List of Publications

Update: April, 2016

Year 2016

Journal (incl. LNCS)

  • Masahito Ishizaka, Satsuya Ohata, Kanta Matsuura. Generic Construction of Ciphertext-Policy Attribute-Based Signcryption Secure in the Adaptive Predicate Model, IPSI Transactions on Advanced Research, Special issue - "Advances in Cryptology and Information Security", Vol.12, No.2, pp.16-26, 2016[detail]
  • Miodrag J. Mihaljevic, Aleksandar Kavcic, Kanta Matsuura. An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One, Mathematical Problems in Engineering, Vol.2016, pp.10 pages, 2016[detail]
  • Shiori Shinoda, Kanta Matsuura. Empriical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment, Journal of Information Security (JIS), Vol.7, No.2, pp.29-48, 2016[detail]

Conference

  • Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Joern Mueller-Quade. ZeTA --- Zero-Trust Authentication: Relying on Innate Human Ability, not Technology, Proceedings of the 1st IEEE European Symposium on Security and Privacy, pp.357-371, 2016[detail]

Year 2015

Journal (incl. LNCS)

  • Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption, Lecture Notes in Computer Science (Topics in Cryptology: CT-RSA2015), Vol.9048, pp.410-428, 2015[detail]
  • Kanta Matsuura, Takurou Hosoi. Mechanism Design of Data Sharing for Cybersecurity Research, IPSI Transactions on Advanced Research, Vol.11, No.1, pp.35-40, 2015[detail]

Conference

  • Aleksandar Kavcic, Miodrag Mihaljevic, Kanta Matsuura. Light-Weight Secrecy System Using Channels with Insertion Errors: Cryptographic Implications, Proceedings of the 2015 IEEE Information Theory Workshop -- Fall (ITW2015), pp.257-261, 2015[detail]
  • Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura. On Rigorous Security of Password Recovery Protocols, 2015[detail]

Year 2014

Journal (incl. LNCS)

  • David S. L. Wei, Siani Pearson, Kanta Matsuura, Patrick P. C. Lee, Kshirasagar Naik. Guest Editorial: Cloud Security, IEEE Transactions on Cloud Computing, Vol.2, No.4, pp.377-379, 2014
  • Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. More Constructions of Re-splittable Threshold Public Key Encryption, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 9th International Workshop on Security: IWSEC2014), Vol.8639, pp.109-118, 2014[detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification, IEICE Transactions on Information and Systems, Vol.E97-D, No.3, pp.510-523, 2014[detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. Toward Optimal Fusion Algorithms with Security against Wolves and Lambs in Biometrics, IEEE Transactions on Information Forensics and Security (IEEE TIFS), Vol.9, No.2, pp.259-271, 2014[detail]

Conference

  • Bongkot Jenjarrussakul, Kanta Matsuura. Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels , 13th Workshop on the Economics of Information Security (WEIS2014), pp.on web, 2014[detail]

Year 2013

Journal (incl. LNCS)

  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Construction of Even- variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, SCIENCE CHINA Information Sciences, Vol.56, No.3, pp.1-9, 2013[detail]

Conference

  • Kanta Matsuura, Takurou Hosoi. Data Sharing for Cybersecurity Research and Information Sharing for Cybersecurity Practice, The 8th International Workshop on Security (IWSEC2013), 2013[detail]
  • Takurou Hosoi, Kanta Matsuura. Effectiveness of a Change in TCP Retransmission Timer Management for Low-rate DoS Attack Mitigation and Attack Variants, The 8th International Workshop on Security (IWSEC2013), 2013[detail]
  • Naveen Kumar, Anish Matsuria, Maniklal Das, Kanta Matsuura. Improving Security and Efficiency of Time-Bound Access to Outsourced Data, The 6th ACM India Computing Convention (Compute2013), 2013
  • Kanta Matsuura, Takurou Hosoi. Data Sharing for Cybersecurity Research: A Comparison with Information Sharing for Cybersecurity Practice, Ninth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2013

Year 2012

Journal (incl. LNCS)

  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2012, 15th International Conference on Practice and Theory in Public Key Cryptography: PKC 2012), Vol.7293, pp.576-594, 2012[detail]
  • Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of highly nonlinear resilient S-boxes with given degree , Designs, Codes and Cryptography, Vol.64, No.3, pp.241-253, 2012[detail]

