2008 |
21 | EE | Yasuhito Arimoto,
Michiharu Kudo,
Yuji Watanabe,
Kokichi Futatsugi:
Checking assignments of controls to risks for internal control.
ICEGOV 2008: 98-104 |
2007 |
20 | EE | Sachiko Yoshihama,
Takeo Yoshizawa,
Yuji Watanabe,
Michiharu Kudo,
Kazuko Oyanagi:
Dynamic Information Flow Control Architecture for Web Applications.
ESORICS 2007: 267-282 |
19 | EE | Christine Robson,
Yuji Watanabe,
Masayuki Numao:
Parts Traceability for Manufacturers.
ICDE 2007: 1212-1221 |
18 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Performance Evaluation of Immunity-Based Diagnosis on Complex Networks.
KES (3) 2007: 846-853 |
17 | EE | Yasuharu Katsuno,
Yuji Watanabe,
Sanehiro Furuichi,
Michiharu Kudo:
Chinese-wall process confinement for practical distributed coalitions.
SACMAT 2007: 225-234 |
2006 |
16 | EE | Yuji Watanabe,
Sachiko Yoshihama,
Takuya Mishina,
Michiharu Kudo,
Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
ESORICS 2006: 65-80 |
15 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Migration Strategies of Immunity-Based Diagnostic Nodes for Wireless Sensor Network.
KES (2) 2006: 131-138 |
14 | EE | Yasuharu Katsuno,
Yuji Watanabe,
Sachiko Yoshihama,
Takuya Mishina,
Michiharu Kudo:
Layering negotiations for flexible attestation.
STC 2006: 17-20 |
2005 |
13 | EE | Yuji Watanabe,
Shigeyuki Sato,
Yoshiteru Ishida:
Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent.
KES (2) 2005: 72-78 |
2004 |
12 | EE | Yuji Watanabe,
Shigeyuki Sato,
Yoshiteru Ishida:
An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents.
KES 2004: 504-510 |
2003 |
11 | EE | Yuji Watanabe,
Masayuki Numao:
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing.
ESORICS 2003: 85-99 |
10 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System.
KES 2003: 503-510 |
9 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Distributed credibility evaluation of an information gathering mobile agent system.
Systems and Computers in Japan 34(8): 10-19 (2003) |
2002 |
8 | EE | Yuji Watanabe,
Masayuki Numao:
Conditional Cryptographic Delegation for P2P Data Sharing.
ISC 2002: 309-321 |
2001 |
7 | EE | Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
CT-RSA 2001: 392-407 |
6 | EE | Hirotaka Komaki,
Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Public Key Cryptography 2001: 225-239 |
2000 |
5 | EE | Yuji Watanabe,
Hideki Imai:
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
ACM Conference on Computer and Communications Security 2000: 80-86 |
1999 |
4 | EE | Yuji Watanabe,
Hideki Imai:
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
ISW 1999: 118-135 |
3 | EE | Yuji Watanabe,
Hideki Imai:
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Public Key Cryptography 1999: 290-305 |
1996 |
2 | | Akio Ishiguro,
Yuji Watanabe,
Toshiyuki Kondo,
Yoshiki Uchikawa:
Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot.
International Conference on Evolutionary Computation 1996: 82-87 |
1 | | Akio Ishiguro,
Toshiyuki Kondo,
Yuji Watanabe,
Yoshiki Uchikawa:
Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots.
PPSN 1996: 666-675 |