検索コンセプト
|
選択されたフィルタ
|
検索結果
-
Sector dominance ratio analysis of financial markets
Uechi, L., Akutsu, T., Stanley, H. E., Marcus, A. J. & Kenett, D. Y., 2015 3月 1, In: Physica A: Statistical Mechanics and its Applications. 421, p. 488-509 22 p.研究成果: Article › 査読
24 被引用数 (Scopus) -
Sectorial Hamiltonians without zero resonance in one dimension
Georgiev, V. & Giammetta, A. R., 2016, Contemporary Mathematics. American Mathematical Society, p. 225-237 13 p. (Contemporary Mathematics; vol. 666).研究成果: Chapter
3 被引用数 (Scopus) -
Secular bar mode instabilities in rotating relativistic stars
Saijo, M. & Gourgoulhon, E., 2006, Proceedings of the 16th Workshop on General Relativity and Gravitation in Japan, JGRG 2006. p. 86-89 4 p.研究成果: Chapter
-
Secular Stagnation and Low Interest Rates under the Fear of a Government Debt Crisis
Kobayashi, K. & Ueda, K., 2022, (Accepted/In press) In: Journal of Money, Credit and Banking.研究成果: Article › 査読
Open Access2 被引用数 (Scopus) -
Secure Agents for Supporting Best-Balanced Multilingual Communication
Pituxcoosuvarn, M., Nakaguchi, T., Lin, D. & Ishida, T., 2020, Cross-Cultural Design. Applications in Health, Learning, Communication, and Creativity - 12th International Conference, CCD 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Proceedings. Patrick Rau, P-L. (ed.). Springer, p. 376-388 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12193 LNCS).研究成果: Conference contribution
-
Secure and efficient mobile agent application reuse using patterns
Tahara, Y., Yoshioka, N., Ohsuga, A. & Honiden, S., 2001, Proceedings of SSR'01 2001 Symposium on Software Reusability. Association for Computing Machinery (ACM), p. 78-85 8 p. (Proceedings of SSR'01 2001 Symposium on Software Reusability).研究成果: Conference contribution
-
Secure and efficient tag searching in RFID systems using serverless search protocol
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F. & Nakajima, T., 2008 12月 1, In: International Journal of Security and its Applications. 2, 4, p. 57-66 10 p.研究成果: Article › 査読
12 被引用数 (Scopus) -
Secure and manageable virtual private networks for end-users
Kourai, K., Hirotsu, T., Sato, K., Akashi, O., Fukuda, K., Sugawara, T. & Chiba, S., 2003, Proceedings - 28th Annual IEEE International Conference on Local Computer Networks, LCN 2003, Held in conjunction with the Workshop on High-Speed Local Networks, HSLN 2003 and Workshop on Wireless Local Networks, WLN 2003. IEEE Computer Society, p. 385-394 10 p. 1243164. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2003-January).研究成果: Conference contribution
-
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness
Tan, L., Yu, K., Ming, F., Cheng, X. & Srivastava, G., 2022 5月 1, IEEE Consumer Electronics Magazine, 11, 3, p. 69-78 10 p.研究成果: Article
67 被引用数 (Scopus) -
Secure Artificial Intelligence of Things for Implicit Group Recommendations
Yu, K., Guo, Z., Shen, Y., Wang, W., Lin, J. C. W. & Sato, T., 2022 2月 15, In: IEEE Internet of Things Journal. 9, 4, p. 2698-2707 10 p.研究成果: Article › 査読
108 被引用数 (Scopus) -
Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption
Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 4月 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).研究成果: Conference contribution
-
Secure deduplication in a multiple group signature setting
Cho, E. M. & Koshiba, T., 2017 5月 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991研究成果: Conference contribution
-
Secure Digital Twin Migration in Edge-based Autonomous Driving System
Zhou, Y., Bashir, A. K., Wu, J., Al-Otaibi, Y. D., Lin, X. & Xu, H., 2022, (Accepted/In press) IEEE Consumer Electronics Magazine, p. 1-9 9 p.研究成果: Article
-
Secured information service platforms effective in case of disasters-Using multilayered communications network
Adachi, F., Tokuda, K. & Ohmori, S., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012. IEEE Computer Society, p. 348-349 2 p. 6398813. (International Symposium on Wireless Personal Multimedia Communications, WPMC).研究成果: Conference contribution
-
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., 2019 3月 8, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).研究成果: Conference contribution
7 被引用数 (Scopus) -
Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing
Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H. & Yamana, H., 2016, Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Proceedings. Springer Verlag, Vol. 9963 LNCS. p. 181-195 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9963 LNCS).研究成果: Conference contribution
7 被引用数 (Scopus) -
Secure Image Inference Using Pairwise Activation Functions
Agyepong, J. T., Soliman, M., Wada, Y., Kimura, K. & El-Mahdy, A., 2021, In: IEEE Access. 9, p. 118271-118290 20 p., 9521226.研究成果: Article › 査読
Open Access2 被引用数 (Scopus) -
