Updated on 2026/03/07

写真a

 
KIKUCHI HIROAKI
 
Organization
Undergraduate School School of Interdisciplinary Mathematical Sciences Professor
Title
Professor
Profile
1990年明治大学院博士前期課程修了.1994年同博士(工学).
(株)富士通研究所,東海大学情報通信学部を経て,
2013年より明治大学総合数理学部先端メディアサイエンス学科教授.
2017年より国立研究開発法人理化学研究所革新知能統合研究センター客員研究員.
1990年度日本ファジィ学会奨励賞,1993年度情報処理学会奨励賞,1996年SCIS論文賞,
2010年度,2017年度情報処理学会JIP Outstanding Paper Award.
2013年 IEEE AINA Best Paper Award.
電子情報通信学会,日本知能情報ファジィ学会,IEEE, ACM各会員.
情報処理学会フェロー.
External link

Degree

  • Doctor of Engineering ( Meiji University )

  • 博士(工学) ( 明治大学 )

Research Interests

  • 情報ネットワーク経済

  • メカニズム設計

  • ゲーム理論

  • 実験経済学

  • エージェントシミュレーション

  • 多植論理

  • 情報セキュリティ

  • 決定木学習

  • 指紋認証

  • 生体情報

  • ネットワークセキュリティ

  • Multiple-valved Logic

  • Network Security

  • Fuzzy theory

  • アクセス制御

  • セキュアネットワーク

  • ファジィ論理関数

  • インターネット

  • 秘密関数計算

  • 垂直分割

  • 暗号プロトコル

  • プライバシー

  • データマイニング

  • セキュリティ

  • プライバシーポリシー

  • 認証技術

  • WWW

  • 疫学調査

Research Areas

  • Informatics / Intelligent informatics

  • Manufacturing technology (mechanical,electrical/electronic, chemical engineering) / Communication and network engineering

  • Informatics / Information networks

  • Informatics / Computer systems

  • Informatics / Information theory

  • Social infrastructure (civil Engineering, architecture,disaster prevention) / Social systems engineering

▼display all

Education

  • Meiji University   Graduate School, Division of Engineering

    - 1990

      More details

  • Meiji University

    - 1990

      More details

    Country/Region: Japan

    researchmap

  • Meiji University   Faculty of Engineering

    - 1988

      More details

  • Meiji University

    - 1988

      More details

    Country/Region: Japan

    researchmap

Research History

  • Tokai University   Professor

    2009 - 2013

      More details

Professional Memberships

▼display all

Papers

  • Differential Private Risk Factors Analysis of Polypharmacy

    Hiroaki Kikuchi, Andres Hernandez-Matamoros

    2026

  • Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data

    Terumi Yaguchi, Hiroaki Kikuchi

    2026

  • Data Poisoning Attacks to Locally Differentially Private Range Query Protocols.

    Ting-Wei Liao, Chih-Hsun Lin, Yu-Lin Tsai, Takao Murakami, Chia-Mu Yu, Jun Sakuma, Chun-Ying Huang, Hiroaki Kikuchi

    CoRR   abs/2503.03454   2025.3

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.48550/arXiv.2503.03454

    researchmap

  • Empirical Evaluation of Record Reconstruction Risk from Model Explanations with Differential Privacy

    Ryotaro Toma, Hiroaki Kikuchi

    2025

  • Impact Assessment of Adversary-in-the-Middle Attack Evilginx Bypassing 2FA

    Hiroaki Kikuchi

    2025

  • Secure Aggregation of Smartwatch Health Data with LDP Reviewed

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    Lecture Notes in Computer Science   15565   157 - 174   2025

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Singapore  

    DOI: 10.1007/978-981-96-3774-4_10

    researchmap

  • "Cancer Risk Evaluation with Diabetes Mellitus by a Large Medical Claims Dataset," Reviewed

    K. Fukuyama, Y. Mori, T. Kuroda, H. Kikuchi

    Joint 13th International Conference on Soft Computing and Intelligent Systems and 25th International Symposium on Advanced Intelligent Systems (SCIS&ISIS), IEEE   1 - 7   2024.11

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Meaningful Performance Analysis on Healthcare Data Under Local Differential Privacy

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    2024.9

     More details

  • A Poisoning-Resilient LDP Schema Leveraging Oblivious Transfer with the Hadamard Transform Reviewed

    Masahiro Shimizu, Hiroaki Kikuchi

    Lecture Notes in Computer Science   14986   2024.8

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-68208-7_18

    researchmap

  • Robust Estimation Method against Poisoning Attacks for Key-Value Data with Local Differential Privacy Reviewed

    Hikaru Horigome, Hiroaki Kikuchi, Masahiro Fujita, Chia-Mu Yu

    Applied Sciences   14 ( 14 )   1 - 19, 6368   2024.7

     More details

    Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    Local differential privacy (LDP) protects user information from potential threats by randomizing data on individual devices before transmission to untrusted collectors. This method enables collectors to derive user statistics by analyzing randomized data, thereby presenting a promising avenue for privacy-preserving data collection. In the context of key–value data, in which discrete and continuous values coexist, PrivKV has been introduced as an LDP protocol to ensure secure collection. However, this framework is susceptible to poisoning attacks. To address this vulnerability, we propose an expectation maximization (EM)-based algorithm combined with a cryptographic protocol to facilitate secure random sampling. Our LDP protocol, known as emPrivKV, exhibits two key advantages: it improves the accuracy of statistical information estimation from randomized data, and enhances resilience against the manipulation of statistics, that is, poisoning attacks. These attacks involve malicious users manipulating the analysis results without detection. This study presents the empirical results of applying the emPrivKV protocol to both synthetic and open datasets, highlighting a notable improvement in the precision of statistical value estimation and robustness against poisoning attacks. As a result, emPrivKV improved the frequency and the mean gains by 17.1% and 25.9%, respectively, compared to PrivKV, with the number of fake users being 0.1 of the genuine users. Our findings contribute to the ongoing discourse on refining LDP protocols for key–value data in scenarios involving privacy-sensitive information.

    DOI: 10.3390/app14146368

    researchmap

  • Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDP Reviewed

    Hiroaki Kikuchi

    IFIP Advances in Information and Communication Technology   679   15 - 29   2024.4

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-56326-3_2

    researchmap

  • Comparative Analysis of Local Differential Privacy Schemes in Healthcare Datasets Reviewed

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    Applied Sciences   14   2864 - 2864   2024.3

     More details

    Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    In the rapidly evolving landscape of healthcare technology, the critical need for robust privacy safeguards is undeniable. Local Differential Privacy (LDP) offers a potential solution to address privacy concerns in data-rich industries. However, challenges such as the curse of dimensionality arise when dealing with multidimensional data. This is particularly pronounced in k-way joint probability estimation, where higher values of k lead to decreased accuracy. To overcome these challenges, we propose the integration of Bayesian Ridge Regression (BRR), known for its effectiveness in handling multicollinearity. Our approach demonstrates robustness, manifesting a noteworthy reduction in average variant distance when compared to baseline algorithms such as LOPUB and LOCOP. Additionally, we leverage the R-squared metric to highlight BRR’s advantages, illustrating its performance relative to LASSO, as LOPUB and LOCOP are based on it. This paper addresses a relevant concern related to datasets exhibiting high correlation between attributes, potentially allowing the extraction of information from one attribute to another. We convincingly show the superior performance of BRR over LOPUB and LOCOP across 15 datasets with varying average correlation attributes. Healthcare takes center stage in this collection of datasets. Moreover, the datasets explore diverse fields such as finance, travel, and social science. In summary, our proposed approach consistently outperforms the LOPUB and LOCOP algorithms, particularly when operating under smaller privacy budgets and with datasets characterized by lower average correlation attributes. This signifies the efficacy of Bayesian Ridge Regression in enhancing privacy safeguards in healthcare technology.

    DOI: 10.3390/app14072864

    researchmap

  • Combinations of AI Models and XAI Metrics Vulnerable to Record Reconstruction Risk Reviewed

    Ryotaro Toma, Hiroaki Kikuchi

    Lecture Notes in Computer Science   14915   329 - 343   2024

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-69651-0_22

    researchmap

  • Targeted Ads Analysis: What are The most Targeted Personas?, Reviewed

    Kikuchi, H., Aoyama, A.

    IEEE International Conference on Big Data (BigData), Sorrento, Italy, 2023   5512 - 5518   2023.12

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Multiple Person Tracking Based on Gait Identification Using Kinect and OpenPose Reviewed

    Ryotaro Toma, Terumi Yaguchi, Hiroaki Kikuchi

    Lecture Notes in Computer Science   14482   175 - 187   2023.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-52426-4_12

    researchmap

  • Key-Valueデータの局所差分プライバシプロトコルにおけるEMアルゴリズムを用いたロバストな分布推定手法の提案 Reviewed

    堀込 光, 菊池 浩明, ジャミュー ユー

    情報処理学会論文誌   64 ( 9 )   1227 - 1240   2023.9

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.20729/00227590

    researchmap

  • Failure of Privacy Policy for Session Replay Services Used for Monitor Your Keystroke Reviewed

    Daichi Kajima, Hiroaki Kikuchi

    Lecture Notes on Data Engineering and Communications Technologies   183   123 - 129   2023.8

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-40978-3_14

    researchmap

  • New LDP Approach Using VAE Reviewed

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    Network and System Security, NSS 2023, Lecture Notes in Computer Science   13983   177 - 191   2023.8

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-39828-5_10

    researchmap

  • An Efficient Local Differential Privacy Scheme Using Bayesian Ridge Regression

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    2023 20th Annual International Conference on Privacy, Security and Trust (PST)   1 - 7   2023.8

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/pst58708.2023.10320150

    researchmap

  • 個人データの利用に対する許容度に関する社会調査 Reviewed

    中川 裕志, 菊池 浩明

    情報処理学会論文誌   64 ( 8 )   1206 - 1215   2023.8

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Local Differential Privacy Protocol for Making Key–Value Data Robust Against Poisoning Attacks Reviewed

    Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu

    Lecture Notes in Computer Science   13890   241 - 252   2023.5

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-33498-6_17

    researchmap

  • Expectation-Maximization Estimation for Key-Value Data Randomized with Local Differential Privacy Reviewed

    Hikaru Horigome, Hiroaki Kikuchi, Chia-Mu Yu

    Lecture Notes in Networks and Systems   654   501 - 512   2023.3

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-031-28451-9_44

    researchmap

  • Diseases Prediction from Officially Anonymized Medical and Healthcare Big Data Reviewed

    Hiroaki Kikuchi, Satoshi Ito, Kazuki Ikegami, Shota Shindo

    2022 IEEE International Conference on Big Data (Big Data)   1 - 11   2022.12

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/bigdata55660.2022.10075547

    researchmap

  • Improvement of Estimate Distribution with Local Differential Privacy Reviewed

    Hikaru Horigome, Hiroaki Kikuchi

    Modeling Decisions for Artificial Intelligence. MDAI 2022, Lecture Notes in Computer Science   13408   2022.9

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-031-13448-7_6

    researchmap

  • A Vulnerability in Video Anonymization – Privacy Disclosure from Face-obfuscated video Reviewed

    Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, Andres Hernandez-Matamoros

    2022 19th Annual International Conference on Privacy, Security & Trust (PST), Fredericton, NB, Canada   1 - 10   2022.8

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/pst55820.2022.9851976

    researchmap

  • Web Crawler for an Anonymously Processed Information Database Reviewed

    Hiroaki Kikuchi, Atsuki Ono, Satoshi Ito, Masahiro Fujita, Tadakazu Yamanaka

    Innovative Mobile and Internet Services in Ubiquitous Computing   501 - 510   2022.6

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-79728-7_51

    researchmap

  • Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators Reviewed

    Masahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi

    Innovative Mobile and Internet Services in Ubiquitous Computing   30 - 39   2022.6

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-79728-7_4

    researchmap

  • Estimation of cost of k–anonymity in the number of dummy records Reviewed

    Satoshi Ito, Hiroaki Kikuchi

    Journal of Ambient Intelligence and Humanized Computing   2022.3

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s12652-021-03369-5

    researchmap

    Other Link: https://link.springer.com/article/10.1007/s12652-021-03369-5/fulltext.html

  • Best Security Measures to Reduce Cyber-Incident and Data Breach Risks Reviewed

    Hiroaki Kikuchi, Michihiro Yamada, Kazuki Ikegami, Koji Inui

    Lecture Notes in Computer Science   3 - 19   2022.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-93944-1_1

    researchmap

  • 健康診断データとレセプトデータの匿名加工情報を用いた疾病リスク分析 Reviewed

    伊藤 聡志, 池上 和輝, 菊池 浩明

    情報処理学会論文誌   62 ( 9 )   1560 - 1574   2021.9

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.20729/00212761

    researchmap

  • Bitcoin取引履歴の特徴量に基づくアドレス識別リスクの評価 Reviewed

    松本 寛輝, 菊池 浩明

    情報処理学会論文誌   62 ( 9 )   1487 - 1498   2021.9

     More details

    Authorship:Corresponding author   Language:Japanese  

    DOI: 10.20729/00212755

    researchmap

  • Vulnerability Exploiting SMS Push Notifications Reviewed

    Rina Shibayama, Hiroaki Kikuchi

    2021 16th Asia Joint Conference on Information Security (AsiaJCIS)   23 - 30   2021.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/asiajcis53848.2021.00014

    researchmap

  • Reidentification Risk from Pseudonymized Customer Payment History Reviewed

    Hiroaki Kikuchi

    Advanced Information Networking and Applications   634 - 645   2021.4

     More details

    Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-75075-6_52

    researchmap

  • Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition Reviewed

    Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori

    2021 IEEE Conference on Dependable and Secure Computing (DSC)   1 - 7   2021.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/dsc49826.2021.9346246

    researchmap

  • Modeling the risk of data breach incidents at the firm level

    Kazuki Ikegami, Hiroaki Kikuchi

    Advances in Intelligent Systems and Computing   1195   135 - 148   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-50399-4_14

    Scopus

    researchmap

  • Designing a Location Trace Anonymization Contest. Reviewed

    Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada 0001, Takayasu Yamaguchi, Yuji Yamaoka

    CoRR   abs/2107.10407   225 - 243   2021

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/corr/corr2107.html#abs-2107-10407

  • Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services Reviewed

    A. Hanzawa, H. Kikuchi

    You I. (eds) Information Security Applications (WISA 2020), Lecture Notes in Computer Science   12583   349 - 361   2020.12

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • セキュリティマネジメントによるサイバーインシデントリスク削減の評価 Reviewed

    山田 道洋, 池上 和輝, 菊池 浩明, 乾孝治

    情報処理学会論文誌   61 ( 12 )   1781 - 1791   2020.12

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Differentially Private Profiling of Anonymized Customer Purchase Records., Cham. Reviewed

    Kikuchi H.

    Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2020, CBT 2020, Lecture Notes in Computer Science   12484   19 - 34   2020.12

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records Reviewed

    Satoshi Ito, Reo Harada, Hiroaki Kikuchi

    Journal of Information Processing   28   511 - 519   2020.9

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.28.511

    researchmap

  • Address Usage Estimation Based on Bitcoin Traffic Behavior. Reviewed

    Matsumoto H., Igaki S., Kikuchi H.

    Advances in Networked-Based Information Systems (NBiS 2020), Advances in Intelligent Systems and Computing   1264   188 - 199   2020.8

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Impact assessment of password reset PRMITM attack with two-factor authentication

    Kota Sasa, Hiroaki Kikuchi

    Journal of Internet Technology   20 ( 7 )   2297 - 2306   2019.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Taiwan Academic Network Management Committee  

    DOI: 10.3966/160792642019122007026

    Scopus

    researchmap

  • Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks Reviewed

    Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi

    International Journal of Information Security   Springer   1 - 11   2019.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10207-019-00476-5

    researchmap

  • 個人情報漏洩の損害額の新しい数理モデルの提案 Reviewed

    山田 道洋, 菊池 浩明, 松山 直樹, 乾 孝治

    情報処理学会論文誌   60 ( 9 )   1528 - 1537   2019.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 複数の歩容特徴量のDTW距離に基づくロバストな個人識別手法の提案 Reviewed

    森駿文, 菊池浩明

    情報処理学会論文誌   60 ( 9 )   1538 - 1549   2019.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records Reviewed

    Satoshi Ito, Reo Harada, Hiroaki Kikuchi

    USB Proceedings of The 15th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2019)   158 - 169   2019.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Development of a Cyber Incident Information Crawler Reviewed

    Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi, Koji Inui

    Kazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi and Koji Inui   994 ( Springer )   447 - 455   2019.7

  • Attacker models with a variety of background knowledge to de-identified data Reviewed

    toshi Ito, Hiroaki Kikuchi, Hiroshi Nakagawa

    Journal of Ambient Intelligence and Humanized Computing   Springer   1 - 11   2019.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s12652-019-01394-z

    researchmap

    Other Link: http://link.springer.com/article/10.1007/s12652-019-01394-z/fulltext.html

  • Mathematical Model to Estimate Loss by Cyber Incident in Japan Reviewed

    Michihiro Yamada, Hiroaki Kikuchi, Naoki Matsuyama, Koji Inui

    Proc. of 5th International Sysstems Security and Privacy (ICISSP 2019)   1 - 8   2019.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Robust Person Identification based on DTW Distance of Multiple-Joint Gait Pattern Reviewed

    Takafumi Mori, Hiroaki Kikuchi

    Proc. of 5th International Sysstems Security and Privacy (ICISSP 2019)   1 - 9   2019.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Impact Assessment of Password Reset PRMitM attack with Two-factor Authentication Reviewed

    Kota Sasa, Hiroaki Kikuchi

    2018 IEEE Conference on Dependable and Secure Computing (DSC)   20 ( 7 )   90 - 97   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Taiwan Academic Network Management Committee  

    DOI: 10.1109/DESEC.2018.8625132

    Scopus

    researchmap

  • Risk of Bitcoin Addresses to be Identified from Features of Output Addresses Reviewed

    Kodai Nagata, Hiroaki Kikuchi, Chun-I Fan

    2018 IEEE Conference on Dependable and Secure Computing (DSC) federated workshop   349 - 354   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/DESEC.2018.8625106

    researchmap

  • Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks Reviewed

    Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi

    2018 IEEE Conference on Dependable and Secure Computing (DSC) federated workshop   1 - 8   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/DESEC.2018.8625151

    researchmap

  • Risk of Re-identification Based on Euclidean distance in Anonymized Data PWSCUP2015 Reviewed

    Satoshi Ito, Hiroaki Kikuchi, Hiroshi Nakagawa

    The 15th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2018)   178 - 189   2018.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • オノマトペCAPTCHAの開発と評価 Reviewed

    滋野 莉子, 山田 道洋, 菊池 浩明, 坂本 真樹

    情報処理学会論文誌   59 ( 9 )   1666 - 1667   2018.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Person Tracking Based on Gait Features from Depth Sensors Reviewed

    Mori T, Kikuchi H

    Advances in Network-Based Information Systems, NBiS 2018, Lecture Notes on Data Engineering and Communications Technologies   22   743 - 751   2018.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-98530-5_65

    researchmap

  • Development of Autonomous Evolution of Defense System Based on White List Reviewed

    Tomohiro Shigemoto, Shota Fujii, Ichiro Kurima, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi

    The 13th Asia Joint Conference on Information Security (AsiaJCIS'18)   95 - 101   2018.9

     More details

  • Evaluation and Development of Onomatopoeia CAPTCHAs Reviewed

    Michihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto

    2018 16th Annual Conference on Privacy, Security and Trust (PST)   1 - 2   2018.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/PST.2018.8514155

    researchmap

  • Probably secure efficient anonymous credential scheme Reviewed

    Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi

    International Journal of Software Innovation   6 ( 3 )   18 - 35   2018.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Taru Publications  

    DOI: 10.4018/IJSI.2018070102

    Scopus

    researchmap

  • Anonymization for Personal Data and Re-idenfication Contst: PWSCUP Reviewed

    Hidetomo Atsushi Kuromasa, Hiroshi Nakagawa, Hiroaki Kikuchi, Masanori Monnda

    IPSJ Digital Practice   9 ( 3 )   659 - 684   2018.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity Reviewed

    Hiroaki Kikuchi, Xuping Huang, Shigeta Ikuji, Manami Inoue

    Journal of Medical Systems   42 ( 5 )   1   2018.4

     More details

    Authorship:Lead author   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s10916-018-0930-9

    researchmap

    Other Link: http://link.springer.com/content/pdf/10.1007/s10916-018-0930-9.pdf

  • ホワイトリストを用いた自律進化型防御システムの開発 Reviewed

    重本 倫宏, 藤井 翔太, 来間 一郎, 鬼頭 哲郎, 仲小路 博史, 藤井 康広, 菊池 浩明

    情報処理学会論文誌   59 ( 3 )   1050 - 1060   2018.3

     More details

  • Study on record linkage of anonymizied data Reviewed

    Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E101A ( 1 )   19 - 28   2018.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1587/transfun.E101.A.19

    Scopus

    researchmap

  • An efficient signature scheme for anonymous credentials Reviewed

    Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi

    Studies in Computational Intelligence   727   51 - 65   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-64051-8_4

    Scopus

    researchmap

  • Development of White List Based Autonomous Evolution of Defense System for RAT Malware. Reviewed

    Tomohiro Shigemoto, Shota Fujii, Ichiro Kuriama, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi

    13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018   95 - 101   2018

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/AsiaJCIS.2018.00024

    researchmap

  • Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings Reviewed

    ISPEC 2018   11125   2018

     More details

    Publisher:Springer  

    DOI: 10.1007/978-3-319-99807-7

    researchmap

  • Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation. Reviewed

    Xuping Huang, Hiroaki Kikuchi, Chun-I Fan

    32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018, Krakow, Poland, May 16-18, 2018   793 - 800   2018

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/AINA.2018.00118

    researchmap

  • Risk of Re-identification from Payment Card Histories in Multiple Domains. Reviewed

    Satoshi Ito,Reo Harada, Hiroaki Kikuchi

    32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018, Krakow, Poland, May 16-18, 2018   934 - 941   2018

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/AINA.2018.00137

    researchmap

  • How to Handle Excessively Anonymized Datasets. Reviewed

    Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe

    JIP   26   477 - 485   2018

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.2197/ipsjjip.26.477

    researchmap

  • Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. Reviewed

    Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan

    JIP   26   638 - 647   2018

  • 共有アカウント利用時における不正行為の誘発要因 Reviewed

    新原 功一, 山田 道洋, 菊池 浩明

    情報処理学会論文誌   58 ( 12 )   1875 - 1889   2017.12

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Audio-CAPTCHA with distinction between random phoneme sequences and words spoken by multi-speaker Reviewed

    Michitomo Yamaguchi, Hiroaki Kikuchi

    2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017   2017-   3071 - 3076   2017.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    DOI: 10.1109/SMC.2017.8123098

    Scopus

    researchmap

  • プライバシー保護したIoTモバイルヘルス心拍変動及び睡眠段階の周波数解析に関する考察

    Xuping Huang, Hiroaki Kikuchi, Chun-I Fan

    Computer Security Symposium 2017   304 - 311   2017.10

     More details

    Language:English  

    researchmap

  • A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study Reviewed

    Khamphao Sisaat, Surin Kittitornkun, Hiroaki Kikuchi, Chaxiong Yukonhiatou, Masato Terada, Hiroshi Ishii

    INTERNATIONAL JOURNAL OF INFORMATION SECURITY   16 ( 5 )   459 - 473   2017.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10207-016-0342-0

    Web of Science

    researchmap

  • Study from Data Anonymization Competition of Online Retail Data Reviewed

    KIKUCHI Hiroaki

    Workshop on Design Issues for a data Anonymization Competition (WODIAC), 2017.   2017.7

     More details

    Language:English   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Multireceiver Predicate Encryption for Online Social Networks. Reviewed

    Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi

    IEEE Trans. Signal and Information Processing over Networks 3(2)   3 ( 2 )   388 - 403   2017.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TSIPN.2017.2697580

    researchmap

  • Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets Reviewed

    Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto

    2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)   1042 - 1049   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2017.52

    Web of Science

    researchmap

  • How much is risk increased by sharing credential in group? Reviewed

    Hiroaki Kikuchi, Niihara Koichi, Michihiro Yamada

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   10547   103 - 117   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-68063-7_7

    Scopus

    researchmap

  • Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings Reviewed

    ACNS 2017   10355   2017

     More details

    Publisher:Springer  

    DOI: 10.1007/978-3-319-61204-1

    researchmap

  • Decision tree analysis on environmental factors of insider threats Reviewed

    Michihiro Yamada, Koichi Niihara, Hiroaki Kikuchi

    Communications in Computer and Information Science   714   658 - 662   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-58753-0_93

    Scopus

    researchmap

  • Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015. Reviewed

    Satoshi Ito, Hiroaki Kikuchi

    Advances in Network-Based Information Systems, The 20th International Conference on Network-Based Information Systems, NBiS 2017, Ryerson University, Toronto, ON, Canada, August 24-26, 2017.   901 - 913   2017

     More details

    Publisher:Springer  

    DOI: 10.1007/978-3-319-65521-5_81

    researchmap

  • Sharing or non-sharing credentials: A study of what motivates people to be malicious insiders Reviewed

    Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   10292   353 - 365   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-58460-7_25

    Scopus

    researchmap

  • eラーニングをモデルとした内部犯行の予測因子の識別 Reviewed

    新原 功一, 菊池 浩明

    情報処理学会論文誌   57 ( 9 )   2064 - 2076   2016.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み Reviewed

    菊池 浩明

    情報処理学会論文誌   57 ( 9 )   1900 - 1910   2016.9

     More details

  • SWIPASS: Image-based user authentication for touch screen devices Reviewed

    Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi

    Journal of Information Processing   24 ( 2 )   227 - 236   2016.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.24.227

    Scopus

    researchmap

  • Interactive History Sniffing Attack with Amida Lottery Reviewed

    Hiroaki Kikuchi, Kota Sasa, Yuta Shimizu

    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS)   599 - 602   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMIS.2016.109

    Web of Science

    researchmap

  • Primary Factors of Malicious Insider in E-learning Model Reviewed

    Koichi Niihara, Hiroaki Kikuchi

    HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I   617   482 - 487   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-40548-3_80

    Web of Science

    researchmap

  • Primary Factors of Malicious Insider in E-learning Model Reviewed

    Koichi Niihara, Hiroaki Kikuchi

    HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I   617 ( Springer )   482 - 487   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-40548-3_80

    Web of Science

    researchmap

  • Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments Reviewed

    Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi

    ADJUNCT PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING NETWORKING AND SERVICES (MOBIQUITOUS 2016)   88 - 93   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/3004010.3004020

    Web of Science

    researchmap

  • Recursive-rule extraction algorithm with J48graft and applications to generating credit scores Reviewed

    Yoichi Hayashi, Yuki Tanaka, Tomohiro Takagi, Takamichi Saito, Hideaki Iiduka, Hiroaki Kikuchi, Guido Bologna, Sushmita Mitra

    Journal of Artificial Intelligence and Soft Computing Research   6 ( 1 )   35 - 44   2016

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:De Gruyter Open Ltd  

    DOI: 10.1515/jaiscr-2016-0004

    Scopus

    researchmap

  • A Study from the Data Anonymization Competition Pwscup 2015 Reviewed

    Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma

    DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE   9963 ( 9963 )   230 - 237   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-319-47072-6_16

    Web of Science

    researchmap

  • Flexible Authentication Protocol with Key Reconstruction in WBAN Environments Reviewed

    Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi

    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016)   220 - 224   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICITCS.2016.7740335

    Web of Science

    researchmap

  • Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization Reviewed

    Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma

    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016   1035 - 1042   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2016.151

    Web of Science

    researchmap

  • Proposal and Evaluation of Cyber Defense System using Blacklist Refined Based on Authentication Results Reviewed

    Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi

    PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS)   135 - 139   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2016.25

    Web of Science

    researchmap

  • Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares Reviewed

    Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan

    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS)   48 - 54   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AsiaJCIS.2016.21

    Web of Science

    researchmap

  • Zipf distribution model for quantifying risk of re-identification from trajectory data Reviewed

    Hiroaki Kikuchi, Katsumi Takahashi

    Journal of Information Processing   24 ( 5 )   816 - 823   2016

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.24.816

    Scopus

    researchmap

  • パーソナルデータの行方

    木村 映善, 菊池 浩明, 佐久間 淳, 千田 浩司, 美馬 正司

    医療情報学連合大会論文集   35回   172 - 173   2015.11

     More details

    Language:Japanese   Publisher:(一社)日本医療情報学会  

    researchmap

  • Privacy-Preserving Decision Tree Learning with Boolean Target Class Reviewed

    Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E98A ( 11 )   2291 - 2300   2015.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E98.A.2291

    Web of Science

    researchmap

  • 暗号モジュールを搭載したプロセッサにおける暗号処理のオフローディング方式の効率化の提案と評価 Reviewed

    金子 洋平, 齋藤 孝道, 菊池 浩明

    情報処理学会論文誌   56 ( 9 )   1846 - 1856   2015.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 多種環境マルウェア動的解析システムの提案および評価 Reviewed

    仲小路 博史, 重本 倫宏, 鬼頭 哲郎, 林 直樹, 寺田 真敏, 菊池 浩明

    情報処理学会論文誌   56 ( 9 )   1730 - 1744   2015.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 機械合成文の不自然度相対識別問題に基づくCAPTCHAの提案 Reviewed

    山口 通智, 岡本 健, 菊池 浩明

    情報処理学会論文誌   56 ( 9 )   1834 - 1845   2015.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals Reviewed

    Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga

    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS)   IEEE   85 - 90   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AsiaJCIS.2015.31

    Web of Science

    researchmap

  • Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies Reviewed

    Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito

    2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015)   IEEE   510 - 514   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2015.229

    Web of Science

    researchmap

  • Cryptographic Operation Load-balancing between Cryptographic Module and CPU Reviewed

    Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi

    2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015)   IEEE   698 - 705   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2015.256

    Web of Science

    researchmap

  • Automated Detection of Drive-by Download Attack Reviewed

    Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii

    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015   IEEE   511 - 515   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMIS.2015.71

    Web of Science

    researchmap

  • Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data Reviewed

    Hiroaki Kikuchi, Katsumi Takahashi

    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)   IEEE   14 - 21   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/PST.2015.7232949

    Web of Science

    researchmap

  • CAPTCHA System by Differentiating the Awkwardness of Objects Reviewed

    Michitomo Yamaguchi, Takeshi Okamoto, Hiroaki Kikuchi

    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015)   IEEE   257 - 263   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2015.114

    Web of Science

    researchmap

  • Privacy-Preserving Protocol for Reduced Cancer Risk on Daily Physical Activity Reviewed

    Hiroaki Kikuchi, Shigeta Ikuji, Manami Inoue

    The 2014 International Conference on Security & Management (SAM)   246 - 254   2014.7

     More details

  • Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage Reviewed

    Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa

    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS)   164 - 169   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AsiaJCIS.2014.33

    Web of Science

    researchmap

  • Temporal Behaviors of Top-10 Malware Download in 2010-2012 Reviewed

    Chaxiong Yukonhiatou, Surin Kittitornkun, Hiroaki Kikuchi, Khamphao Sisaat, Masato Terada, Hiroshi Ishii

    2014 INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON)   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Privacy-preserving Dose-Response Relationship Test Reviewed

    Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma

    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014)   504 - 508   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2014.98

    Web of Science

    researchmap

  • On the Vulnerability of Ghost Domain Names Reviewed

    Hiroaki Kikuchi, Tomohiro Arimizu

    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)   IEEE   584 - 587   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMIS.2014.87

    Web of Science

    researchmap

  • Privacy-preserving Hypothesis Testing for the Analysis of Epidemiological Medical Data Reviewed

    Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma

    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)   IEEE   359 - 365   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2014.46

    Web of Science

    researchmap

  • Vulnerability of the Conventional Accessible CAPTCHA used by the White House and an Alternative Approach for Visually Impaired People Reviewed

    Michitomo Yamaguchi, Torn Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi

    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC)   IEEE   3946 - 3951   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SMC.2014.6974548

    Web of Science

    researchmap

  • An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net. Reviewed

    Michitomo Yamaguchi, Toru Nakata, Takeshi Okamoto, Hiroaki Kikuchi

    8th International Conference, UAHCI 2014, Held as Part of HCI International 2014   Springer   119 - 130   2014

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-319-07509-9_12

    researchmap

  • Bloom filter bootstrap: Privacy-preserving estimation of the size of an intersection Reviewed

    Hiroaki Kikuchi, Jun Sakuma

    Journal of Information Processing   22 ( 2 )   388 - 400   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.22.388

    Scopus

    researchmap

  • Application for Privacy-Preserving Epidemic analysis and Bayes Estimation of Size of Intersection using Bloom Filter Reviewed

    Hiroaki Kikuchi

    The 8th International Workshop on Security (IWSEC2013), Okinawa, 2013.   2013.11

     More details

  • マルコフ連鎖による合成文章の不自然さを用いたCAPTCHAの提案と安全性評価 Reviewed

    鴨志田 芳典, 菊池 浩明

    情報処理学会論文誌   54 ( 9 )   2156 - 2166   2013.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption

    WU,Shuang, KAWAMOTO,Junpei, KIKUCHI,Hiroaki, SAKUMA,Jun

    電子情報通信学会技術研究報告. IBISML, 情報論的学習理論と機械学習   113 ( 139 )   67 - 74   2013.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Preserve the privacy of personal information when conducting statistical analysis has attracted much attention in machine learning and data mining. In this work, we propose an approach to realize privacy-preserving logistic regression when data are held by different individuals--without actually combining the data together. In our approach, we use polynomial fitting to approximate the logistic function in order to solve the problem that logistic function is not available in the secure settings (encryptions are not applicable) because of its non-linear property. And the experiment shows that our approach achieves good prediction accuracy compared with original logistic regression.

    researchmap

  • Time Zone Correlation Analysis of Malware/Bot Downloads Reviewed

    Khamphao Sisaat, Hiroaki Kikuchi, Shunji Matsuo, Masato Terada, Masashi Fujiwara, Surin Kittitornkun

    IEICE TRANSACTIONS ON COMMUNICATIONS   E96B ( 7 )   1753 - 1763   2013.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transcom.E96.B.1753

    Web of Science

    researchmap

  • Privacy-Preserving Data Mining for Medical Applications Reviewed

    Hiroaki Kikuchi

    2013 AI Forum, Tamkang, Taiwan, 2013.   2013.5

     More details

  • Hadoopを用いた大規模分散プライバシー保護システムと医療情報統合への応用

    川村, 生地,小柳

    暗号と情報セキュリティシンポジウム (SCIS 2013)( 1C1-5)   1-6   2013.1

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • 傾向性の検定における秘匿疫学調査プロトコル

    佐藤智貴, 佐久間淳

    暗号と情報セキュリティシンポジウム (SCIS 2013)   1-4   2013.1

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Location privacy vulnerable from bluetooth devices Reviewed

    Hiroaki Kikuchi, Takeru Yokomizo

    Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013   IEEE   534 - 538   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/NBiS.2013.89

    Scopus

    researchmap

  • Privacy-preserving collaborative filtering using randomized response Reviewed

    Hiroaki Kikuchi, Anna Mochizuki

    Journal of Information Processing   21 ( 4 )   617 - 623   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.2197/ipsjjip.21.617

    Scopus

    researchmap

  • Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection Reviewed

    Hiroaki Kikuchi, Jun Sakuma

    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII   7964 ( Springer )   145 - 163   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Mining botnet coordinated attacks using Apriori-Prefixspan hybrid algorithm Reviewed

    Masayuki Ohrui, Hiroaki Kikuchi, Nur Rohman Rosyid, Masato Terada

    Journal of Information Processing   21 ( 4 )   607 - 616   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.2197/ipsjjip.21.607

    Scopus

    researchmap

  • Privacy-preserving collaborative filtering on the cloud and practical implementation experiences Reviewed

    Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos

    IEEE International Conference on Cloud Computing, CLOUD   IEEE   406 - 413   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CLOUD.2013.109

    Scopus

    researchmap

  • Privacy-preserving protocol for epidemiology in effect of radiation Reviewed

    Hiroaki Kikuchi, Tomoki Sato, Jun Sakuma

    Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013   IEEE   831 - 836   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMIS.2013.149

    Scopus

    researchmap

  • Mining Botnet Coordinated Attacks using <i>Apriori-PrefixSpan</i> Hybrid Algorithm

    Ohrui Masayuki, Kikuchi Hiroaki, Rosyid Nur Rohman, Terada Masato

    IMT   8 ( 4 )   1207 - 1216   2013

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    This paper aims to detect features of coordinated attacks by applying data mining techniques, namely <i>Apriori</i> with <i>PrefixSpan</i>, to the CCC DATAset 2008-2010, which comprises captured packet data and downloading logs. Data mining algorithms enable us to automate the detection of characteristics in large amounts of data, which conventional heuristics cannot deal with. <i>Apriori</i> achieves a high recall but with false positives, whereas <i>PrefixSpan</i> has high precision but low recall. We therefore propose a hybrid of these two algorithms. Our analysis shows a change in the behavior of malware over the past three years.