Conference

  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. Towards Optimal Countermeasures against Wolves and Lambs in Biometrics, Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), 2012[detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks , 11th Workshop on the Economics of Information Security (WEIS2012), pp.on web, 2012[detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Impact on Information Security from the Great East Japan Earthquake on March 11, 2011, Eighth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2012[detail]

Year 2011

Journal (incl. LNCS)

  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Blanced 2p-variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, Applied mathematical Letters, Vol.24, No.12, pp.2093-2096, 2011[detail]
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu.. Construction of Odd- variable Resilient Boolean Functions with Optimal Degree, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.VE94-A, pp.265-267, 2011[detail]
  • Daiki Chiba, Takahiro Matsuda, Jacob C.N. Schuldt, Kanta Matsuura. Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting, Lecture Notes in Computer Science (9th International Conference on Applied Cryptography and Network Security: ACNS 2011), Vol.6715, pp.220-237, 2011
  • Jacob C.N. Schuldt, Kanta Matsuura. On-line Non-transferable Signatures Revisited, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2011, 14th International Conference on Practice and Theory in Public Key Cryptography: PKC 2011), Vol.6571, pp.369-386, 2011[detail]
  • Takahiro Matsuda, Kanta Matsuura. On Black-Box Separations among Injective One-Way Functions, Lecture Notes in Computer Science (Theory of Cryptography, 8th Theory of Cryptography Conference: TCC 2011), Vol.6597, pp.597-614, 2011
  • Takahiro Matsuda, Kanta Matsuura. Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2011, 14th International Conference on Practice and Theory in Public Key Cryptography: PKC 2011), Vol.6571, pp.246-264, 2011[detail]
  • Jacob Schuldt, Kanta Matsuura. Efficient Convertible Undeniable Signatures with Delegatable Verification, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.94-A, No.1, pp.71-83, 2011

Conference

  • Ken Ichikawa, Kanta Matsuura. Preventing execution of JIT shellcode by isolating running process, Annual Computer Security Applications Conference 2011, 2011
  • Kanta Matsuura. Passive and Active Measurements of Cybersecurity Risk Parameters, The 12th International Workshop on Information Security Applications (WISA2011), 2011
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Empirical Study on Interdependency of Information Security Between Industrial Sectors and Regions, Seventh Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2011[detail]

Year 2010

Journal (incl. LNCS)

  • Takahiro Matsuda, Yasumasa Nakai, Kanta Matsuura. Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability, Lecture Notes in Computer Science (Pairing-Based Cryptography, 4th International Conference on Pairing-Based Cryptography: Pairing 2010), Vol.6487, pp.225-245, 2010[detail]
  • Takurou HOSOI, Kanta Matsuura. Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009, Lecture Notes in Computer Science (Recent Advances in Intrusion Detection, 13th International Symposium on Recent Advances in Intrusion Detection: RAID 2010), Vol.6307, pp.496-497, 2010
  • Jacob C. N. Schuldt, Kanta Matsuura. An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification, Lecture Notes in Computer Science (6th International Conference on Information Security Practice and Experience: ISPEC2010), Vol.6047, pp.276-293, 2010
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Enumeration of Balanced Symmetric Functions over GF(p), Information Processing Letters, Vol.110, pp.544-548, 2010

Conference

  • Kanta Matsuura. Security Economics and Cryptographic Industry, 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Information Technology toward Next IT-society, 2010
  • Kanta Matsuura. A Guideline for Product-Validation Systems Regarding Security Modules, Computer Security Institute Annual Conference (CSI 2010), 2010
  • Kanta Matsuura. Impacts of Information-Security Evaluation, The 11th CTINS (Cybercrime Technology Information Network System) Annual Conference, 2010
  • Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura. Awareness Gaps on Effects of Information Security Measure between Managers and Employees: An Empirical Study Using Micro Data Collected from Web-Based Survey, Short Paper Proceedings of the Fourth IFIP WG11.11 International Conference on Trust Management (IFIPTM 2010), pp.25-32, 2010
  • Peng Yang, Kanta Matsuura. An Introduction of A Users’ Guideline to Japan Cryptographic Module Validation Program, ASIACCS 2010 (5th ACM Symposium on Information, Computer and Communications Security), 2010
  • Kanta Matsuura. Economic Implications of Light-Weight Security Mechanisms, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), 2010

Year 2009

Journal (incl. LNCS)

  • Yi Shi, Kanta Matsuura. Fingerprinting Attack on the Tor Anonymity System, Lecture Notes in Computer Science (11th International Conference on Information and Communications Security: ICICS 2009), Vol.5927, pp.425-438, 2009[detail]
  • Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, Lecture Notes in Computer Science (The 8th International Conference on Cryptology and Network Security: CANS 2009), Vol.5888, pp.402-412, 2009
  • Takahiro Matsuda, Kanta Matsuura, Jacob C. N. Schuldt. Efficient Constructions of Signcryption Schemes and Signcryption Composability, Lecture Notes in Computer Science (Progress in Cryptology, 10th International Conference on Cryptology in India: INDOCRYPT 2009), Vol.5922, pp.321-342, 2009[detail]
  • Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, Kanta Matsuura. A Generic Construction of Timed-Release Encryption with Pre-open Capability, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 4th International Workshop on Security: IWSEC2009), Vol.5824, pp.53-70, 2009[detail]
  • Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai. Generic Construction of Stateful Identity Based Encryption, Lecture Notes in Computer Science (Information Security, 12th International Conference: ISC2009), Vol.5735, pp.338-346, 2009
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Lecture Notes in Computer Science (Topics in Cryptology: CT-RSA2009), Vol.5473, pp.16-31, 2009[detail]

Conference

  • Hitoshi Tanuma, Akira Otsuka, Hideki Imai, Kanta Matsuura. A Consideration to the Attacker’s Prospect on Security Patch Management, Sixth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2009
  • Kanta Matsuura. Economics of provable security and probable security, 4th International Workshop on Mathematical Cryptology, 2009

Year 2008

Journal (incl. LNCS)

  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption, Lecture Notes in Computer Science (The 11th International Conference on Information Security and Cryptology: ICISC2008), Vol.5461, pp.1-19, 2008[detail]
  • Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way, IEICE Transactions on Information and Systems, Vol.E91-D, No.5, pp.1457-1465, 2008[detail]
  • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions, IEICE Transactions on Information and Systems, Vol.E91-D, No.5, pp.1466-1476, 2008[detail]
  • Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson. Proxy Signatures Secure Against Proxy Key Exposure, Lecture Notes in Computer Science (11th International Workshop on Practice and Theory in Public Key Cryptography : PKC'08), Vol.4939, pp.141-161, 2008[detail]

Conference

  • Kanta Matsuura. Impacts of Optimal Investment Models on Cybersecurity Risk Management, The Institute for Operations Research and the Management Sciences (INFORMS) Annual Meeting 2008, 2008
  • Peng Yang, Kanta Matsuura. Stateful Public Key Encryption: How to Remove Gap Assumptions and Maintaining Tight Reductions, Proceedings of 2008 International Symposium on Information Theory and its Applications (ISITA2008), CD-ROM, 2008[detail]
  • Peng Yang, Kanta Matsuura. A Forward Secure Identity Based Encryption Scheme with Master Key Update, Proceedings of 2008 International Symposium on Information Theory and its Applications (ISITA2008), CD-ROM, 2008[detail]
  • Vadim Jefte Zendejas Samano, Takuro Hosoi, Kanta Matsuura. Time Categorization in a Social-Network-Analysis Spam Filter, Workshop on Information Security Applications (WISA2008), CD-ROM, 2008[detail]
  • Kanta Matsuura. Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model , Workshop on the Economics of Information Security 2008 (WEIS2008), 2008[detail]

Year 2007

Journal (incl. LNCS)

  • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function, Lecture Notes in Computer Science (Provable Security-First International Conference: ProvSec 2007), Vol.4784, pp.68-84, 2007[detail]
  • Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Construcrtions and Formal Security Proofs, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.9, pp.1814-1829, 2007[detail]
  • Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai. Anonymous Pay-TV System with Secure Revenue Sharing, Lecture Notes in Computer Science (11th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems:KES 2007), Vol.4694, pp.984-991, 2007
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A Practical Provider Authentication System for Bidirectional Broadcast Service, Lecture Notes in Computer Science (11th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems:KES 2007), Vol.4694, pp.967-974, 2007[detail]
  • Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Unconditionally Secure Chaffing-and-Winnowing for Multiple Use, Lecture Notes in Computer Science (International Conference on Information Theoretic Security: ICITS 2007), Vol.4883, pp.133-145, 2007[detail]

Conference

  • Takuro Hosoi, Kanta Matsuura, Hideki Imai. IP Trace Back by Packet Marking Method with Bloom Filters, Proceedings of the 2007 IEEE International Carnahan Conference on Security Technology (2007 ICCST) 41st Annual Conference, pp.255-263, 2007
  • Kanta Matsuura. Attack-Discouragement and Its Economic Implications, DST-JST Joint Workshop for Awareness of Funding Opportunities under Bilateral Cooperation in Field of ICT, pp.29, 2007
  • Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai. Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack, Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerCom 2007), 2007

Year 2006

Journal (incl. LNCS)

  • Marc P.C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura. An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocol for RFID Authentication, Lecture Notes in Computer Science (7th International Conference on Cryptology in India: Indocrypt’06), Vol.4329, pp.48-62, 2006[detail]
  • Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption, Lecture Notes in Computer Science (First International Conference on Cryptology in Vietnam: VietCrypt 2006), Vol.4341, pp.366-384, 2006[detail]
  • Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai. Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT, Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006), Vol.4058, pp.348-359, 2006[detail]
  • Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. Silent Cascade: Enhancing Location Privacy without Communication QoS Degradation, Lecture Notes in Computer Science (Security in Pervasive Computing: Third International Conference: SPC 2006), Vol.3934, pp.165-180, 2006[detail]
  • Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang. Relations among Notions of Security for Identity Based Encryption Schemes, Lecture Notes in Computer Science (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium), Vol.3887, pp.130-141, 2006[detail]
  • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai. Applying Fujisaki-Okamoto to Identity-Based Encryption, Lecture Notes in Computer Science (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16), Vol.3857, pp.183-192, 2006[detail]

Conference

  • Kanta Matsuura. Security Securities: How to Measure the Market View on Information-Security Risks, 6th Japan-America Frontiers of Engineering Symposium, 2006
  • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai. A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption, Proceedings of the 2006 International Symposium on Information Theory and Its Applications (ISITA'06), pp.507-512, 2006[detail]
  • Masaki Ishiguro, Hideyuki Tanaka, Kanta Matsuura, Ichiro Murase. The Effect of Information Security Incidents on Corporate Values in the Japanese Stock Market, The Workshop on the Economics of Securing the Information Infrastructure, 2006[detail]
  • Wei Liu, Hideyuki Tanaka, Kanta Matsuura. An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan, Workshop on the Economics of Information Security 2006 (WEIS2006), 2006[detail]

Year 2005

Journal (incl. LNCS)

  • Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura. Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation, Lecture Notes in Computer Science (Information Security and Cryptology: First SKLOIS Conference: CISC 2005), Vol.3822, pp.395-406, 2005[detail]
  • Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. Towards Modeling Wireless Location Privacy, Lecture Notes in Computer Science (5th International Workshop on Privacy Enhancing Technologies: PET 2005), Vol.3856, pp.59-77, 2005[detail]
  • Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo. Vulnerability and information security investment: An empirical analysis of e-local government in Japan, The Journal of Accounting and Public Policy, Vol.24, No.Issue. 1, pp.37-59, 2005[detail]

Conference

  • Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki. CARAVAN: Providing Location Privacy for VANET, Embedded Security in Cars 2005 (ESCAR 2005), 2005
  • Atsuhiro Yamagishi, Kanta Matsuura, Hideki Imai. Cryptographic Module Validation Program in Japan, Proceedings of the 2005 IEEE International Engineering Management Conference (IEMC 2005), Vol.Ⅱ, pp.485-489, 2005[detail]
  • Kanta Matsuura. University-Industry Collaboration in the Information Security Field: An International Comparison, Proceedings of the 2005 IEEE International Engineering Management Conference (IEMC 2005), Vol.Ⅰ, pp.95-98, 2005
  • Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. Protecting Location Privacy for Wireless Network, ARO workshop on Localization in Wireless Sensor Networks, 2005
  • Hideyuki Tanaka, Kanta Matsuura. Vulnerability and Effects of Information Security Investment: A Firm Level Empirical Analysis of Japan, International Forum of Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2005
  • Kanta Matsuura. Cross-Sector Collaboration in Japanese Information-Security Industry, and the Shock of Personal Information Protection Laws, Proceedings of the 11th International Conference on Industrial Engineering and Engineering Management, pp.1178-1181, 2005
  • Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki. Enhancing Wireless Location Privacy Using Silent Periods, Proceedings of IEEE Wireless Communications and Networking Conference 2005, Vol.2, pp.1187-1192, 2005
Before 2005
Matsuura Laboratory, Department of Informatics and Electronics, Institute of Industrial Science, The University of Tokyo4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan