and verification
Washizaki, H., 2018 Jan 29, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Citations (Scopus)