| 2008 |
| 21 | EE | Yasuhito Arimoto,
Michiharu Kudo,
Yuji Watanabe,
Kokichi Futatsugi:
Checking assignments of controls to risks for internal control.
ICEGOV 2008: 98-104 |
| 2007 |
| 20 | EE | Sachiko Yoshihama,
Takeo Yoshizawa,
Yuji Watanabe,
Michiharu Kudo,
Kazuko Oyanagi:
Dynamic Information Flow Control Architecture for Web Applications.
ESORICS 2007: 267-282 |
| 19 | EE | Christine Robson,
Yuji Watanabe,
Masayuki Numao:
Parts Traceability for Manufacturers.
ICDE 2007: 1212-1221 |
| 18 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Performance Evaluation of Immunity-Based Diagnosis on Complex Networks.
KES (3) 2007: 846-853 |
| 17 | EE | Yasuharu Katsuno,
Yuji Watanabe,
Sanehiro Furuichi,
Michiharu Kudo:
Chinese-wall process confinement for practical distributed coalitions.
SACMAT 2007: 225-234 |
| 2006 |
| 16 | EE | Yuji Watanabe,
Sachiko Yoshihama,
Takuya Mishina,
Michiharu Kudo,
Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
ESORICS 2006: 65-80 |
| 15 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Migration Strategies of Immunity-Based Diagnostic Nodes for Wireless Sensor Network.
KES (2) 2006: 131-138 |
| 14 | EE | Yasuharu Katsuno,
Yuji Watanabe,
Sachiko Yoshihama,
Takuya Mishina,
Michiharu Kudo:
Layering negotiations for flexible attestation.
STC 2006: 17-20 |
| 2005 |
| 13 | EE | Yuji Watanabe,
Shigeyuki Sato,
Yoshiteru Ishida:
Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent.
KES (2) 2005: 72-78 |
| 2004 |
| 12 | EE | Yuji Watanabe,
Shigeyuki Sato,
Yoshiteru Ishida:
An Approach for Self-repair in Distributed System Using Immunity-Based Diagnostic Mobile Agents.
KES 2004: 504-510 |
| 2003 |
| 11 | EE | Yuji Watanabe,
Masayuki Numao:
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing.
ESORICS 2003: 85-99 |
| 10 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System.
KES 2003: 503-510 |
| 9 | EE | Yuji Watanabe,
Yoshiteru Ishida:
Distributed credibility evaluation of an information gathering mobile agent system.
Systems and Computers in Japan 34(8): 10-19 (2003) |
| 2002 |
| 8 | EE | Yuji Watanabe,
Masayuki Numao:
Conditional Cryptographic Delegation for P2P Data Sharing.
ISC 2002: 309-321 |
| 2001 |
| 7 | EE | Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
CT-RSA 2001: 392-407 |
| 6 | EE | Hirotaka Komaki,
Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Public Key Cryptography 2001: 225-239 |
| 2000 |
| 5 | EE | Yuji Watanabe,
Hideki Imai:
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
ACM Conference on Computer and Communications Security 2000: 80-86 |
| 1999 |
| 4 | EE | Yuji Watanabe,
Hideki Imai:
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
ISW 1999: 118-135 |
| 3 | EE | Yuji Watanabe,
Hideki Imai:
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Public Key Cryptography 1999: 290-305 |
| 1996 |
| 2 | | Akio Ishiguro,
Yuji Watanabe,
Toshiyuki Kondo,
Yoshiki Uchikawa:
Decentralized Consensus-Making Mechanisms Based on Immune System. Application to a Behavior Arbitration of an Autonomous Mobile Robot.
International Conference on Evolutionary Computation 1996: 82-87 |
| 1 | | Akio Ishiguro,
Toshiyuki Kondo,
Yuji Watanabe,
Yoshiki Uchikawa:
Immunoid: An Immunological Approach to Decentralized Behavoir Arbitration of Autonomous Mobile Robots.
PPSN 1996: 666-675 |