Secure information flow as a safety problem
Terauchi, T. & Aiken, A., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 352-367 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3672 LNCS).研究成果: Conference contribution
184 被引用数 (Scopus) -
Secure interoperability between cooperating XML systems by dynamic role translation
Chatvichienchai, S., Iwaihara, M. & Kambayashi, Y., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2736, p. 866-875 10 p.研究成果: Article › 査読
2 被引用数 (Scopus) -
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE
Cong, R., Liu, Y., Wang, Y., Tago, K., Li, R., Asaeda, H. & Jin, Q., 2022, HCI for Cybersecurity, Privacy and Trust - 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Proceedings. Moallem, A. (ed.). Springer Science and Business Media Deutschland GmbH, p. 30-41 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13333 LNCS).研究成果: Conference contribution
-
Secure key distribution using correlated randomness in lasers driven by common random light
Yoshimura, K., Muramatsu, J., Davis, P., Harayama, T., Okumura, H., Morikatsu, S., Aida, H. & Uchida, A., 2012 2月 14, In: Physical Review Letters. 108, 7, 070602.研究成果: Article › 査読
109 被引用数 (Scopus) -
Secure naïve bayes classification protocol over encrypted data using fully homomorphic encryption
Yasumura, Y., Ishimaki, Y. & Yamana, H., 2019 12月 2, 21st International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2019 - Proceedings. Indrawan-Santiago, M., Pardede, E., Salvadori, I. L., Steinbauer, M., Khalil, I. & Anderst-Kotsis, G. (eds.). Association for Computing Machinery, (ACM International Conference Proceeding Series).研究成果: Conference contribution
3 被引用数 (Scopus) -
Secure non-transferable proxy re-encryption for group membership and non-membership
Cho, E. M., San, L. & Koshiba, T., 2018, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 876-887 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 7).研究成果: Chapter
-
Secure pattern matching using somewhat homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).研究成果: Conference contribution
83 被引用数 (Scopus) -
Secure scan design using improved random order and its evaluations
Oya, M., Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2015 2月 5, 2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014. February ed. Institute of Electrical and Electronics Engineers Inc., p. 555-558 4 p. 7032842. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS; vol. 2015-February, no. February).研究成果: Conference contribution
4 被引用数 (Scopus) -
Secure scan design with dynamically configurable connection
Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2013 1月 1, Proceedings - 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013. IEEE Computer Society, p. 256-262 7 p. 6820873. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).研究成果: Conference contribution
25 被引用数 (Scopus) -
Secure SMS transmission based on verifiable hash convergent group signcryption
Cho, E. M. & Koshiba, T., 2017 6月 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472. (Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017).研究成果: Conference contribution
2 被引用数 (Scopus) -
Secure statistical analysis using RLWE-based homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).研究成果: Conference contribution
19 被引用数 (Scopus) -
Secure voting using partially compatible homomorphisms
Sako, K. & Kilian, J., 1994, Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 411-424 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 839 LNCS).研究成果: Conference contribution
Open Access53 被引用数 (Scopus) -
Secure wavelet matrix: Alphabet-friendly privacy-preserving string search for bioinformatics
Sudo, H., Jimbo, M., Nuida, K. & Shimizu, K., 2019 9月, In: IEEE/ACM Transactions on Computational Biology and Bioinformatics. 16, 5, p. 1675-1684 10 p., 3370684.研究成果: Article › 査読
Open Access10 被引用数 (Scopus) -
Securing big data and IoT networks in smart cyber-physical environments
Das, S. K. & Yamana, H., 2017 7月 21, 2017 International Conference on Smart Digital Environment, ICSDE 2017 - Proceedings. Benhaddou, D., Habbani, A., Al-Fuqahaa, A. & El Bouanani, F. (eds.). Association for Computing Machinery, p. 189-194 6 p. (ACM International Conference Proceeding Series; vol. Part F130526).研究成果: Conference contribution
-
Securing compliance through the WTO dispute settlement system: Implementation of DSB recommendations
Fukunaga, Y., 2006 6月 1, In: Journal of International Economic Law. 9, 2, p. 383-426 44 p.研究成果: Review article › 査読
19 被引用数 (Scopus) -
Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
Yu, K., Tan, L., Mumtaz, S., Al-Rubaye, S., Al-Dulaimi, A., Bashir, A. K. & Khan, F. A., 2021 10月 1, In: IEEE Communications Magazine. 59, 10, p. 76-82 7 p.研究成果: Article › 査読
120 被引用数 (Scopus) -
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement
Wu, J., Dong, M., Ota, K., Liang, L. & Zhou, Z., 2015 11月 21, In: Peer-to-Peer Networking and Applications. 8, 6, p. 1133-1142 10 p.研究成果: Article › 査読
30 被引用数 (Scopus) -
Securing Radio Resources Allocation With Deep Reinforcement Learning for IoE Services in Next-Generation Wireless Networks
Peng, Y., Xue, X., Bashir, A. K., Zhu, X., Al-Otaibi, Y. D., Tariq, U. & Yu, K., 2022, In: IEEE Transactions on Network Science and Engineering. 9, 5, p. 2991-3003 13 p.研究成果: Article › 査読
1 被引用数 (Scopus) -
Security
Ohta, H., 2014 7月 11, Essential Concepts of Global Environmental Governance. Taylor and Francis Inc., p. 191-193 3 p.研究成果: Chapter
-
Security
Ohta, H., 2020 8月 31, Essential Concepts of Global Environmental Governance. Taylor and Francis Inc., p. 236-237 2 p.研究成果: Chapter
-
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things
Feng, X., Wu, J., Wang, K., Li, J. & Wang, M., 2018 3月 29, Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc., p. 326-330 5 p. (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017; vol. 2018-January).研究成果: Conference contribution
3 被引用数 (Scopus) -
Security and guidance: Two roles for a humanoid robot in an interaction experiment
Trovato, G., Lopez, A., Paredes, R. & Cuellar, F., 2017 12月 8, RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication. Institute of Electrical and Electronics Engineers Inc., p. 230-235 6 p. (RO-MAN 2017 - 26th IEEE International Symposium on Robot and Human Interactive Communication; vol. 2017-January).研究成果: Conference contribution
9 被引用数 (Scopus) -
Security and intelligent management for fog/edge computing resources
Wu, J., 2021, Advances in Information Security. Springer, p. 213-234 22 p. (Advances in Information Security; vol. 83).研究成果: Chapter
2 被引用数 (Scopus) -
Security and privacy behavior definition for behavior driven development
Okubo, T., Kakizaki, Y., Kobashi, T., Washizaki, H., Ogata, S., Kaiya, H. & Yoshioka, N., 2014, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8892, p. 306-309 4 p.研究成果: Article › 査読
1 被引用数 (Scopus) -
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)
Park, N., Hu, H. & Jin, Q., 2016, In: International Journal of Distributed Sensor Networks. 2016, 2965438.研究成果: Editorial › 査読
Open Access22 被引用数 (Scopus) -
Security-aware distributed service composition for wireless sensor networks based smart metering in smart grid using software defined networks
Li, G., Wu, Y., Wu, J., Li, J. & Zhao, C., 2018, Wireless Internet - 9th International Conference, WICON 2016, Proceedings. Huang, M., Jing, W., Mehmood, A. & Zhang, Y. (eds.). Springer Verlag, p. 91-97 7 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 214).研究成果: Conference contribution
1 被引用数 (Scopus) -
Security driven requirements refinement and exploration of architecture with multiple NFR points of view
Okubo, T., Yoshioka, N. & Kaiya, H., 2014, p. 201-205. 5 p.研究成果: Paper › 査読
2 被引用数 (Scopus) -
Security enhancement of electric power systems by approximate reasoning
Niimura, T. & Yokoyama, R., 1995, IEEE International Conference on Fuzzy Systems. Anon (ed.). Piscataway, NJ, United States: IEEE, Vol. 1. p. 205-210 6 p.研究成果: Conference contribution
-
Security for IEEE P1451.0-Based IoT Sensor Networks
Zhou, K., Wu, J., Lee, K. B. & Song, E. Y., 2021 10月 13, IECON 2021 - 47th Annual Conference of the IEEE Industrial Electronics Society. IEEE Computer Society, (IECON Proceedings (Industrial Electronics Conference); vol. 2021-October).研究成果: Conference contribution
1 被引用数 (Scopus) -
Security for mobile agents
Yoshioka, N., Tahara, Y., Ohsuga, A. & Honiden, S., 2001, Agent-Oriented Software Engineering - First International Workshop, AOSE 2000, Revised Papers. p. 223-234 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1957 LNCS).研究成果: Conference contribution
-
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Lin, G., Dong, M., Ota, K., Li, J., Yang, W. & Wu, J., 2019 5月, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8761217. (IEEE International Conference on Communications; vol. 2019-May).研究成果: Conference contribution
4 被引用数 (Scopus) -
Security in photonic networks: Threats and security enhancement
Kitayama, K. I., Sasaki, M., Araki, S., Tsubokawa, M., Tomita, A., Inoue, K., Harasawa, K., Nagasako, Y. & Takada, A., 2011, In: Journal of Lightwave Technology. 29, 21, p. 3210-3222 13 p., 6003728.研究成果: Article › 査読
75 被引用数 (Scopus) -
Security patterns: Comparing modeling approaches
Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C. B., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, T. T., Washizaki, H., Yoshioka, N. & Yu, Y., 2010 12月 1, Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global, p. 75-111 37 p.研究成果: Chapter
22 被引用数 (Scopus)