Publication List in Network Security Area (Selected)
(Update: November 1, 2006)
Japanese version is here.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Silent Cascade: Enhancing Location Privacy without Communication QoS Degradation'', Lecture Notes in Computer Science (Security in Pervasive Computing: Third International Conference: SPC 2006) , vol. 3934 , pp. 165-180 , York, UK , Apr. 2006.
- Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura: ``Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation'', Lecture Notes in Computer Science (Dengguo Feng, Dongdai Lin, Moti Yung (editors))(Information Security and Cryptology: First SKLOIS Conference: CISC 2005) , vol. 3822 , pp. 395-406 , Beijing, China , Dec. 2005.
- Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki: ``CARAVAN: Providing Location Privacy for VANET'', Embedded Security in Cars 2005: ESCAR 2005 , Cologne, Germany , Nov. 2005.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Protecting Location Privacy for Wireless Network'', ARO workshop on Localization in Wireless Sensor Networks , Seattle, USA , Jun. 2005.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Towards Modeling Wireless Location Privacy'', Lecture Notes in Computer Science (Workshop on Privacy Enhancing Technologies) , Dubrovnik, Croatia , May. 2005.
- Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki: ``Enhancing Wireless Location Privacy Using Silent Periods'', Proceedings of IEEE Wireless Communications and Networking Conference 2005 , vol. 2 , pp. 1187-1192 , New Orleans , Mar. 2005.
- Kanta Matsuura, Hideki Imai: ``Inspection Mechanism For Server-and-Client Protocols With Private-Key Cipher'', The ETHICOMP Journal , vol. 1 , no. 3 , Aug. 2004.
- M. Ando, K. Matsuura, M. Kudo, and A. Baba: ``An Architecture of a Secure Database for Networked Collaborative Activities'', Proc. of 5th International Conference on Enterprise Information Systems (ICEIS 2003), ICEIS Press, Vol.I, pp.3-10, Angers, France, April 2003. (Abstract) (PDF file)
- S. Hirose and K. Matsuura. ``Key Agreement Protocols Resistant to a Denial-of-Service Attack''. IEICE Transactions on Information and Systems, Vol.E84-D, No.4, pp.477-484, April 2001.
- K. Matsuura and H. Imai. ``Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks''. IEICE Transactions on Information and Systems, Vol.E83-D, No.5, pp.972-979, May 2000.
- K. Matsuura and H. Imai. ``Modification of Internet Key Exchange Resistant against Denial-of-Service''. Pre-Proc. of Internet Workshop 2000 (IWS2000), pp.167-174, Feb. 2000. (Abstract) (gzipped PS file)
- K. Matsuura. ``Evaluation of DoS Resistance in Relation to Performance Dynamics''. The 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan. Jan. 2000. (Abstract) (gzipped PS file)
- S. Hirose and K. Matsuura. ``Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack''. In V. Varadharajan and Y. Mu (eds.), Lecture Notes in Computer Science 1726, Springer-Verlag, Berlin, pp.169-182, November 1999.
- K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Cientifica, Vol.2, No.11, pp.15-19, 1999. (Abstract) (gzipped PS file)
- K. Matsuura and H. Imai. ``Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack''. Proc. of Internet Workshop'99 (IWS'99), IEEE Press, pp.17-24, 1999. (Abstract) (gzipped PS file)
- K. Matsuura. ``Protection of Three-Pass Key-Agreement Protocols against a Denial-of-Service Attack''. Bell Labs Crypto/Security Seminar, NJ, March 1999.
- S. Hirose and K. Matsuura. ``Enhancing the resistance of a secure key agreement protocol to a denial-of-service attack''. Proc. of the 1999 Symposium on Cryptography and Information Security (SCIS'99), Vol. II, pp. 899-904, Jan. 1999.
- K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 466-470, Oct. 1998. (Abstract) (gzipped PS file)
- G. Hanaoka, T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``On Advanced KPS: An Optimized KPS against Collusion Attacks''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 247-250, Oct. 1998.
- K. Matsuura and H. Imai. ``Inspection Mechanism for Server-and-Client Protocols with Private-Key Cipher''. The 4th International Conference on Ethical Issues of Information Technology, Rotterdam, Mar. 1998. (Abstract) (PDF file)
Back
Matsuura Laboratory/
Department of Informatics and Electronics / Institute of Industrial Science, The University of Tokyo/
4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan