2008 |
37 | EE | Hiroaki Kikuchi,
Naoya Fukuno,
Tomohiro Kobori,
Masato Terada,
Tangtisanon Pikulkaew:
Automated Classification of Port-Scans from Distributed Sensors.
AINA 2008: 771-778 |
36 | EE | Tomohiro Kobori,
Hiroaki Kikuchi,
Masato Terada:
Internet Observation with ISDAS: How Long Does a Worm Perform Scanning?
ARES 2008: 1282-1286 |
35 | EE | Hiroaki Kikuchi,
Kei Nagai,
Wakaha Ogata,
Masakatsu Nishigaki:
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication.
MDAI 2008: 3-14 |
34 | EE | Hiroaki Kikuchi,
Naoya Fukuno,
Masato Terada,
Norihisa Doi:
Principal Components of Port-Address Matrices in Port-Scan Analysis.
OTM Conferences (2) 2008: 956-968 |
33 | EE | Gembu Morohashi,
Koji Chida,
Keiichi Hirota,
Hiroaki Kikuchi:
Secure Multiparty Computation for Comparator Networks.
IEICE Transactions 91-A(9): 2349-2355 (2008) |
32 | EE | Mitsuo Okada,
Hiroaki Kikuchi,
Yasuo Okabe:
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information.
IEICE Transactions 91-D(5): 1348-1358 (2008) |
2007 |
31 | | Atsuko Miyaji,
Hiroaki Kikuchi,
Kai Rannenberg:
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings
Springer 2007 |
30 | EE | Hiroaki Kikuchi,
Yuichi Nakamura:
Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent.
AINA Workshops (1) 2007: 199-202 |
29 | EE | Kei Nagai,
Hiroaki Kikuchi,
Wakaha Ogata,
Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
ARES 2007: 1155-1159 |
28 | EE | Koji Chida,
Hiroaki Kikuchi,
Gembu Morohashi,
Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks.
ARES 2007: 1183-1189 |
27 | EE | Hiroaki Kikuchi,
Masato Terada,
Naoya Fukuno,
Norihisa Doi:
Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.
OTM Conferences (2) 2007: 1659-1674 |
26 | EE | Hiroaki Kikuchi,
Yasunori Onuki,
Kei Nagai:
Evaluation and implement of fuzzy vault scheme using indexed minutiae.
SMC 2007: 3709-3712 |
2006 |
25 | EE | Hiroaki Kikuchi:
Dual RSA Accumulators and Its Application for Private Revocation Check.
AINA (1) 2006: 237-242 |
24 | EE | Hiroaki Kikuchi,
Masato Terada:
How Many Malicious Scanners Are in the Internet?
WISA 2006: 381-390 |
2005 |
23 | EE | Junji Nakazato,
Kenji Fujimoto,
Hiroaki Kikuchi:
Privacy Preserving Web-Based Questionnaire.
AINA 2005: 285-288 |
22 | EE | Yuichi Nakamura,
Hiroaki Kikuchi:
Efficient Key Management Based on the Subset Difference Method for Secure Group Communication.
AINA 2005: 707-712 |
21 | EE | Mitsuo Okada,
Hiroaki Kikuchi:
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.
WISA 2005: 165-178 |
2004 |
20 | EE | Hiroaki Kikuchi,
Minako Tada,
Shohachiro Nakanishi:
Secure Instant Messaging Protocol Preserving Confidentiality against Administrator.
AINA (2) 2004: 27-30 |
19 | EE | Hiroaki Kikuchi:
Rabin Tree and Its Application to Group Key Distribution.
ATVA 2004: 384-391 |
18 | | Hiroaki Kikuchi,
Junji Nakazato:
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
SEC 2004: 177-192 |
17 | EE | Noboru Takagi,
Hiroaki Kikuchi,
Masao Mukaidono:
Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases.
T. Rough Sets: 107-128 (2004) |
2002 |
16 | EE | Hiroaki Kikuchi:
Oblivious Counter and Majority Protocol.
ISC 2002: 437-445 |
15 | EE | Hiroaki Kikuchi,
Noboru Takagi:
de Morgan Bisemilattice of Fuzzy Truth Value.
ISMVL 2002: 180-184 |
14 | | Hiroaki Kikuchi,
Noboru Takagi:
Hierarchical fuzzy modeling and jointly expandable functions.
Int. J. Intell. Syst. 17(5): 515-529 (2002) |
2001 |
13 | | Noboru Takagi,
Hiroaki Kikuchi,
Kyoichi Nakashima:
Multi-Interval Truth Valued Logic.
FUZZ-IEEE 2001: 1119-1122 |
12 | | Hiroaki Kikuchi:
Closures of Fuzzy Linguitic Trugh Value With Regards to the Extension Principle.
FUZZ-IEEE 2001: 1416-1419 |
11 | EE | Hiroaki Kikuchi:
(M+1)st-Price Auction Protocol.
Financial Cryptography 2001: 341-353 |
10 | EE | Hiroaki Kikuchi:
Power Auction Protocol without Revealing Winning Bids.
ICOIN 2001: 61- |
9 | | Hiroaki Kikuchi:
Identification of Incompletely Specified Fuzzy Unate Logic Function.
ISMVL 2001: 116- |
1999 |
8 | EE | Hiroaki Kikuchi,
Kensuke Abe,
Shohachiro Nakanishi:
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree.
ICPP Workshops 1999: 204- |
7 | EE | Hiroaki Kikuchi,
Kensuke Abe,
Shohachiro Nakanishi:
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree.
ISW 1999: 103-117 |
1998 |
6 | | Noboru Takagi,
Hiroaki Kikuchi,
Kyoichi Nakashima,
Masao Mukaidono:
Identification of incompletely specified multiple-valued Kleenean functions.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 28(5): 637-647 (1998) |
5 | | Hiroaki Kikuchi,
Akihiro Ohtake,
Shohachiro Nakanishi:
Functional Completeness of Hierarchical Fuzzy Modeling.
Inf. Sci. 110(1-2): 51-60 (1998) |
1997 |
4 | EE | Shinobu Ohtani,
Hiroaki Kikuchi,
Ronald R. Yager,
Shohachiro Nakanishi:
Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms.
KES (1) 1997: 289-295 |
1995 |
3 | | Shohachiro Nakanishi,
Akihiro Ohtake,
Ronald R. Yager,
Shinobu Ohtani,
Hiroaki Kikuchi:
Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms.
IEEE/Nagoya-University World Wisepersons Workshop 1995: 21-34 |
2 | EE | Noboru Takagi,
Hiroaki Kikuchi,
Kyoichi Nakashima,
Masao Mukaidono:
A Characterization of Kleenean Functions.
ISMVL 1995: 236-241 |
1 | EE | Hiroaki Kikuchi,
Noboru Takagi,
Shohachiro Nakanishi,
Masao Mukaidono:
Uniqueness of Partially Specified Multiple-Valued Kleenean Function.
ISMVL 1995: 242-247 |