    DOI: 10.11185/imt.8.1207

    CiNii Research

    researchmap

  • Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing Reviewed

    Chaxiong Yukonhiatou, Surin Kittitornkun, Hiroaki Kikuchi, Khamphao Sisaat, Masato Terada, Hiroshi Ishii

    2013 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC)   343 - 347   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Scalable privacy-preserving data mining with asynchronously partitioned datasets Reviewed

    Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E96-A ( 1 )   111 - 120   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1587/transfun.E96.A.lll

    Scopus

    researchmap

  • Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes Reviewed

    Hiroaki Kikuchi, Kouichi Ito, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka

    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)   538 - 545   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2013.140

    Web of Science

    researchmap

  • Clustering Top-10 malware/bots based on download behavior Reviewed

    Chaxiong Yukonhiatou, Surin Kittitornkun, Hiroaki Kikuchi, Khamphao Sisaat, Masato Terada, Hiroshi Ishii

    Proceedings - 2013 International Conference on Information Technology and Electrical Engineering: "Intelligent and Green Technologies for Sustainable Development", ICITEE 2013   IEEE   62 - 67   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/ICITEED.2013.6676212

    Scopus

    researchmap

  • プライバシー保護確率検定システムの実装と評価

    佐藤智貴, 佐久間淳

    信学技報(ICSS2012-55)   112 ( 315 )   61-66   2012.11

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Bloom Filter を用いた積集合サイズのベイズ推定とそのプライバシー保護疫学調査への応用

    佐久間淳

    コンピュータセキュリティシンポジウム (CSS 2012),(IPSJ, 2012)   216-223   2012.11

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • 利用者認証とフェールセーフ性について

    信学技報(SSS2012-19)   112 ( 313 )   11-15   2012.11

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • プライバシー保護決定木学習におけるエントロピーを近似する順序同型関数

    伊藤孝一, 牛田芽生恵, 津田宏, 山岡裕司

    コンピュータセキュリティシンポジウム (CSS 2012),(IPSJ,2012)   92-97   2012.11

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Template-protecting Biometric Authentication Using Oblivious Evaluation of Feature Value Function with Fuzzy Polynomial Reviewed

    Masakatsu Nishigaki, Yoshimasa Watanabe, Masahiro Oda, Yuta Yoneyama, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi

    IPSJ Journal   53 ( 9 )   2254 - 2266   2012.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    &quot;ZeroBio&quot; has been proposed for a secure biometric authentication over the network by conducting cryptographic protocol between prover and verifier. This paper proposes another type of ZeroBio protocol in which the feature value function of biometric information is coded as a &quot;fuzzy&quot; polynomial. The fuzzy polynomial becomes a polynomial only when the enrolled and the presented biometric information are close enough, and thus the evaluation of the authenticity of biometric information can be conducted easily with cryptographic protocol. This paper proves that the proposed ZeroBio protocol is...

    CiNii Research

    researchmap

  • 曖昧性を含んだ多項式による特徴量関数の秘匿評価を利用したテンプレート保護型生体認証

    西垣正勝, 渡邊幸聖, 小田雅洋, 米山裕太, 山本匠, 高橋健太, 尾形わかは

    Journal of Cloud Computing: Advances, Systems and Applications, Springer   1 ( 8 )   1-14   2012.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • ネットワークのサービス品質に対する対話型アプリケーションの要求条件の評価

    小澤 友也

    マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012),(IPSJ, 2012.)   1034-1039   2012.7

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • マルコフ連鎖による合成文章の不自然さを用いたCAPTCHAの安全性評価と改良について

    鴨志田 芳典

    マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012) (IPSJ, 2012)   205-212   2012.7

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • 安全だけど安心できない,安全でないけど安心できる

    三菱電機技法(巻頭言)   371 ( 7 )   2012.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • IFIP TM 2012参加報告

    Anirban Basu

    研究報告コンピュータセキュリティ(CSEC)   2012-CSEC-58 ( 45 )   1-6   2012.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • プライバシーを保護したピロリ菌疫学調査

    佐久間淳, 三上春夫

    2012年度人工知能学会全国大会(第26回)(3I2-OS-20-9)   1-4   2012.6

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Privacy-Preserving Collaborative Filtering Schemes With Sampling Users Reviewed

    Hiroaki Kikuchi, Hiroatsu Kizawa

    Journal of Japan Society for Fuzzy Theory and Intelligent Informatics   24 ( 3 )   753 - 762   2012.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Fuzzy Theory and Intelligent Informatics  

    A recommendation system enables us to take information from huge datasets about tastes effectively. Many cryptographical protocols for computing privacy-preserving recommendation without leaking the privacy of users are proposed. However, the current issue is the large computational overhead depending the number of users and hence, the application of the protocol is limited within small communities. In this paper, we propose some efficient schemes reducing the preference matrix of the sets of items and users. In the proposed schemes, users get their ratings encrypted by a public key of trusted authorities and submit to a public server so that the ciphertext of ratings are available to any users. The user wishing to have the recommendation performs some precomputations of these using the homomorphic property of public key algorithm and then sends the resulting ciphertext to the set of trusted servers. Having sampled some users rating in secure way, it divides the set of users into smaller groups which results in reduction of matrix in low dimension.

    DOI: 10.3156/jsoft.24.753

    CiNii Research

    researchmap

  • 偽造証明書を用いたファーミング攻撃の危険性について

    平井圭佑

    情報処理学会第74回全国大会(1ZA-5 )   ( 3 )   615-616 - 616   2012.3

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • 各種センサを統合した行動状態推定機能を持つライフログシステムのAndroidへの実装と評価

    大久保成晃

    情報処理学会第74回全国大会(6X-2)   ( 3 )   35-36 - 352   2012.3

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:一般社団法人情報処理学会  

    携帯端末に搭載されるGPSを用いた行動情報を記録するライフログサービスが盛んになってきている.しかしながら,位置情報だけでは,ユーザの状態を考慮したよりきめ細かいサービスを提供するには不十分である.そこで,本研究はAndroid端末に搭載されるGPS,電子コンパス,加速度センサを用い,利用者の状態(停止,歩行,エレベータ,階段,電車)を推定してログとして記録するシステムを実装開発する.本稿では,システムの設計を述べ状態推定精度を報告する.

    CiNii Research

    researchmap

  • ターゲット属性の論理演算を可能とする垂直分割プライバシー保護決定木学習

    伊藤孝一, 牛田芽生恵, 津田宏, 山岡裕司

    暗号と情報セキュリティシンポジウム (SCIS 2012),2D1   1-5   2012.1

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • アイテム依存の摂動化によるプライバシー保護情報推薦

    望月安菜

    2012年暗号と情報セキュリティシンポジウム (SCIS 2012), 2D1-6, 電子情報通信学会   1-5   2012.1

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Word salad CAPTCHA - Application and evaluation of synthesized sentences Reviewed

    Yoshifumi Kamoshida, Hiroaki Kikuchi

    Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012   IEEE   799 - 804   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2012.145

    Scopus

    researchmap

  • Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine - A performance case study Reviewed

    Anirban Basu, Jaideep Vaidya, Theo Dimitrakos, Hiroaki Kikuchi

    Proceedings of the ACM Symposium on Applied Computing   447 - 452   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/2245276.2245362

    Scopus

    researchmap

  • Accuracy of Privacy-preserving Collaborative Filtering Based on Quasi-homomorphic Similarity Reviewed

    Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino

    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC)   IEEE   555 - 562   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMIS.2011.104

    Web of Science

    researchmap

  • Perturbation based privacy preserving slope one predictors for collaborative filtering Reviewed

    Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi

    IFIP Advances in Information and Communication Technology   374 ( IFIPTM )   17 - 35   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-29852-3_2

    Scopus

    researchmap

  • Privacy-preserving collaborative filtering using randomized response Reviewed

    Hiroaki Kikuchi, Anna Mochizuki

    Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   IEEE   671 - 676   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMIS.2012.141

    Scopus

    researchmap

  • Geographical Visualization of Malware Download for Anomaly Detection Reviewed

    Naoki Hiroguchi, Khamphao Sisaat, Hiroaki Kikuchi, Surin Kittitornkun

    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012)   IEEE   74 - 78   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AsiaJCIS.2012.20

    Web of Science

    researchmap

  • Synthesis of Secure Passwords Reviewed

    Tomoki Sato, Hiroaki Kikuchi

    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012)   IEEE ( 8 )   35 - 43   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AsiaJCIS.2012.13

    Web of Science

    researchmap

  • Privacy preserving collaborative filtering for SaaS enabling PaaS clouds

    Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos, Srijith K. Nair

    Journal of Cloud Computing   1 ( 1 )   1 - 14   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Verlag  

    DOI: 10.1186/2192-113X-1-8

    Scopus

    researchmap

  • 投資額制約がある場合の調達・生産計画の研究

    野口真希, 松丸正延, 山下洋史

    第47回日本経営システム学会全国研究発表大会講演論文集   80-81   2011.12

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • 曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証:その改良と安全性証明

    渡邊幸聖, 小田雅洋, 山本匠, 高橋健太, 尾形わかは, 西垣正勝

    暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会,2E3-4   1-8   2011.11

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor Reviewed

    Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi

    Journal of Internet Services and Information Security (JISIS)   1 ( 4 )   26 - 46   2011.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.22667/JISIS.2011.11.31.026

    researchmap

  • Privacy-Preserving Item Recommendation System in Cloud Computing Reviewed

    A. Basu, H. Kikuchi, J. Vaidya, T. Dimitrakos

    Poster in the International Workshop on Security (IWSEC 2011)   IPSJ ( IEICE )   2011.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Analysis on the Sequential Behavior of Malware Attacks Reviewed

    Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E94D ( 11 )   2139 - 2149   2011.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E94.D.2139

    Web of Science

    researchmap

  • オプションを用いた調達契約の研究

    野口真希, 松丸正延, 菊池浩明

    日本経営工学会 平成23年度秋季研究大会予稿集   40-41   2011.11

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Communication Efficient Distributed Concordance Evaluation in Vertical Partitioning

    青木 良樹, 菊池 浩明, 寺田 雅之, 石井 一彦, 関野 公彦

    コンピュータセキュリティシンポジウム2011 論文集   2011 ( 3 )   510 - 515   2011.10

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Research

    researchmap

  • Bloomフィルタを用いたマッチング数の秘匿比較

    佐久間淳

    コンピュータセキュリティシンポジウム2011, 情報処理学会(2C4-3)   516-521   2011.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Practical privacy preserving collaborative filtering on the Google App Engine

    2011 ( 3 )   361-366 - 366   2011.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • Slope One を用いた摂動化プライバシー保護情報推薦方式

    望月安菜

    コンピュータセキュリティシンポジウム (CSS 2011), 情報処理学会   379-384   2011.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Time-zone dependency in malicious activities performed by botnet Reviewed

    Hiroaki Kikuchi, Shunji Matsuo, Masato Terada, Masashi Fujiwara

    The 6th Joint Workshop on Information Security (JWIS 2011)   ( 5D )   1 - 14   2011.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • 摂動化によってプライバシーを保護する情報推薦方式

    望月安菜

    マルチメディア,分散,協調とモバイルシンポジウム (DICOMO2011), 情報処理学会(3G-2)   536-541 - 541   2011.7

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • プライバシーを保護した放射線疫学調査システム

    佐藤智貴, 佐久間淳

    情報処理学研究報告,コンピュータセキュリティ (CSEC)   CSEC-54 ( 25 )   1-7   2011.7

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering

    Anirban Basu, Jaideep Vaidya

    Trust and Privacy in Distributed Information Processing (TP-DIS 2011), Workshop Proceedings of IFIPTM-2011(IFIP WG 11.11)   447-462   2011.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • 入退室管理エージェントシステムの開発

    田中隼人, 二之形裕貴, 青木良樹

    情報処理学会全国大会,1X-4   1-2   2011.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • ゼロ知識性が証明可能なリモート生体認証方式

    佐瀬大治郎, 尾形わかは, 西垣正勝

    2011年暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会,3E1-3   1-6   2011.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 凝準同型性を満たす類似度による分散協調フィルタリングプロトコル

    青木良樹, 菊池浩明, 寺田雅之, 石井一彦, 関野公彦

    暗号と情報セキュリティシンポジウム (SCIS 2011) 予稿集   2011.1

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Research

    researchmap

  • Fuzzy Vault Schemeにおけるチャフ空間拡大に関する検討

    小田雅洋, 渡邊幸聖, 山本匠, 高橋健太, 尾形わかは, 西垣正勝

    暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会 3E1-5   1-8   2011.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 暗号とバイオメトリクス技術の融合

    尾形わかは, 西垣正勝

    バイオメトリックシステムセキュリティ研究会,電子情報通信学会, BS研   1-8   2011.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 秘密分散ベースの秘匿関数計算を用いたプライバシ保護情報推薦方式

    多田 美奈子

    暗号と情報セキュリティシンポジウム SCIS 2011, 電子情報通信学会,1F1-3   1-4   2011.1

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • Perfect privacy-preserving automated trust negotiation Reviewed

    Tangtisanon Pikulkaew, Hiroaki Kikuchi

    Journal of Information Processing   19   451 - 462   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.19.451

    Scopus

    researchmap

  • Apriori-PrefixSpan hybrid approach for automated detection of botnet coordinated attacks Reviewed

    Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid

    Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011   IEEE   92 - 97   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2011.23

    Scopus

    researchmap

  • Improving efficiency in privacy-preserving Automated Trust Negotiation with conjunctive policies Reviewed

    Tangtisanon Pikulkaew, Hiroaki Kikuchi

    Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011   IEEE   679 - 684   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2011.114

    Scopus

    researchmap

  • Perfect Privacy Preserving in Automated Trust Negotiation Reviewed

    Hiroaki Kikuchi, Tangtisanon Pikulkaew

    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011)   19   129 - 134   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2011.110

    Web of Science

    researchmap

  • Perfect Privacy Preserving in Automated Trust Negotiation Reviewed

    Hiroaki Kikuchi, Tangtisanon Pikulkaew

    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011)   IEEE   129 - 134   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2011.110

    Web of Science

    researchmap

  • Principal component analysis of botnet takeover Reviewed

    Hiroaki Kikuchi, Shuji Matsuo, Masato Terada

    Journal of Information Processing   19   463 - 472   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.19.463

    Scopus

    researchmap

  • Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets Reviewed

    Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Honga

    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY   354 ( Springer )   223 - +   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-642-21424-0_18

    Web of Science

    researchmap

  • Privacy-preserving collaborative filtering for the cloud Reviewed

    Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos

    Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011   223 - 230   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CloudCom.2011.38

    Scopus

    researchmap

  • Distributed collaborative filtering protocol based on quasi-homomorphic similarity Reviewed

    Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, Kimihiko Sekino

    Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011   622 - 627   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/IMIS.2011.104

    Scopus

    researchmap

  • Principal Component Analysis of Botnet Takeover

    Kikuchi Hiroaki, Matsuo Shuji, Terada Masato

    Information and Media Technologies   6 ( 4 )   1241 - 1250   2011

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    A botnet is a network of compromised computers infected with malware that is controlled remotely via public communications media. Many attempts at botnet detection have been made including heuristics analyses of traffic. In this study, we propose a new method for identifying independent botnets in the CCC Dataset 2009, the log of download servers observed by distributed honeypots, by applying the technique of Principal Component Analysis. Our main results include distinguishing four independent botnets when a year is divided into five phases.

    DOI: 10.11185/imt.6.1241

    CiNii Research

    researchmap

  • 第5 回IFIP トラストマネージメント国際会議参加報告

    ハオドン

    コンピュータセキュリティシンポジウム2011 情報処理学会(3D1)   594-599   2011

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • CCC DATAset における連携するマルウェアの変遷

    大類将之, 寺田真敏, Nur Rohman Rosyid

    コンピュータセキュリティシンポジウム 2010 (CSS 2010), 3F2-4, 情報処理学会   2010 ( 9 )   903-909   2010.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    J-GLOBAL

    researchmap

  • プライバシ保護情報推薦システムにおける中間情報の秘匿について

    多田 美奈子

    コンピュータセキュリティシンポジウム 2010 (CSS 2010), 2D1, 情報処理学会   291-296   2010.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • パスシーケンスに基づくDrive-by-Download 攻撃の分類

    桑原和也, 安藤槙悟, 藤原将志, 寺田真敏, 趙晋輝

    コンピュータセキュリティシンポジウム 2010 (CSS 2010), 3F1-3, 情報処理学会   2010 ( 9 )   771-776   2010.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    J-GLOBAL

    researchmap

  • アイテム間類似度に基づくプライバシ保護協調フィルタリングの提案

    多田美奈子

    情報処理学会論文誌   51 ( 9 )   1554-1562   2010.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証

    渡邊 幸聖, 小田 雅洋, 山本匠, 尾形 わかは, 菊池 浩明, 西垣正勝

    暗号と情報セキュリティシンポジウム (SCIS 2010), 2F1-3   1-6   2010.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Research

    researchmap

  • Privacy-preserving similarity evaluation and application to remote biometrics authentication Reviewed

    Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki

    SOFT COMPUTING   14 ( 5 )   529 - 536   2010.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s00500-009-0449-6

    Web of Science

    researchmap

  • Frequent Sequential Attack Patterns of Malware in Botnets

    Nur Rohman Rosyid, Masayuki Ohrui, Pitikhate Sooraksa, Masato Terada

    情報処理学会,研究報告, Vol. 2010-CSEC-48   ( 37 )   1-7   2010.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • マルコフチェインによるワードスパムの合成実験とその評価について

    鴨志田芳典, 菊池浩明

    情報処理学会全国大会, 2G-1   ( 3 )   581-582   2010.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 組織間プライバシー保護データマイニングの考察

    菊池浩明, 香川大介, 石井一彦, 寺田雅之, 本郷節之

    暗号と情報セキュリティシンポジウム (SCIS 2010) 予稿集   2010.1

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • A Discovery of Sequential Attack Patterns of Malware in Botnets Reviewed

    Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada

    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010)   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Principal component analysis of port-scans for reduction of distributed sensors

    Hiroaki Kikuchi, Masato Terada

    Journal of Information Processing   18 ( 18 )   190 - 200   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.18.190

    Scopus

    researchmap

  • Principal Component Analysis of Port-scans for Reduction of Distributed Sensors

    Kikuchi Hiroaki, Terada Masato

    Information and Media Technologies   5 ( 4 )   1338 - 1348   2010

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    There are many studies aimed at using port-scan traffic data for fast and accurate detection of rapidly spreading worms. This paper proposes two new methods for reducing the traffic data to a simplified form comprising of significant components of smaller dimensionality. (1) Dimension reduction via Principal Component Analysis (PCA), widely used as a tool in exploratory data analysis, enables estimation of how uniformly the sensors are distributed over the reduced coordinate system. PCA gives a scatter plot for the sensors, which helps to detect abnormal behavior in both the source address space and the destination port space. (2) One of the significant applications of PCA is to reduce the number of sensors without losing the accuracy of estimation. Our proposed method based on PCA allows redundant sensors to be discarded and the number of packets estimated even when half of the sensors are unavailable with accuracy of less than 3% of the total number of packets. In addition to our proposals, we report on experiments that use the Internet Scan Data Acquisition System (ISDAS) distributed observation data from the Japan Computer Emergency Response Team (JPCERT).

    DOI: 10.11185/imt.5.1338

    CiNii Research

    researchmap

  • Mining association rules consisting of download servers from distributed honeypot observation

    Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada

    Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010   541 - 545   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2010.73

    Scopus

    researchmap

  • Privacy-Preserving Collaborative Filtering Protocol based on Similarity between Items Reviewed

    Minako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak

    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)   573 - 578   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2010.159

    Web of Science

    researchmap

  • 分散ハニーポット観測からのダウンロードサーバ間の相関ルール抽出

    大類 将之, 菊池 浩明, 寺田 真敏

    コンピュータセキュリティシンポジウム (CSS 2009), マルウェア対策研究人材育成ワークショップ (MWS 2009), A2   ( 3 )   1-6   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    CiNii Research

    researchmap

  • パケットキャプチャーから感染種類を判定する発見的手法について

    桑原 和也, 菊池 浩明, 寺田 真敏, 藤原 将志

    コンピュータセキュリティシンポジウム (CSS 2009), マルウェア対策研究人材育成ワークショップ (MWS 2009), A5   ( 3 )   1-6 - 402   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Research

    researchmap

  • ボットネットはいくつあるか?ダウンロードログからの線形独立な基底数

    松尾 峻治, 菊池 浩明, 寺田 真敏

    コンピュータセキュリティシンポジウム (CSS 2009), マルウェア対策研究人材育成ワークショップ (MWS 2009), A2   ( 1 )   1-6   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • アイテム間類似度に基づくプライバシ保護協調フィルタリングの提案

    多田 美奈子

    コンピュータセキュリティシンポジウム (CSS 2009), E6   ( 1 )   1-6   2009.10

     More details

    Language:Japanese  

    researchmap

  • 多項式の類似度を利用した非対称生体認証

    菊池 浩明, 尾形 わかは, 西垣 正勝

    コンピュータセキュリティシンポジウム (CSS 2009), D4   ( 2 )   1-6   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • ポリシーを秘匿した自動トラスト交渉

    菊池 浩明, Tangtisanon Pikulkaew

    コンピュータセキュリティシンポジウム (CSS 2009)   ( 3 )   1-6   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Orthogonal Expansion of Port-Scan-Estimation from Limited Sensors

    Hiroaki Kikuchi, Masato Terada

    The Fourth Joint Workshop on Information Security (JWIS 2009), 5A-2   1-14   2009.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • プライバシーを保護した評判推薦方式

    菊池浩明, 木澤寛厚

    日本知能情報ファジィ学会,ファジィシステムシンポジウム   ( 25 )   9-12   2009.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Short Sanitizable Signature Scheme Based on RSA-Accumulators

    Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi

    暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-3   1-6   2009.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • 秘匿積集合プロトコルを利用したプライバシ協調フィルタリングの提案

    木澤寛厚, 磯崎邦隆, 菊池浩明

    暗号と情報セキュリティシンポジウム SCIS 2009, 1B2-5   1-4   2009.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    CiNii Research

    researchmap

  • 抽出署名の拡張による墨塗・削除署名の構成について

    伊豆哲也, 菊池浩明, 武仲正彦

    暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-1   1-6   2009.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 直交基底指紋への参照度を特徴量とした安全な生体認証プロトコル

    菊池浩明, 河野瞬, 畔上洋平, 西垣正勝, 尾形わかは

    暗号と情報セキュリティシンポジウム SCIS 2009, 2F4-3   1-6   2009.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Redactable 署名をベースとした墨塗り・削除署名

    伊豆哲也, 菊池浩明, 武仲正彦

    暗号と情報セキュリティシンポジウム SCIS 2009, 3B2-2   1-6   2009.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Orthogonal expansion of port-scanning packets Reviewed

    Hiroaki Kikuchi, Tomohiro Kobori, Masato Terada

    NBiS 2009 - 12th International Conference on Network-Based Information Systems   321 - 326   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/NBiS.2009.82

    Scopus

    researchmap

  • A Storage Efficient Redactable Signature in the Standard Model Reviewed

    Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi

    INFORMATION SECURITY, PROCEEDINGS   5735   326 - 337   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • A Proposal of Efficient Remote Biometric Authentication Protocol Reviewed

    Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki

    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS   5824   212 - +   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Privacy-preserving collaborative filtering schemes

    Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada

    Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   911 - 916   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ARES.2009.148

    Scopus

    researchmap

  • Multiparty computation from El Gamal/Paillier conversion

    Koji Chida, Hiroaki Kikuchi, Keiichi Hirota, Gembu Morohashi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 1 )   137 - 146   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1587/transfun.E92.A.137

    Scopus

    researchmap

  • A study of user-friendly hash comparison schemes

    Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang

    Proceedings - Annual Computer Security Applications Conference, ACSAC   105 - 114   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ACSAC.2009.20

    Scopus

    researchmap

  • Protocols for Identifying Size of Intersections without revealing Address sets and its application to network port-scanning packets

    2008 ( 14 )   109-114 - 114   2008.12

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    CiNii Research

    researchmap

  • Provable Secure Signature Scheme with Partial Sanitization and Disclosure

    Hiroaki Kikuchi, Mari Ueyama, Tetsuya Izu, Masahiko Takenaka

    Fourth International SKLOIS Conference, Inscrypt 2008, Pre-proceedings   ( 2 )   549-563   2008.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • プライバシ協調フィルタリングにおける利用者評価行列の次元削減

    木澤寛厚, 菊池浩明

    コンピュータセキュリティシンポジウム (CSS 2008)   509-514 - 514   2008.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    CiNii Research

    researchmap

  • Interrelation between Interactive and Non-interaction Sensors

    小堀智弘, 菊池浩明, 寺田真敏

    情報処理学会シンポジウム論文集   2008 ( 8 )   67-74   2008.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    J-GLOBAL

    researchmap

  • 信頼の数学モデルとそのダイナミクスについて

    菊池浩明

    コンピュータセキュリティシンポジウム (CSS 2008)   397-402   2008.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • G3C-ZKIPを用いた非対称生体認証

    小田 雅洋, 尾形 わかは, 菊池浩明, 西垣 正勝

    コンピュータセキュリティシンポジウム (CSS 2008)   695-700 - 700   2008.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    CiNii Research

    researchmap

  • 言語情報と和声進行に基づく旋律の自動生成システム

    白石,菅, 内田,中西

    情報処理学会第70回全国大会,3X-2   ( 2 )   443-444   2008.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Automated Port-scan Classification with Decision Tree and Distributed Sensors

    Kikuchi Hiroaki, Fukuno Naoya, Kobori Tomohiro, Terada Masato, Pikulkaew Tangtisanon

    Information and Media Technologies   3 ( 4 )   972 - 982   2008

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    Computer worms randomly perform port scans to find vulnerable hosts to intrude over the Internet. Malicious software varies its port-scan strategy, e.g., some hosts intensively perform scans on a particular target and some hosts scan uniformly over IP address blocks. In this paper, we propose a new automated worm classification scheme from distributed observations. Our proposed scheme can detect some statistics of behavior with a simple decision tree consisting of some nodes to classify source addresses with optimal threshold values. The choice of thresholds is automated to minimize the entropy gain of the classification. Once a tree has been constructed, the classification can be done very quickly and accurately. In this paper, we analyze a set of source addresses observed by the distributed 30 sensors in ISDAS for a year in order to clarify a primary statistics of worms. Based on the statistical characteristics, we present the proposed classification and show the performance of the proposed scheme.

    DOI: 10.11185/imt.3.972

    CiNii Research

    researchmap

  • Estimation of Increase of Scanners Based on ISDAS Distributed Sensors

    Kikuchi Hiroaki, Terada Masato, Fukuno Naoya, Doi Norihisa

    Information and Media Technologies   3 ( 4 )   939 - 948   2008

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    Given independent multiple access logs, we develop a mathematical model to identify the number of malicious hosts in the current Internet. In our model, the number of malicious hosts is formalized as a function taking two inputs, namely the duration of observation and the number of sensors. Assuming that malicious hosts with statically assigned global addresses perform random port scans to independent sensors uniformly distributed over the address space, our model gives the asymptotic number of malicious source addresses in two ways. Firstly, it gives the cumulative number of unique source addresses in terms of the duration of observation. Secondly, it estimates the cumulative number of unique source addresses in terms of the number of sensors. To evaluate the proposed method, we apply the mathematical model to actual data packets observed by ISDAS distributed sensors over a one-year duration from September 2004, and check the accuracy of identification of the number of malicious hosts.

    DOI: 10.11185/imt.3.939

    CiNii Research

    researchmap

  • Multi-bit embedding in asymmetric digitalwatermarking without exposing secret information

    Mitsuo Okada, Hiroaki Kikuchi, Yasuo Okabe

    IEICE Transactions on Information and Systems   E91-D ( 5 )   1348 - 1358   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1093/ietisy/e91-d.5.1348

    Scopus

    researchmap

  • Automated classification of port-scans from distributed sensors

    Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew

    Proceedings - International Conference on Advanced Information Networking and Applications, AINA   771 - 778   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/AINA.2008.73

    Scopus

    researchmap

  • Automated port-scan classification with decision tree and distributed sensors

    Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew

    Journal of Information Processing   16 ( 16 )   165 - 175   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.16.165

    Scopus

    researchmap

  • Estimation of increase of scanners based on ISDAS distributed sensors

    Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi

    Journal of Information Processing   16 ( 16 )   100 - 109   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    DOI: 10.2197/ipsjjip.16.100

    Scopus

    researchmap

  • Internet observation with ISDAS: How long does a worm perform scanning? Reviewed

    Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada

    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY   1282 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ARES.2008.82

    Web of Science

    researchmap

  • Secure multiparty computation for comparator networks

    Gembu Morohashi, Koji Chida, Keiichi Hirota, Hiroaki Kikuchi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E91-A ( 9 )   2349 - 2355   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1093/ietfec/e91-a.9.2349

    Scopus

    researchmap

  • Principal Components of Port-Address Matrices in Port-Scan Analysis Reviewed

    Hiroaki Kikuchi, Naoya Fukuno, Masato Terada, Norihisa Doi

    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS   5332   956 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication Reviewed

    Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki

    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS   5285   3 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • ZeroBio - Evaluation and development of asymmetric fingerprint authentication system using oblivious neural network evaluation protocol Reviewed

    Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki

    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS   1155 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Evaluation and implement of fuzzy vault scheme using indexed minutiae Reviewed

    Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai

    Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics   3709 - 3712   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICSMC.2007.4413865

    Scopus

    researchmap

  • Special section on cryptography and information security Reviewed

    Masakatu Morii, Shiho Moriai, Goichiro Hanaoka, Toru Akishita, Tetsuya Izu, Tetsu Iwata, Koji Okada, Toshinobu Kaneko, Hiroaki Kikuchi, Kwangjo Kim, Shinsaku Kiyomoto, Noboru Kunthiro, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Kazue Sako, Takashi Satoh, Akira Shiozaki, Hiroki Shizuya, Tsuyoshi Takagi, Mitsuru Tada, Keisuke Tanaka, Hiroshi Doi, Toru Nakanishi, Shoichi Hirose, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Natsume Matsuzaki, Tsutomu Matsumoto, Atsuko Miyaji, Maid Yoshida

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E90-A ( 1 )   1   2007

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1093/ietfec/e90-a.1.1

    Scopus

    researchmap

  • Efficient Multiparty Computation for Comparator Networks

    Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota

    The Second International Conference on Availability, Reliability and Security (ARES'07)   2007

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ares.2007.77

    researchmap

  • Estimation of behavior of scanners based on ISDAS distributed sensors Reviewed

    Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi

    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS   4804   1659 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Online Certification Status Verification with a Red-Black Hash Tree

    Kikuchi Hiroaki, Abe Kensuke, Nakanishi Shohachiro

    ipsjdc   2   513 - 523   2006

     More details

    Language:English   Publisher:Information Processing Society of Japan  

    Certificate revocation is a critical issue for a practical, public-key infrastructure. A new efficient revocation protocol using a one-way hash tree structure (instead of the classical list structure, which is known as a standard for revocation) was proposed and examined to reduce communication and computation costs. A tree approach, however, may run in <i>O</i>(<i>n</i>) time, in the worst case, i.e., when all the entries are sorted in descending order. A red-black tree is a binary sorted tree, with one extra bit per node, which is used for balancing the tree and guarantees that search and insertion operations take <i>O</i>(log<i>n</i>), even in the worst case. In this paper, we propose a binary red-black hash tree for certificate revocation and prove that it reduces costs more than any other tree balancing approache. We also compare the estimated communication and computation cost reductions of the red-black hash tree to those of the conventional binary search tree.

    DOI: 10.2197/ipsjdc.2.513

    CiNii Research

    researchmap

  • How many malacious scaners are in the Internet? Reviewed

    Hiroaki Kikuchi, Masato Terada

    INFORMATION SECURITY APPLICATIONS   4298   381 - +   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Secure asymmetric watermark detection without secret of modified pixels

    Mitsuo Okada, Hiroaki Kikuchi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3786   165 - 178   2005

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Scopus

    researchmap

  • Applications of fuzzy logic functions to knowledge discovery in databases Reviewed

    N Takagi, H Kikuchi, M Mukaidono

    TRANSACTIONS ON ROUGH SETS II   3135   107 - 128   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • User authentication with facial images - Human-friendly identification in the Internet Reviewed

    H Kikuchi, T Hattori, S Nakanishi

    JOINT 9TH IFSA WORLD CONGRESS AND 20TH NAFIPS INTERNATIONAL CONFERENCE, PROCEEDINGS, VOLS. 1-5   2265 - 2270   2001

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Distributed auction servers resolving winner and winning bid without revealing privacy of bids Reviewed

    H Kikuchi, S Hotta, K Abe, S Nakanishi

    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS   307 - 312   2000

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Performance evaluation of certificate revocation using k-valued hash tree Reviewed

    H Kikuchi, K Abe, S Nakanishi

    INFORMATION SECURITY, PROCEEDINGS   1729   103 - 117   1999

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms Reviewed

    S Ohtani, H Kikuchi, RR Yager, S Nakanishi

    FIRST INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ELECTRONIC SYSTEMS, PROCEEDINGS 1997 - KES '97, VOLS 1 AND 2   289 - 295   1997

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Diagnosis of fuzzy system character: System identification of composite operation and fuzzy relation by genetic algorithms Reviewed

    S Ohtani, H Kikuchi, RR Yager, S Nakanishi

    PROCEEDINGS OF THE SIXTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS I - III   293 - 298   1997

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Uniqueness of partially specified multiple-valued Kleenean function Reviewed

    H Kikuchi, N Takagi, S Nakanishi, M Mukaidono

    1995 25TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC, PROCEEDINGS   242 - 247   1995

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

▼display all

Books

  • 情報セキュリティ

    宮地, 充子, 菊池, 浩明( Role: Joint author)

    オーム社  2022.2  ( ISBN:9784274228162

     More details

    Total pages:xvii, 268p   Language:Japanese  

    CiNii Research

    researchmap

  • Information Security Practice and Experience - 14th International Conference, ISPEC 2018

    Chunhua Su, Hiroaki Kikuchi( Role: Joint author)

    2018.9 

     More details

  • 図解 コンピュータ概論[ソフトウェア・通信ネットワーク] 改訂4版

    橋本 洋志, 菊池 浩明, 横田 祥( Role: Joint author)

    オーム社  2017.11  ( ISBN:4274221431

     More details

    Total pages:270  

    ASIN

    researchmap

  • Applied Cryptography and Network Security - 15th International Conference, ACNS 2017

    Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi

    15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Lecture Notes in Computer Science 10355, Springer 2017  2017.10 

     More details

    Language:English  

    researchmap

  • IT Text ネットワークセキュリティ

    菊池 浩明, 上原 哲太郎( Role: Joint author)

    オーム社  2017.8  ( ISBN:4274219895

     More details

    Total pages:206  

    ASIN

    researchmap

  • IT Text ネットワークセキュリティ

    菊池浩明, 上原哲太郎( Role: Joint author)

    オーム社  2017.8 

     More details

  • IT Text 情報通信ネットワーク

    阪田史郎, 井関文一, 小高知宏, 甲藤二郎, 菊池浩明, 塩田茂雄, 長 敬三( Role: Joint author)

    オーム社  2015.10  ( ISBN:4274217973

     More details

    Total pages:280  

    ASIN

    researchmap

  • IT Text 情報通信ネットワーク

    阪田史郎, 井関文一, 小高知宏, 甲藤二郎, 菊池浩明, 塩田茂雄, 長敬三( Role: Joint author)

    オーム社  2015.10 

     More details

  • Javaによる 情報メディアアルゴリズム入門 (情報処理基礎シリーズ)

    大原 茂之, 浜本 和彦, 山本 宙, 菊池 浩明( Role: Joint author)

    日新出版  2004.4  ( ISBN:4817302186

     More details

    Total pages:172  

    ASIN

    researchmap

  • 情報セキュリティ (IT Text)

    宮地 充子, 菊池 浩明( Role: Joint author)

    オーム社  2003.10  ( ISBN:4274132846

     More details

    Total pages:268  

    ASIN

    researchmap

  • 情報セキュリティ事典

    土居 範久, 佐々木 良一, 岡本 栄司, 寺田 真敏, 内田 勝也, 菊池 浩明, 村山 優子( Role: Joint editor)

    共立出版  2003.7  ( ISBN:4320120701

     More details

    Total pages:1072  

    ASIN

    researchmap

  • ネットワークセキュリティ

    石橋 啓一郎, 松井 彩, 菊池 浩明, 土井 裕介( Role: Joint translator ,  Original_author: チャーリー カウフマン, マイク スペシナー, ラディア パールマン)

    ピアソン・エデュケーション  1997.6  ( ISBN:4931356982

     More details

    Total pages:517  

    ASIN

    researchmap

▼display all

MISC

  • AMIC: “Anonymity against Membership Inference” Competition Reviewed

    千田浩司, 荒井ひろみ, 井口誠, 小栗秀暢, 菊池浩明, 黒政敦史, 中川裕志, 中村優一, 西山賢志郎, 野島良, 野島良, 長谷川聡, 波多野卓磨, 濱田浩気, 古川諒, 山田明, 渡辺知恵美

    情報処理学会論文誌ジャーナル(Web)   64 ( 9 )   1317 - 1329   2023.9

     More details

  • PWS Cup 2021 – Competition on Anonymized Healthcare Data to be Qualified for Diabetes Prevalence Study

    1037 - 1044   2021.10

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • 匿名加工・再識別コンテストPWSCUP2018の報告~購買履歴データの一般化加工の安全性と有用性評価~

    濱田浩気, 濱田浩気, 荒井ひろみ, 小栗秀暢, 菊池浩明, 菊池浩明, 黒政敦史, 中川裕志, 西山賢志郎, 波多野卓磨, 村上隆夫, 山岡裕司, 山田明, 渡辺知恵美

    情報処理学会研究報告(Web)   2019 ( CSEC-84 )   2019

  • A Point of View That Researchers Should Have in Utilizing Multimedia Data

    101 ( 9 )   914 - 919   2018.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • 個人情報保護法の改正とビッグデータ活用

    菊池 浩明

    72 ( 6 )   70 - 76   2018.5

     More details

  • Privacy Preservation and Anonymization:0. Foreword - Application of Personal Data via Anonymization -

    59 ( 5 )   438 - 440   2018.4

     More details

  • PWS Cup2018:匿名加工再識別コンテストの設計 ~履歴データの一般化・再識別~

    濱田浩気, 濱田浩気, 荒井ひろみ, 小栗秀暢, 菊池浩明, 菊池浩明, 黒政敦史, 中川裕志, 西山賢志郎, 波多野卓磨, 村上隆夫, 山岡裕司, 山田明, 渡辺知恵美

    情報処理学会シンポジウムシリーズ(CD-ROM)   2018 ( 2 )   2018

  • PWSCUP2017: Evaluate Re-Identification Risk on Long Time History Data

    2017 ( 2 )   2017.10

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • RIG Exploit Kitにおける攻撃傾向の調査

    Michihiro Yamada, Rintaro Koike, Hiroaki Kikuchi, Xuping Huang

    Computer Security Symposium 2017   357 - 363   2017.10

     More details

    Language:Japanese  

    researchmap

  • 改正個人情報保護法の全面施工を迎えて研究者が気を付けること

    菊池浩明, 板倉陽一郎

    「情報処理」   58 ( 6 )   500 - 506   2017.6

     More details

    Language:Japanese  

    researchmap

  • パーソナルデータの利活用のための情報処理技術の方向性について

    木村 映善, 藤村 明子, 美馬 正司, 菊池 浩明, 千田 浩司, 佐久間 淳

    医療情報学37(Suppl)   210 - 211   2017

     More details

  • Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data

    Hiroaki Kikuchi, Katsumi Takahashi

    57 ( 9 )   2016.9

     More details

    Language:English  

    CiNii Research

    researchmap

  • Proposal on Re-identification method by using Euclidean distance and evaluation by using Anonymized Data of PWSCup2015

    116 ( 65 )   145 - 152   2016.5

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • SWIPASS: Image-Based User Authentication for Touch Screen Devices

    Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi

    57 ( 2 )   2016.2

     More details

    Language:English  

    CiNii Research

    researchmap

  • パーソナルデータの利活用は進むのか~ルールと保護技術の最前線

    KIMURA Eizen

    医療情報学36(Suppl)   208 - 210   2016

     More details

  • A Study on CAPTCHA System Using Differential Awkwardness-Objects

    YAMAGUCHI Michitomo, OKAMOTO Takeshi, KIKUCHI Hiroaki

    IEICE technical report. Information and communication system security   114 ( 489 )   55 - 60   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CAPTCHAs have been accepted as a technique which prevents unauthorized access by bots. Several researchers point out that conventional CAPTCHAs become insecure due to recent advances on recognition techniques, so CAPTCHAs with human's congnition capatility, i.e. differentiation between natural and awkward objects, have been studied. However, it is vulnerable against adversaries who use the difference on relative frequency between them because of the difficulty collecting natural objects. Our scheme needs no use natural objects and improves the shortcoming. In this paper, we apply our proposal to conventional questions which make humans differentiate natural sentences from word salads and evaluate it by several experiments.

    CiNii Research

    researchmap

  • Proposal of Multimodal Malware Analysis System with Multiple Types of Sandboxes.

    2014 ( 2 )   984 - 991   2014.10

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • DPCデータベースからのプライバシーを保護した線形回帰による入院日数モデルの学習

    菊池浩明, 橋本英樹, 康永秀生

    マルチメディア、分散協調とモバイルシンポジウム2014論文集   2014   219 - 223   2014.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection

    Hiroaki Kikuchi, Jun Sakuma

    55 ( 3 )   2014.3

     More details

    Language:English  

    CiNii Research

    researchmap

  • 検索可能秘密分散方式の提案

    伊藤孝一, 牛田芽生恵, 山岡裕司, 及川孝徳, 菊池浩明

    研究報告コンピュータセキュリティ(CSEC)   2014 ( 13 )   1 - 6   2014.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    クラウドに委託したデータの漏えいを防止してそのサービスを活用する為に,様々な検索可能暗号方式が提案されている.キーワードを暗号化してデータと組みにして登録し,検索を許可されたユーザが検索用のタグを送信することで,該当するデータのみを抽出する.一方,データの暗号化の代わりに,秘密分散により複数のサーバにデータを分散管理する仕組みも注目されている.そこで,本研究では,キーワードにより該当するデータのみを抽出する検索可能秘密分散方式を提案する.Confidential data should be encrypted in out-sourcing services in cloud computing environment in order to minimize the risk of data revealing. There have been many schemes, classified as searchable encryption, which provides capabilities to securely search over encrypted data through keywords without decryption key. In this paper, we try to combine the technique of searchable encryption with a secret sharing scheme that allows us to retrieve the portion of confidential data without recovering data.

    CiNii Research

    researchmap

  • Privacy-preserving Logistic Regression Analysis for Vertically Partitioned Data

    28   1 - 4   2014

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • When and why do users of membership card feel privacy violations?

    小松 孝徳, 菊池 浩明

    人工知能学会全国大会論文集   28   1 - 4   2014

     More details

    Language:Japanese   Publisher:人工知能学会  

    CiNii Research

    researchmap

  • On the Privacy Issues in Lifelog and Privacy-Preserving Data Mining

    KIKUCHI Hiroaki

    Technical report of IEICE. ISEC   113 ( 326 )   35 - 38   2013.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    "Big Data" allows us to discover a useful knowledge discovered from daily scanning sensor data and the large-scale transaction logs. In this talk, we study several risks to be re-identification of anonymized data set. Additionally, we discuss the use of the privacy-preserving data mining protocols that allows data-miner to retrieve knowledge without disclosing the privacy of data owner.

    CiNii Research

    researchmap

  • On the Risk of DNS Cache Vulnerability "Ghost Domain Name"

    KIKUCHI Hiroaki, ARIMIZU Tomohiro

    IEICE technical report. Information and communication system security   113 ( 288 )   9 - 12   2013.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We study the vulnerability in domain name system, so called as "Ghost domain names" , which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies the latest status of the attack based on the experimental results on open DNS servers.

    CiNii Research

    researchmap

  • Privacy-Preserving Propensity Score Matching for Evaluation of Outcomes Using the DPC Dataset

    2013 ( 4 )   110 - 117   2013.10

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm

    Masayuki Ohrui, Hiroaki Kikuchi, NurRohmanRosyid, Masato Terada

    54 ( 9 )   2013.9

     More details

    Language:English  

    CiNii Research

    researchmap

  • Time Zone Analysis on IIJ Network Traffic for Malicious Botnet Activities

    SISAAT Khamphao, KIKUCHI Hiroaki, KITTITORNKUN Surin, YUKONHIATOU Chaxiong, TERADA Masato, ISHII Hiroshi

    113 ( 138 )   373 - 380   2013.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Many of recent cyber-attacks are being lunched by botnets for the purpose of carrying out large scale cyber-attacks such as DDoS, spam email, network scanning, and so on. In many cases, these botnets consist of a lot of bots or compromised PCs, which have been infected by specific malware. These bots try to propagate themselves into other victim via the multiple C&C servers in the Internet, which are controlled by a remote botmaster. This makes it more difficult to identify botnet attacks and harder to trace the source country/IP address of the botmaster. To identify the C&C servers during malware/bot downloading phase, time zone correlation can be used as a tool to identify the time zone of the C&C servers. In this paper, we do a time zone correlation analysis with the malware download up to 100 honeypots in the IIJ MITF (Internet Ini-tiative Japan - Malware Investigation Task Force) Dataset 2012 comprising over 30 million data records and almost 5 hundreds unique malware names. Baesd on GeoIP service, a time zone correlation model has been proposed to determine the correlation coefficient between malware dwnloads from Japan and other countries. We found a strong correlation between ac-tive bot downloads and time zone of the C&C servers. As a result, our model confirmts that malware/bot downloads are synchronized with time zone (country) of the corresponding C&C servers.

    CiNii Research

    researchmap

  • Time Zone Analysis on IIJ Network Traffic for Malicious Botnet Activities

    SISAAT Khamphao, KIKUCHI Hiroaki, KITTITORNKUN Surin, YUKONHIATOU Chaxiong, TERADA Masato, ISHII Hiroshi

    Technical report of IEICE. ISEC   113 ( 135 )   373 - 380   2013.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Many of recent cyber-attacks are being lunched by botnets for the purpose of carrying out large scale cyber-attacks such as DDoS, spam email, network scanning, and so on. In many cases, these botnets consist of a lot of bots or compromised PCs, which have been infected by specific malware. These bots try to propagate themselves into other victim via the multiple C&C servers in the Internet, which are controlled by a remote botmaster. This makes it more difficult to identify botnet attacks and harder to trace the source country/IP address of the botmaster. To identify the C&C servers during malware/bot downloading phase, time zone correlation can be used as a tool to identify the time zone of the C&C servers. In this paper, we do a time zone correlation analysis with the malware download up to 100 honeypots in the IIJ MITF (Internet Ini-tiative Japan - Malware Investigation Task Force) Dataset 2012 comprising over 30 million data records and almost 5 hundreds unique malware names. Baesd on GeoIP service, a time zone correlation model has been proposed to determine the correlation coefficient between malware dwnloads from Japan and other countries. We found a strong correlation between ac-tive bot downloads and time zone of the C&C servers. As a result, our model confirmts that malware/bot downloads are synchronized with time zone (country) of the corresponding C&C servers.

    CiNii Research

    researchmap

  • The Case Study of Privacy-Preserving Data Mining without Common Identification from the JPHC Study Data Set

    IKUJI SHIGETA, KAWAMURA MAKOTO, UOZUMI TAKASHI, AZUMA TAKAMI, KIKUCHI HIROAKI, INOUE MANAMI

    113 ( 138 )   387 - 394   2013.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In the fields of medical information, an integration of the multiple data sets will lead more accu-rate and effective results in comparison to the research using one data set. Medical information integration has a risk of disclosure of confidential information and hence datasets don't have the common identification information in order to reduce possible risk factor to determine the identity of an individual. In this paper, we will examine the condition of privacy-preserving data mining for the actual cohort, studied in the National Cancer Center. We study the necessary condition for data sets without common identification information to be integrated and generating more accurate and effective results.

    CiNii Research

    researchmap

  • Time Zone Analysis on IIJ Network Traffic for Malicious Botnet Activities

    2013 ( 55 )   1 - 8   2013.7

     More details

    Language:English  

    CiNii Research

    researchmap

  • Time Zone Analysis on IIJ Network Traffic for Malicious Botnet Activities

    2013 ( 55 )   1 - 8   2013.7

     More details

    Language:English  

    CiNii Research

    researchmap

  • ビッグデータ時代を支えるセキュリティ・プライバシー保護技術論文小特集の発行にあたって

    菊池 浩明

    電子情報通信学会論文誌. A, 基礎・境界 = The transactions of the Institute of Electronics, Information and Communication Engineers. A   96 ( 4 )   137 - 138   2013.4

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    CiNii Research

    researchmap

  • Template-protecting Biometric Authentication Using Oblivious Evaluation of Feature Value Function with Fuzzy Polynomial

    53 ( 9 )   2254 - 2266   2012.9

     More details

  • Report on IFIP TM 2012

    2012 ( 45 )   1 - 6   2012.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Report on IFIP TM 2012

    KIKUCHI HIROAKI, BASU ANIRBAN

    Technical report of IEICE. ISEC   112 ( 126 )   301 - 306   2012.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    IFIPTM annual conferences aim to share research outcomes to the problems in computational trust and trust management, including the related security and privacy issues; and to identify new issues and directions for future research. IFIPTM 2012 was held in Sardar Vallabhbhai National Institute of Technology in Surat, India between May 21 and May 24. This article reports the talks and topics in the conference.

    CiNii Research

    researchmap

  • Report on IFIP TM 2012

    KIKUCHI HIROAKI, BASU ANIRBAN

    電子情報通信学会技術研究報告. EMM, マルチメディア情報ハイディング・エンリッチメント = IEICE technical report. EMM, Enriched multimedia   112 ( 129 )   301 - 306   2012.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    IFIPTM annual conferences aim to share research outcomes to the problems in computational trust and trust management, including the related security and privacy issues; and to identify new issues and directions for future research. IFIPTM 2012 was held in Sardar Vallabhbhai National Institute of Technology in Surat, India between May 21 and May 24. This article reports the talks and topics in the conference.

    CiNii Research

    researchmap

  • Report on IFIP TM 2012

    KIKUCHI HIROAKI, BASU ANIRBAN

    IEICE technical report. Information and communication system security   112 ( 128 )   301 - 306   2012.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    IFIPTM annual conferences aim to share research outcomes to the problems in computational trust and trust management, including the related security and privacy issues; and to identify new issues and directions for future research. IFIPTM 2012 was held in Sardar Vallabhbhai National Institute of Technology in Surat, India between May 21 and May 24. This article reports the talks and topics in the conference.

    CiNii Research

    researchmap

  • Report on IFIP TM 2012

    2012 ( 45 )   1 - 6   2012.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Report on IFIP TM 2012

    KIKUCHI HIROAKI, BASU ANIRBAN

    IEICE technical report. Social Implications of Technology and Information Ethics   112 ( 127 )   301 - 306   2012.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    IFIPTM annual conferences aim to share research outcomes to the problems in computational trust and trust management, including the related security and privacy issues; and to identify new issues and directions for future research. IFIPTM 2012 was held in Sardar Vallabhbhai National Institute of Technology in Surat, India between May 21 and May 24. This article reports the talks and topics in the conference.

    CiNii Research

    researchmap

  • ICT to Vitalize Japan : 9. Information Security That Keeps Your Chin Up

    Hiroaki KIKUCHI

    IPSJ Magazine   53 ( 4 )   387 - 389   2012.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Privacy-Preserving Epidemic Analysis on Risk of H. Pylori

    26   1 - 4   2012

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Principal Component Analysis of Botnet Takeover

    Hiroaki Kikuchi, Shuji Matsuo, Masato Terada

    52 ( 9 )   2738 - 2747   2011.9

     More details

  • Perfect Privacy-preserving Automated Trust Negotiation

    Tangtisanon Pikulkaew, Hiroaki Kikuchi

    52 ( 9 )   2697 - 2708   2011.9

     More details

  • "I" Report : International Workshop on Security IWSEC 2010 : Organizing International Conference from Japan

    Hiroaki KIKUCHI

    IPSJ Magazine   52 ( 8 )   1030 - 1033   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

    Ando Shingo, Terada Masato, Kikuchi Hiroaki, Chao Jinhui

    IEICE technical report. Social Implications of Technology and Information Ethics   111 ( 124 )   205 - 210   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In order to protect the web malware activities such as called a &#039;Gumblar&#039;, which uses Website manipulation to automatically lead users to go to a malware download site, it is necessary to improve the countermeasure environment. To solve this problem, we propose a method to detect malicious websites by watching the depth and width of links in home page. This paper described the overview of malicious websites detection system by transition of communications based on unauthorized redirection. Also, we evaluated effectiveness of the proposed method by using the prototype system we have implemen...

    CiNii Research

    researchmap

  • Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

    Ando Shingo, Terada Masato, Kikuchi Hiroaki, Chao Jinhui

    IEICE technical report   111 ( 126 )   205 - 210   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In order to protect the web malware activities such as called a &#039;Gumblar&#039;, which uses Website manipulation to automatically lead users to go to a malware download site, it is necessary to improve the countermeasure environment. To solve this problem, we propose a method to detect malicious websites by watching the depth and width of links in home page. This paper described the overview of malicious websites detection system by transition of communications based on unauthorized redirection. Also, we evaluated effectiveness of the proposed method by using the prototype system we have implemen...

    CiNii Research

    researchmap

  • Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

    2011 ( 32 )   1 - 6   2011.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

    ANDO Shingo, TERADA Masato, KIKUCHI Hiroaki, CHAO Jinhui

    IEICE technical report   111 ( 123 )   205 - 210   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In order to protect the web malware activities such as called a &#039;Gumblar&#039;, which uses Website manipulation to automatically lead users to go to a malware download site, it is necessary to improve the countermeasure environment. To solve this problem, we propose a method to detect malicious websites by watching the depth and width of links in home page. This paper described the overview of malicious websites detection system by transition of communications based on unauthorized redirection. Also, we evaluated effectiveness of the proposed method by using the prototype system we have implemented.

    CiNii Research

    researchmap

  • Privacy-Preserving Protocol for Epidemiology in Effect of Radiation

    SATO TOMOKI, KIKUCHI HIROAKI, SAKUMA JUN

    Technical report of IEICE. ISEC   111 ( 123 )   159 - 164   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    This paper studies privacy issues in epidemiologies that aims to clarify statistical significant of interested attribute that is distributed into two independent parties. The first proposed protocol computes the size of intersection of two subsets, e.g., set of workers in risk of radiation effect and set of dead people in a period of time, without revealing any of element of set. The second proposed protocol allows to perform a hypothesis test without revealing the size of intersections of two subsets. The performance of the proposed scheme are evaluated based on trial implementation.

    CiNii Research

    researchmap

  • Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

    2011 ( 32 )   1 - 6   2011.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Privacy-Preserving Protocol for Epidemiology in Effect of Radiation

    SATO TOMOKI, KIKUCHI HIROAKI, SAKUMA JUN

    IEICE technical report   111 ( 126 )   159 - 164   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    This paper studies privacy issues in epidemiologies that aims to clarify statistical significant of interested attribute that is distributed into two independent parties. The first proposed protocol computes the size of intersection of two subsets, e.g., set of workers in risk of radiation effect and set of dead people in a period of time, without revealing any of element of set. The second proposed protocol allows to perform a hypothesis test without revealing the size of intersections of two subsets. The performance of the proposed scheme are evaluated based on trial implementation.

    CiNii Research

    researchmap

  • Privacy-Preserving Protocol for Epidemiology in Effect of Radiation

    SATO TOMOKI, KIKUCHI HIROAKI, SAKUMA JUN

    IEICE technical report. Information and communication system security   111 ( 125 )   159 - 164   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    This paper studies privacy issues in epidemiologies that aims to clarify statistical significant of interested attribute that is distributed into two independent parties. The first proposed protocol computes the size of intersection of two subsets, e.g., set of workers in risk of radiation effect and set of dead people in a period of time, without revealing any of element of set. The second proposed protocol allows to perform a hypothesis test without revealing the size of intersections of two subsets. The performance of the proposed scheme are evaluated based on trial implementation.

    CiNii Research

    researchmap

  • Proposal of Malicious Websites Detection System by Transition of Communications based on Unauthorized Redirection

    Ando Shingo, Terada Masato, Kikuchi Hiroaki, Chao Jinhui

    IEICE technical report. Information and communication system security   111 ( 125 )   205 - 210   2011.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In order to protect the web malware activities such as called a &#039;Gumblar&#039;, which uses Website manipulation to automatically lead users to go to a malware download site, it is necessary to improve the countermeasure environment. To solve this problem, we propose a method to detect malicious websites by watching the depth and width of links in home page. This paper described the overview of malicious websites detection system by transition of communications based on unauthorized redirection. Also, we evaluated effectiveness of the proposed method by using the prototype system we have implemen...

    CiNii Research

    researchmap

  • 印象に残りやすい日本語パスワードの合成法について

    佐藤智貴, 長谷川真也, 鴨志田芳典, 菊池浩明

    全国大会講演論文集   2011 ( 1 )   527 - 529   2011.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    概要: パスワードは最も基本的な利用者認証方式である.印象に残りやすいパスワードを生成するには様々なノウハウがあり,機械的に生成する決定打はない.そこで,この研究では,日本語の文法違反を引き起こすと違和感を感じる事象に着目し,Google N-gramデータベースを単語出現頻度を考慮した生成方式を提案し,記憶力の差を定量的に評価する.

    CiNii Research

    researchmap

  • 入退出管理エージェントシステムの開発

    田中隼人, 二之形裕貴, 青木良樹, 菊池浩明

    全国大会講演論文集   2011 ( 1 )   341 - 343   2011.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    我々の日常生活の様々な行為を電子的に記録して,生活週間の改善などに改善しようとするライフログの活用が始まっている.我々は,赤外線センサーを活用して,研究室に入退出する人の動きを自動的に記録するシステムを開発した.本稿では,そのシステム設計とセンサーの検知感度についての実験結果を報告する.

    CiNii Research

    researchmap

  • Time-Country Analysis in downloading botnet malware Why are attacks from India synchronized with Japanese local time?

    松尾峻治, 菊池浩明, 寺田真敏, 藤原将志

    情報処理学会研究報告(CD-ROM)   2010 ( 5 )   2011

  • Time-Country Analysis in downloading botnet malware Why are attacks from India synchronized with Japanese local time?

    Shunji Matsuo, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara

    IPSJ SIG Notes   2010 ( 12 )   1 - 7   2010.12

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    The botnet controls malware downloading servers distributed in to make abroad, download of malware is performed in the time of the target country. In the study, I analyze source addresses of attack data of CCC Dataset and found the correlation between active time for downloading and the time zone in which source address belong to. We propose a method to estimate The phase shift between the time observed and local time in countries.

    CiNii Research

    researchmap

  • Principal Component Analysis of Port-scans for Reduction of Distributed Sensors

    Hiroaki Kikuchi, Masato Terada

    51 ( 9 )   1659 - 1669   2010.9

     More details

    Language:English  

    CiNii Research

    researchmap

  • Application and Evaluation of Synthesized Sentences

    鴨志田 芳典, 菊池 浩明

    ファジィシステムシンポジウム講演論文集   26   1069 - 1074   2010.9

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    DOI: 10.14864/fss.26.0.245.0

    CiNii Research

    researchmap

  • Heuristics for Detecting Botnet Coordinated Attacks

    51 ( 9 )   1600 - 1609   2010.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • We Are the Scanners(The Heisei 21 IPSJ Outstanding Paper Award)

    KIKUCHI Hiroaki

    IPSJ Magazine   51 ( 7 )   884 - 884   2010.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Improvement of privacy in distributed asynchronous secure k-means clustering scheme

    青木 良樹, 菊池 浩明

    IEICE technical report   110 ( 113 )   309 - 314   2010.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Research

    researchmap

  • Improvement of privacy in distributed asynchronous secure k-means clustering scheme

    青木 良樹, 菊池 浩明

    IEICE technical report   110 ( 115 )   309 - 314   2010.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Research

    researchmap

  • Improvement of privacy in distributed asynchronous secure k-means clustering scheme

    青木 良樹, 菊池 浩明

    IEICE technical report   110 ( 114 )   309 - 314   2010.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Research

    researchmap

  • Improvement of privacy in distributed asynchronous secure k-means clustering scheme

    AOKI YOSHIKI, KIKUCHI HIROAKI

    研究報告コンピュータセキュリティ(CSEC)   2010 ( 49 )   1 - 6   2010.6

     More details

    Language:Japanese   Publisher:情報処理学会  

    近年のクラウドコンピューティング技術や,携帯デバイス,ライフログの普及に伴い,多くの情報が電子化され管理されている.これらの情報をもとにして,利用者の嗜好に応じた商品を推薦する情報推薦サービスなども利用が著しい.しかし,これらのサービスはプライバシの保護という課題がある.佐久間らはユーザのプライバシを保護したまま,k-means を行う手法を提案している.本論文では,この佐久間らが提案した方式をもとに,非同期かつ平均を秘匿したままクラスタリングを行う方式を提案する.Information recommendation is one of the attractive applications in the age of ubiquitous computing where user&#039;s profiles and life-logs are digitally stored in cloud computing server. However, the privacy concern is current issue to study. Sakuma proposed a privacy-preserving clustering scheme according k-means algorithm without revealing privacy of hidden profile. Our paper studies the feasibility of privacy-preserving scheme due to Sakuma and reports some modified protocol with light-weight overhead.

    CiNii Research

    researchmap

  • Malware : Foreword

    TERADA Masato, KIKUCHI Hiroaki

    IPSJ Magazine   51 ( 3 )   235 - 236   2010.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • 2G-1 An Experimental Evaluation of Distinguishability with Word-Spams Synthesized by Markov Chain

    Kamoshida Yoshifumi, Kikuchi Hiroaki

    全国大会講演論文集   72 ( 3 )   "3 - 581"-"3-582"   2010.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Heuristics for Detecting Botnet Coordinated Attacks

    Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara

    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS   51 ( 9 )   603 - 607   2010

  • A discussion on asymmetric biometric authentication based on G3C-ZKIP

    ODA MASAHIRO, WATANABE YOSHIMASA, YAMAMOTO TAKUMI, OGATA WAKAHA, KIKUCHI HIROAKI, NISHIGAKI MASAKATSU

    ITE Technical Report   33 ( 54 )   53 - 56   2009.12

     More details

    Language:Japanese   Publisher:一般社団法人映像情報メディア学会  

    Asymmetric biometric authentications using zero knowledge interactive proof (ZKIP) that proves user&#039; authenticity without revealing user&#039;s biometric data have been proposed. We have proposed an asymmetric biometric authentication based on graph 3-colorablity (G3C) and zero knowledge interactive proof for G3C (G3C-ZKIP). In this paper, as an attempt to improve its authentication protocol&#039;s security, we try to generate a hard instance of G3C using embedding graph method.

    DOI: 10.11485/itetr.33.54.0_53

    CiNii Research

    researchmap

  • Private List Matching Protocol and its Application

    KIKUCHI Hiroaki, KAGAWA Daisuke

    IEICE technical report. Information and communication system security   109 ( 33 )   33 - 36   2009.5

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    We may collaborate with someone with common preference in particular fields, e.g., sharing, exchange useful information on job-hunting. However, we have to expose our private list of preferred items in advance to figure out who has the same preference to us. Freedman et al. presented a protocol for private list matching without revealing private lists. It is not sure if their proposed method is feasible to practical applications because its performance is not clarified well. Our paper studies the evaluation of their protocol base on experimental implementation.

    CiNii Research

    researchmap

  • Estimation of Increase of Scanners Based on ISDAS Distributed Sensors

    Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi

    49 ( 9 )   3136 - 3145   2008.9

     More details

    Language:English  

    CiNii Research

    researchmap

  • Automated Port-scan Classification with Decision Tree and Distributed Sensors

    Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew

    49 ( 9 )   3146 - 3156   2008.9

     More details

  • A mathematical model of trust and its application to security

    24   393 - 397   2008.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Estimation of Increase of Scanners Based on ISDAS Distributed Sensors (特集 安心・安全な社会基盤を実現するコンピュータセキュリティ技術) -- (侵入検出・検知)

    Kikuchi Hiroaki, Terada Masato, Fukuno Naoya

    情報処理学会論文誌 論文誌ジャーナル   49 ( 9 )   3136 - 3145   2008.9

     More details

    Language:English   Publisher:情報処理学会  

    CiNii Research

    researchmap

  • 2ZB-3 CME-Fingerprint Authentication Algorithm Using Common Minutiae Extractor

    Konishi Toru, Aoki Yoshiki, Nagai Kei, Kikuchi Hiroaki

    全国大会講演論文集   70 ( 3 )   "3 - 405"-"3-406"   2008.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Automatic Melody Composition System with Harmony and linguistic information of the Lyrics

    SHIRAISHI Yutaka, KAN Hidetoshi, UCHIDA Osamu, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    全国大会講演論文集   70 ( 0 )   443 - 444   2008.3

     More details

    Language:Japanese  

    Many automatic melody composition systems have been proposed. In these systems, it is desired that popular song and lyrics are closely related each other. So, we propose automatic melody composition system using the linguistic information and the musical information which extracting from optional Japanese Lyrics, in this paper.

    CiNii Research

    researchmap

  • Study for the classification of malware by infection activities

    FUJIWARA Masashi, TERADA Masato, ABE Tetsuya, KIKUCHI Hiroaki

    IPSJ SIG Notes   2008 ( 21 )   177 - 182   2008.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    The requirements of investigation reports about activities such as infection behavior and trend are increasing. The purpose of this research is in the support of the investigation concerning the infection activity by showing a concrete examination method of the malware that does the infection activity through the network, and showing the result of the investigation based on the method. In this paper, we describe the investigation result of the infection activities based on the data collected by Nepenthes that collects the malware.

    CiNii Research

    researchmap

  • Study for the classification of malware by infection activities

    Fujiwara Masashi, Terada Masato, Abe Tetsuya, Kikuchi Hiroaki

    IPSJ SIG Notes   2008 ( 21 )   177 - 182   2008.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    The requirements of investigation reports about activities such as infection behavior and trend are increasing. The purpose of this research is in the support of the investigation concerning the infection activity by showing a concrete examination method of the malware that does the infection activity through the network, and showing the result of the investigation based on the method. In this paper, we describe the investigation result of the infection activities based on the data collected by Nepenthes that collects the malware.

    CiNii Research

    researchmap

  • Remote Host Fingerprinting based on Clock Skew

    Hiroaki Kikuchi, Yuki Tominaga, Yu Tanaka

    2008 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES   70 ( 3 )   225 - 227   2008

     More details

  • Visualization of the commands and responses of botnets focused on the synchronization of packet transmission

    仲小路博史, 川口信隆, 鬼頭哲郎, 小堀智弘, 菊池浩明, 寺田真敏

    情報処理学会シンポジウム論文集   2008 ( 8 )   2008

  • Consideration from the Viewpoint of Social Layer about the Distribution of Malicious Hosts on the Internet

    KITO Tetsuro, NAKAKOJI Hirofumi, TERADA Masato, KIKUCHI Hiroaki

    IPSJ SIG Notes   2007 ( 71 )   259 - 264   2007.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the information of social layer such as the geographical area of hosts and access time.

    CiNii Research

    researchmap

  • Orthogonal expansion of port-scan packets

    KOBORI Tomohiro, KIKUCHI Hiroaki, TERADA Masato

    IPSJ SIG Notes   2007 ( 71 )   251 - 257   2007.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Observation of port-scan packets performed over the Internet is involved with so many parameters including time, port numbers, source and destination addresses. There are some common port numbers to which many malicious codes likely use to scan, but a relationship between port numbers and the malicious codes are not clearly identified. In this paper, we propose a new attempt to figure characteristics of port-scans observed from distributed many sensors. Our method allows 1) analysis of sensors with few significiant factors extracted from an orthogonal expansion of port-scan packets, rather ...

    CiNii Research

    researchmap

  • ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol(Security,<Special Issue>Multimedia, Distributed, Cooperative and Mobile (DICOMO2006))

    NAGAI KEI, KIKUCHI HIROAKI, OGATA WAKAHA, NISHIGAKI MASAKATSU

    IPSJ Journal   48 ( 7 )   2307 - 2318   2007.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We propose a cryptographical protocol for remote biometrics authentication without revealing private biometrics data to verifier. Our protocol uses a neural network for dealing with uncertainty of biometric data, and a zero-knowledge interactive proof for valid user. In this paper, we evaluate the performance and the accuracy of the proposed protocol based on sample implementation system. Several algorithms for features extraction of fingerprint data are examined in terms of false acceptance and rejection ratios.

    CiNii Research

    researchmap

  • Orthogonal expansion of port-scan packets

    KOBORI Tomohiro, KIKUCHI Hiroaki, TERADA Masato

    IEICE technical report   107 ( 141 )   43 - 49   2007.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Observation of port-scan packets performed over the Internet is involved with so many parameters including time, port numbers, source and destination addresses. There are some common port numbers to which many malicious codes likely use to scan, but a relationship between port numbers and the malicious codes are not clearly identified. In this paper, we propose a new attempt to figure characteristics of port-scans observed from distributed many sensors. Our method allows 1) analysis of sensors with few significiant factors extracted from an orthogonal expansion of port-scan packets, rather than taking care of all possible statistics of port numbers, 2) compression of packets data, computed by linear combination of limited number of orthogonal factors, and 3) approximation of number of scanning packets at arbitrarly specified sensor and ports, made from statistical correlation between port numbers. We also evaluate the accuracy of our proposed approximation algorithm based on actually observed packets.

    CiNii Research

    researchmap

  • Consideration from the Viewpoint of Social Layer about the Distribution of Malicious Hosts on the Internet

    KITO Tetsuro, NAKAKOJI Hirofumi, TERADA Masato, KIKUCHI Hiroaki

    IEICE technical report   107 ( 141 )   51 - 56   2007.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the information of social layer such as the geographical area of hosts and access time.

    CiNii Research

    researchmap

  • On a Secure Function Evaluation for Comparator Networks

    CHIDA Koji, KIKUCHI Hiroaki, MOROHASHI Gembu, HIROTA Keiichi

    IEICE technical report. WBS, Wideband System   106 ( 599 )   53 - 58   2007.3

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    A multiparty protocol for various computations using comparator networks such as sorting and searching is proposed. In the execution of the protocol, all input values to a comparator network and the intermediate output from each comparator are kept secret assuming the presence of an honest majority. Possible application areas for the proposed protocol include statistical analysis and (M+1)-st price auction, which decides M successful bidders for (M+1)-st highest bids, while preserving the privacy of respondents and bidders.

    CiNii Research

    researchmap

  • On a Secure Function Evaluation for Comparator Networks

    CHIDA Koji, KIKUCHI Hiroaki, MOROHASHI Gembu, HIROTA Keiichi

    IEICE technical report. Information theory   106 ( 595 )   53 - 58   2007.3

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    A multiparty protocol for various computations using comparator networks such as sorting and searching is proposed. In the execution of the protocol, all input values to a comparator network and the intermediate output from each comparator are kept secret assuming the presence of an honest majority. Possible application areas for the proposed protocol include statistical analysis and (M+1)-st price auction, which decides M successful bidders for (M+1)-st highest bids, while preserving the privacy of respondents and bidders.

    CiNii Research

    researchmap

  • On a Secure Function Evaluation for Comparator Networks

    CHIDA Koji, KIKUCHI Hiroaki, MOROHASHI Gembu, HIROTA Keiichi

    Technical report of IEICE. ISEC   106 ( 597 )   53 - 58   2007.3

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    A multiparty protocol for various computations using comparator networks such as sorting and searching is proposed. In the execution of the protocol, all input values to a comparator network and the intermediate output from each comparator are kept secret assuming the presence of an honest majority. Possible application areas for the proposed protocol include statistical analysis and (M+1)-st price auction, which decides M successful bidders for (M+1)-st highest bids, while preserving the privacy of respondents and bidders.

    CiNii Research

    researchmap

  • Research of Sensor Independently Using Malicious Access Traffic

    Fukuno Naoya, Kikuchi Hiroaki, Terada Masato, Doi Norihisa

    CSEC36, 2007   2007 ( 16 )   95 - 102   2007.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Observations of packets sent over the Internet with distributed sensors have been widely attempted in order to estimate and analyze the characteristics of intrusions. The accuracy of estimation, however, depends on the distribution sensors. In this paper, we propose a new method for analyzing independence of sensors given statistics of port, source-IPaddress and sensors based on the scan logs observed by JPCERT/CC and our own sensors using the TF-IDF (Term Frequency - Inverse Document Frequency) and PCA (Principal Component Anaysis) and evaluate the propose method.

    CiNii Research

    researchmap

  • Research of Sensor Independently Using Malicious Access Traffic

    Fukuno Naoya, Kikuchi Hiroaki, Terada Masato, Doi Norihisa

    IPSJ SIG Notes   2007 ( 16 )   95 - 102   2007.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Observations of packets sent over the Internet with distributed sensors have been widely attempted in order to estimate and analyze the characteristics of intrusions. The accuracy of estimation, however, depends on the distribution sensors. In this paper, we propose a new method for analyzing independence of sensors given statistics of port, source-IPaddress and sensors based on the scan logs observed by JPCERT/CC and our own sensors using the TF-IDF (Term Frequency - Inverse Document Frequency) and PCA (Principal Component Anaysis) and evaluate the propose method.

    CiNii Research

    researchmap

  • イノベーション・ジャパン2006-大学見本市-出展報告

    菊池 浩明

    知能と情報 : 日本知能情報ファジィ学会誌 : journal of Japan Society for Fuzzy Theory and Intelligent Informatics   19 ( 1 )   89 - 91   2007.2

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    CiNii Research

    researchmap

  • Zero-knowledge interactive proofs for proving nearness of biometrics and its application

    OGATA Wakaha, KIKUCHI Hiroaki, NISHIGAKI Masakatsu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   29 ( 1 )   319 - 322   2006.11

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • ファジィ真理値の双束について : FI同値類

    菊池 浩明

    ファジィシステムシンポジウム講演論文集   22   779 - 784   2006.9

     More details

    Language:English   Publisher:日本知能情報ファジィ学会  

    CiNii Research

    researchmap

  • Online Certification Status Verification with a Red-Black Hash Tree

    Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi

    IPSJ journal   47 ( 8 )   2477 - 2487   2006.8

     More details

    Language:English   Publisher:Information Processing Society of Japan (IPSJ)  

    Certificate revocation is a critical issue for a practical, public-key infrastructure. A new efficient revocation protocol using a one-way hash tree structure (instead of the classical list structure, which is known as a standard for revocation) was proposed and examined to reduce communication and computation costs. A tree approach, however, may run in О(n) time, in the worst case, i.e., when all the entries are sorted in descending order. A red-black tree is a binary sorted tree, with one extra bit per node, which is used for balancing the tree and guarantees that search and insertion operations take Ο(logn), even in the worst case. In this paper, we propose a binary red-black hash tree for certificate revocation and prove that it reduces costs more than any other tree balancing approache. We also compare the estimated communication and computation cost reductions of the red-black hash tree to those of the conventional binary search tree.

    CiNii Research

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00067740/

  • Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet

    FUKUNO Naoya, KOBORI Tomohiro, KIKUCHI Hiroaki, TERADA Masato, DOI Norihisa

    IPSJ SIG Notes   2006 ( 81 )   299 - 304   2006.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Computer virus and worms perform randomly spyware and port-scanning to find a vulnerability in the Internet. The fraction of malicious behaviors varies, e.g, some host performs scan contentionally and some host scans uniformly over the IP address blocks. In this paper, First, we analysis a set of source addresses observed by distributed sensors in ISDAS from a &quot;macro&quot; view point. Second, we examine behaviors of from &quot;micro&quot; perspective. Finally, we study a new mathematical model for malicious hosts based on these analysis.

    CiNii Research

    researchmap

  • Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet

    FUKUNO Naoya, KOBORI Tomohiro, KIKUCHI Hiroaki, TERADA Masato, DOI Norihisa

    Technical report of IEICE. ISEC   106 ( 176 )   69 - 74   2006.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Computer virus and worms perform randomly spyware and port-scanning to find a vulnerability in the Internet. The fraction of malicious behaviors varies, e.g, some host performs scan contentionally and some host scans uniformly over the IP address blocks. In this paper, First, we analysis a set of source addresses observed by distributed sensors in ISDAS from a &quot;macro&quot; view point. Second, we examine behaviors of from &quot;micro&quot; perspective. Finally, we study a new mathematical model for malicious hosts based on these analysis.

    CiNii Research

    researchmap

  • 個人情報保護 ネットワークセキュリティと個人情報保護

    菊池 浩明

    JISA会報   ( 81 )   39 - 47   2006.4

     More details

    Language:Japanese   Publisher:情報サービス産業協会  

    CiNii Research

    researchmap

  • Estimation of a Number of Malicious Hosts Based on the Scan Logs Observed by Internet Scan Data Acquisition System

    Kikuchi Hiroaki, Fukuno Naoya, Terada Masato, Kikuchi Daisuke, Doi Norihisa

    IPSJ SIG Notes   2006 ( 26 )   109 - 116   2006.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    In this paper, based on the scan logs observed by JPCERT/CC Internet Scan Data Acquisition System (ISDAS), we try to exactly estimate a number of maliscious hosts which are infected with worm or computer virus in the Internet.

    CiNii Research

    researchmap

  • Estimation of a Number of Malicious Hosts Based on the Scan Logs Observed by Internet Scan Data Acquisition System

    KIKUCHI Hiroaki, FUKUNO Naoya, TERADA Masato, KIKUCHI Daisuke, DOI Norihisa

    IPSJ SIG Notes   2006 ( 26 )   109 - 116   2006.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    In this paper, based on the scan logs observed by JPCERT/CC Internet Scan Data Acquisition System (ISDAS), we try to exactly estimate a number of maliscious hosts which are infected with worm or computer virus in the Internet.

    CiNii Research

    researchmap

  • Virtual and Real Presence Information Integrated with RFID and Instant Messaging Agent

    NAKAMURA Yuichi, KIKUCHI Hiroaki

    IPSJ SIG Notes   2006 ( 26 )   25 - 30   2006.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We developed a presence information management system which uses RFID and instant messaging agent as a representative &quot;push&quot; type communication. With our system, noticing dual online status in both real and virtual spaces, a better quality of user support is provided.

    CiNii Research

    researchmap

  • Virtual and Real Presence Information Integrated with RFID and Instant Messaging Agent

    Nakamura Yuichi, Kikuchi Hiroaki

    IPSJ SIG Notes   2006 ( 26 )   25 - 30   2006.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We developed a presence information management system which uses RFID and instant messaging agent as a representative &quot;push&quot; type communication. With our system, noticing dual online status in both real and virtual spaces, a better quality of user support is provided.

    CiNii Research

    researchmap

  • RIN-XML Signature Tool which Enables Ring Signature to Guarantee Anonymity

    UEYAMA Mari, KIKUCHI Hiroaki

    IPSJ SIG Notes   2006 ( 26 )   159 - 164   2006.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We implemented a ring signature tool on Java that guarantees anonymity. This tool combines RSA with Schnorr signature to construct a ring signature. We adopt an XML signature format to sign on various objects. In this paper, we show the performance of the tool which proves the practicality of a ring signature.

    CiNii Research

    researchmap

  • RIN-XML Signature Tool which Enables Ring Signature to Guarantee Anonymity

    Ueyama Mari, Kikuchi Hiroaki

    IPSJ SIG Notes   2006 ( 26 )   159 - 164   2006.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We implemented a ring signature tool on Java that guarantees anonymity. This tool combines RSA with Schnorr signature to construct a ring signature. We adopt an XML signature format to sign on various objects. In this paper, we show the performance of the tool which proves the practicality of a ring signature.

    CiNii Research

    researchmap

  • 第1回横幹連合コンファレンスに参加して

    鬼沢 武久, 菊池 浩明

    知能と情報 : 日本知能情報ファジィ学会誌 : journal of Japan Society for Fuzzy Theory and Intelligent Informatics   18 ( 1 )   62 - 63   2006.2

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    DOI: 10.3156/jsoft.18.1_62

    CiNii Research

    researchmap

  • An Efficient Key Management Based on the Subset Difference Method for Secure Contents Distribution(Network Security, <Special Issue>Broadband Ubiquitous Networks and Applications)

    KIKUCHI HIROAKI, NAKAMURA YUICHI

    IPSJ Journal   47 ( 2 )   426 - 433   2006.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    An efficient key management for secure group communications is one of the current issue in wireless ad hoc network with mobile nodes. In order to address the dynamic receiver update operations such as leave or join, Naor, et al. proposed the subset difference (SD). The SD method allows senders to reduce drastically the size of ciphertext to be sent to 2r-1 using a pseudo random number generator, where r is the number of revoked users (who leave the group). In the SD method, the subsets of authorized users are represented by some differences of two subsets such that i covers valid users and ...

    CiNii Research

    researchmap

  • An Efficient Key Management Based on the Subset Difference Method for Secure Contents Distribution

    KIKUCHI HIROAKI, NAKAMURA YUICHI

    IPSJ journal   47 ( 2 )   426 - 433   2006.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    An efficient key management for secure group communications is one of the current issue in wireless ad hoc network with mobile nodes. In order to address the dynamic receiver update operations such as leave or join, Naor, et al. proposed the subset difference (SD). The SD method allows senders to reduce drastically the size of ciphertext to be sent to 2r-1 using a pseudo random number generator, where r is the number of revoked users (who leave the group). In the SD method, the subsets of authorized users are represented by some differences of two subsets such that i covers valid users and j excludes the revoked users in i. To have all subsets (i, j) necessary to cover all valid users in a tree, a sender has to test all possible combinations of revoked users. A naive exhaustive search for the purpose takes O(r^3) time. This is a drawback of the SD method. Hence, to address the issue for finding the cover, we propose a new efficient algorithm to reduce the cost up to O(r log r log n) by introducing the technique for indexing nodes to be dealt with in the necessary subsets. In addition, we implement the proposed algorithm and demonstrate the performance in terms of processing time in this paper.

    CiNii Research

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00010399/

  • Design and Implementation of the Secure Bookmark System

    2005 ( 19 )   427 - 431   2005.11

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • A study of a scenario drawing system of an old tale(<Special Issue>Human and Information Science)

    Kon Seiichi, Yoshida Fumihiko, Uchida Osamu, Kikuchi Hiroaki, Nakanishi Shohachiro

    Proceedings of the School of Information Technology and Electronics, Tokai University   5 ( 1 )   59 - 64   2005.9

     More details

    Language:Japanese   Publisher:東海大学  

    This paper describes the system to rewrite the old tale to scenario story. The scenario consists of three factors &quot;headline,&quot; &quot;Stage direction,&quot; and &quot;Words.&quot; The scenarization system proposed in this paper also consists of three subsystems &quot;headline subsystem,&quot; &quot;stage direction sub system,&quot; and &quot;words subsystem&quot; corresponding to the three factors in scenario story. In headline subsystem, we extract the nouns representing the place and time from the old tale, and make the headline based on these nouns. In words subsystem, we specify the parson who speaks the words from the conversation sentence in old tale, and create the words parts in scenario story. We make the stage direction by applying some rules, in stage direction subsystem. We can create the scenario story by these procedures in three subsystems.

    CiNii Research

    researchmap

  • H-035 An Efficient Approach for Seeking Vitamin D Receptor Response Elements

    Matsumae Hiromi, Fukuoka Yutaka, Inaoka Hidenori, Kikuchi Hiroaki, Yamamoto Keiko, Masuda Tadashi

    情報科学技術フォーラム一般講演論文集   4 ( 2 )   383 - 384   2005.8

     More details

    Language:Japanese   Publisher:FIT(電子情報通信学会・情報処理学会)運営委員会  

    CiNii Research

    researchmap

  • Security Enhancement Preventing Personal Information Disclosure in Web-based Questionnaire(Security and Society, <Special Issue>Research on Computer Security Characterized in the Context of Social Responsibilities)

    NAKAZATO JUNJI, FUJIMOTO KENJI, KIKUCHI HIROAKI

    IPSJ Journal   46 ( 8 )   2068 - 2077   2005.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper proposes a secure protocol for web-based questionnaire that preserves the privacy of responders and ensures the robustness. The proposed protocol is based on secure electronic voting protocol proposed by Cramer et al. with confidentiality and efficiency, which are common requirements for both applications. This paper points out an issue particular in the secure questionnaire, that is, a requirement to deal with a multiple-choice question, and shows that the communication overhead grows exponentially with the number of choices n. To address the issue, the proposed protocol reduces...

    CiNii Research

    researchmap

  • Security Enhancement Preventing Personal Information Disclosure in Web-based Questionnaire

    NAKAZATO JUNJI, FUJIMOTO KENJI, KIKUCHI HIROAKI

    IPSJ journal   46 ( 8 )   2068 - 2077   2005.8

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This paper proposes a secure protocol for web-based questionnaire that preserves the privacy of responders and ensures the robustness. The proposed protocol is based on secure electronic voting protocol proposed by Cramer et al. with confidentiality and efficiency, which are common requirements for both applications. This paper points out an issue particular in the secure questionnaire, that is, a requirement to deal with a multiple-choice question, and shows that the communication overhead grows exponentially with the number of choices n. To address the issue, the proposed protocol reduces the cost from Θ(2^n) to Θ(n). The performance based on the experimental implementation is also shown.

    CiNii Research

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00010566/

  • On Multiple-bit Embedding in Asymmetric Watermark

    OKADA Mitsuo, KIKUCHI Hiroaki

    IPSJ SIG Notes   2005 ( 70 )   415 - 421   2005.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to the achievement of efficient multi-bit embedding for secure digital watermark detection that exposes no secret information to a watermark verifier. Furukawa proposed a secure watermark detection scheme [5] in 2004 using the Paillier encryption, but this method is not suitable for multi-bit embedding due to its heavy overhead in extraction processing time. We proposed a consideration for an efficient multi-bit watermark embedding method.

    CiNii Research

    researchmap

  • On Multiple-bit Embedding in Asymmetric Watermark

    OKADA Mitsuo, KIKUCHI Hiroaki

    IPSJ SIG Notes   2005 ( 70 )   415 - 421   2005.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to the achievement of efficient multi-bit embedding for secure digital watermark detection that exposes no secret information to a watermark verifier. Furukawa proposed a secure watermark detection scheme [5] in 2004 using the Paillier encryption, but this method is not suitable for multi-bit embedding due to its heavy overhead in extraction processing time. We proposed a consideration for an efficient multi-bit watermark embedding method.

    CiNii Research

    researchmap

  • On Multiple-bit Embedding in Asymmetric Watermark

    OKADA Mitsuo, KIKUCHI Hiroaki

    Technical report of IEICE. ISEC   105 ( 194 )   167 - 173   2005.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to the achievement of efficient multi-bit embedding for secure digital watermark detection that exposes no secret information to a watermark verifier. Furukawa proposed a secure watermark detection scheme [5] in 2004 using the Paillier encryption, but this method is not suitable for multi-bit embedding due to its heavy overhead in extraction processing time. We proposed a consideration for an efficient multi-bit watermark embedding method.

    CiNii Research

    researchmap

  • セキュリティとプライバシーの狭間で(連載(インターネットセキュリティ)9)

    菊池 浩明

    経営情報学会誌   13 ( 4 )   101 - 107   2005.3

     More details

    Language:Japanese   Publisher:経営情報学会  

    CiNii Research

    researchmap

  • M-008 The analysis of the number of the unauthorized computer by decentralized observation of the Internet

    Sugiyama Taichi, Kikuchi Daisuke, Terada Masato, Fukuno Naoya, Tanaka Takayuki, Kikuchi Hiroaki, Doi Norihisa

    情報処理学会 FIT2005   4 ( 4 )   231 - 232   2005

     More details

    Language:Japanese   Publisher:FIT(電子情報通信学会・情報処理学会)運営委員会  

    CiNii Research

    researchmap

  • Proof of Signer and Privacy Revocation Protocol in Ring Signature

    KIKUCHI HIROAKI, TADA MINAKO, NAKANISHI SHOHACHIRO

    IPSJ journal   45 ( 8 )   1881 - 1886   2004.8

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    A ring signature is a group signature scheme that allows a member of a group to sign onto the message so that the resulting signature does not reveal their identity to others. A disadvantage of ring signatures is the lack of group administrators who can identify the signer from a given signature when necessary. To address the issue of identification of the signer, we present new protocols for a ring signature. These offer improvements in two functions: 1) proof of signer; a signer is allowed to prove his or her identity when he or she wish to discard anonymity, 2) privacy revocation by revocation managers; a set of managers can identify the signer from a given signature only when they agree to revoke the anonymity. Our construction is based on the protocol of Abe, et al. (2002). The security of the proposed protocol is based on an assumption of the hardness of the discrete logarithm problem and a secure hash function.

    CiNii Research

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00010835/

  • Editor's Message to Special Issues on Computer Security and Privacy Protection

    KIKUCHI H

    IPSJ Journal   45 ( 8 )   1801 - 1801   2004.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Proof of Signer and Privacy Revocation Protocol in Ring Signature(Security Protocols)(<Special Issue>Computer Security and Privacy Protection)

    KIKUCHI HIROAKI, TADA MINAKO, NAKANISHI SHOHACHIRO

    IPSJ Journal   45 ( 8 )   1881 - 1886   2004.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A ring signature is a group signature scheme that allows a member of a group to sign onto the message so that the resulting signature does not reveal their identity to others. A disadvantage of ring signatures is the lack of group administrators who can identify the signer from a given signature when necessary. To address the issue of identification of the signer, we present new protocols for a ring signature. These offer improvements in two functions: 1) proof of signer; a signer is allowed to prove his or her identity when he or she wish to discard anonymity, 2) privacy revocation by revo...

    CiNii Research

    researchmap

  • A Report on the 3rd Annual PKI R&D Workshop

    KOGA Satoshi, KIKUCHI Hiroaki

    IPSJ SIG Notes   2004 ( 75 )   159 - 163   2004.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper reports the 3rd annual PKI R&amp;D workshop, held on April 12-14, 2004 at NIST.

    CiNii Research

    researchmap

  • A Report on the 3rd Annual PKI R&D Workshop

    KOGA Satoshi, KIKUCHI Hiroaki

    Technical report of IEICE. ISEC   104 ( 199 )   159 - 163   2004.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    This paper reports the 3rd annual PKI R&amp;D workshop, held on April 12-14, 2004 at NIST.

    CiNii Research

    researchmap

  • Reduction in Block Noises Using the Vector Synthesis Method in Wartermarking to Digital Audio Data

    SAITO Masayuki, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    IPSJ SIG Notes   2004 ( 22 )   237 - 241   2004.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    In watermarking and steganography, there are mainly two approches to embed a watermark data: frequency domain approch which is resistant to any attacks in the cost of processing time, a time domain approch which is fragile but requires less computing time. The DCT or DFT, which is used to changes a digital audio into the frequency domain, generally, causes a block noise and deteriorats the quality. In order to deal with the issue, Iwakiri proposed a VSM (Vector Synthsis Method), in which wartermrking data on a frequency domain is transrated into a time domain using the MDCT before synthesizing. In this paper, we point out that the VSM causes a smaller block noise than the existing DCT method, and propose a lightweight watermrking method which uses the DCT instead of the MDCT.

    CiNii Research

    researchmap

  • 任意の単調論理関数を証明できるリング署名の提案

    2004年暗号と情報セキュリティシンポジウム(SCIS2004)、電子情報通信学会   pp.1191-1196   2004

     More details

    Jan.2004

    researchmap

  • ユーザの秘密鍵サイズを削減したSD法

    菊池,酒田晋吾

    2004年暗号と情報セキュリティシンポジウム(SCIS2004)、電子情報通信学会   pp.83-87   2004

     More details

    Jan.2004

    researchmap

  • グループ認証プロトコルについて

    2004年暗号と情報セキュリティシンポジウム(SCIS2004)、電子情報通信学会   pp.1427-1429   2004

     More details

    Jan.2004

    researchmap

  • Secure instant messaging protocol preserving confidentiality against administrator

    H Kikuchi, M Tada, S Nakanishi

    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS   pp.27-30   27 - 30   2004

     More details

  • 複数選択複数質問の投票における知識の証明

    菊池浩明

    2004年暗号と情報セキュリティシンポジウム(SCIS2004)、電子情報通信学会   pp.961-964   2004

     More details

  • 自己組織化学習と教師付き学習の融合アルゴリズム

    工藤 陽, 白砂 剛, 菊池 浩明

    ファジィシステムシンポジウム講演論文集   19   353 - 356   2003.9

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    CiNii Research

    researchmap

  • ファジィ言語真理値の代数系について

    菊池 浩明

    ファジィシステムシンポジウム講演論文集   pp.681-683   681 - 683   2003.9

     More details

    Language:English   Publisher:日本知能情報ファジィ学会  

    CiNii Research

    researchmap

  • Secure Instant Messaging Protocol Preserving Confidentiality against Administrator(Network Security)(<Special Issue on Computer Security>Combating Emerging Threats)

    KIKUCHI HIROAKI, TADA MINAKO, NAKANISHI SHOHACHIRO

    IPSJ Journal   44 ( 8 )   2042 - 2050   2003.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper studies a security enhancement of instant messaging service. After the requirements and the assumptions are addressed, a modified Difne-Hellman protocol suitable to instant messaging is presented. The main feature of the proposed protocol is to prevent malicious administrator from intercepting plain message and applying data mining techniques to obtain privacy of end users. From the viewpoint of communication and computational costs, the proposed protocol are evaluated and the comparison of some existing protocols is given. In addition, a trial implementation of secure instant me...

    CiNii Research

    researchmap

  • An Evaluation and Implementation of Electronic Voting System Using Oblivious Counter Protocol on Personal Digital Assistance

    NAKAZATO JUNJI, KIKUCHI HIROAKI, NAKANISHI SHOHACHIRO

    Transactions of Information Processing Society of Japan   44 ( 8 )   1914 - 1912   2003.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We implemented the oblivious counter protocol on a platform of personal digital assistance (PDA), which is able to keep a tally from encrypted ballots without decrypting them. In order to overcome the restricted storage and computational power of PDA, we have developed a Java class, ModInt, which is designed for light-weight arbitrary-precision integer computation and especially for modular arithmetic operations. In this paper, we evaluate the processing time of the system and show a comparison with the built-in class BigInteger.

    CiNii Research

    researchmap

  • Rabin Tree and its Application to Broadcast Encryption

    KIKUCHI Hiroaki

    IPSJ SIG Notes   2003 ( 74 )   9 - 12   2003.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper presents a key management scheme based on Rabin public-key cryptosystem, which minimizes a number of secret key at recipient. A probability that a given random root key would succeed to have a full Rabin tree with 2n-i nodes is proved to be exponential to the number of users n. An application to broadcast encryption which allows excluding faulty recipients is proposed.

    CiNii Research

    researchmap

  • Rabin Tree and its Application to Broadcast Encryption

    KIKUCHI Hiroaki

    Technical report of IEICE. ISEC   103 ( 195 )   9 - 12   2003.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    This paper presents a key management scheme based on Rabin public-key cryptosystem, which minimizes a number of secret key at recipient. A probability that a given random root key would succeed to have a full Rabin tree with 2n-i nodes is proved to be exponential to the number of users n. An application to broadcast encryption which allows excluding faulty recipients is proposed.

    CiNii Research

    researchmap

  • Transitive Time - Stamping Scheme

    Kikuchi Hiroaki, Sugihara Naoaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2003 ( 18 )   227 - 232   2003.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    In the age when documents arc mainly dealt with digital media, a requirement of time stamping services are increasing in order to fulfill a proof existence and an integrity of digital documents. The Linear Linking Scheme proposed by Harber, the chain structure using the one way hash function, has a problem that verification cost is proportional to the number of timestamps. This paper proposes a time a stamping scheme based on discrete logarithm problem. The main feature of the proposed scheme is an efficiency fur verification of which is a constant size for communication This scheme has transition when verification.

    CiNii Research

    researchmap

  • Transitive Time-Stamping Scheme

    Kikuchi Hiroaki, Sugihara Naoaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2003 ( 18 )   227 - 231   2003.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    In the age when documents arc mainly dealt with digital media, a requirement of time stamping services are increasing in order to fulfill a proof existence and an integrity of digital documents. The Linear Linking Scheme proposed by Harber, the chain structure using the one way hash function, has a problem that verification cost is proportional to the number of timestamps. This paper proposes a time a stamping scheme based on discrete logarithm problem. The main feature of the proposed scheme is an efficiency fur verification of which is a constant size for communication This scheme has tra...

    CiNii Research

    researchmap

  • Comparison of Binary and Multiple - classes Decision Trees for classification of Webpage

    YONEYAMA Kazunori, TAKASAKI Isao, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    IPSJ SIG Notes   2003 ( 18 )   77 - 82   2003.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A web directry is useful service for retrieving webpages. However a classification of webpages is commonly made by many human opperator&#039;s subjective. In order for automatic classification of webpages, given a set of keywords extracted from webpages we apply to a decision tree learnig algorithm including the ID3 algorithm. There are two possible approaches to classify webpages into c classes - a binary tree and a multiple-class tree. A multiple-class tree is of c diferent kind leaves and classifies webpages by just one tree. A binary tree is a tree in which leaves are &#039;+&#039; or &#039;-&#039;. A set of c independent trees gives an integretedd classification of webpages. In this paper we estimate these performance and accuracy for some training data.

    CiNii Research

    researchmap

  • Proof of Signer and Privacy Revocation in Ring Signature Protocol

    KIKUCHI Hiroaki, TADA Minako, NAKANISHI Shohachiro

    The 4th International Workshop on Information Security Applications(WISA 2003)   2003 ( 18 )   149 - 153   2003.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A ring signature is one of the group signature scheme which allows member of a group to sign message such that the resulting signature docs not reveal their identity for all users. But, even if a problem occurs and the signer is necessary to be detected, anyone can&#039;t determine who signed it. In this paper, we propose an extended protocol of ring signature in which both the group administrator and n signer can indicate who signed on the message. The security of the proposed protocol is based on an assumption of the discrete logarithm problem and a secure hash function.

    CiNii Research

    researchmap

  • Comparison of Binary and Multiple-classes Decision Trees for classification of Webpage

    Yoneyama Kazunori, Takasaki Isao, Kikuchi Hiroaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2003 ( 18 )   77 - 82   2003.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A web directry is useful service for retrieving webpages. However a classification of webpages is commonly made by many human opperator&#039;s subjective. In order for automatic classification of webpages, given a set of keywords extracted from webpages we apply to a decision tree learnig algorithm including the ID3 algorithm. There are two possible approaches to classify webpages into c classes - a binary tree and a multiple-class tree. A multiple-class tree is of c diferent kind leaves and classifies webpages by just one tree. A binary tree is a tree in which leaves are &#039;+&#039; or &#039;-&#039;. A set of c ...

    CiNii Research

    researchmap

  • Digital Contents Deliverry System using Broadcast Encryption

    Proc. Of the 7th IASTED International Conference Internet and Multimedia Systems and Applications, IASTED   pp.422-427   2003

     More details

  • SEC2003参加報告

    コンピュータセキュリティシンポジウム2003(CSS2003)、情報処理学会   2003

     More details

  • 出現頻度に偏りのあるデータに対する決定木学習

    松岡和義,菊池,中西

    第8回曖昧な気持ちに挑むワークショップ、日本ファジ学会評価問題研究会 予稿CDROM   pp.1-7   2003

     More details

    Nov.2003

    researchmap

  • 情報セキュリティ事典

    共立出版   pp.451-465   2003

     More details

  • IT Text情報セキュリティ

    オーム社(執筆8.4, 9.1, 12.3, 124節)   2003

     More details

  • 排除機能を有したBroadcast Encryption

    酒田晋吾, 中里純二, 菊池浩明

    マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2003)、情報処理学会   pp.77-79   2003

     More details

    Authorship:Last author  

    researchmap

  • Webでのアンケートフォームにおけるプライバシ強化ツール

    コンピュータセキュリティシンポジウム2003(CSS2003)、情報処理学会   2003

     More details

  • Oblivious Comparator and its Application to Secure Auction Protocol

    Proc. Of Foundations of Computer Security (FCS'03), affiliated workshop with IEEE LICS'03   pp.75-84   2003

     More details

  • Digital Contents Deliverry System using Broadcast Encryption

    Proc. Of the 7th IASTED International Conference Internet and Multimedia Systems and Applications, IASTED   pp.422-427   2003

     More details

  • Oblivious Comparator and its Application to Secure Auction Protocol

    Proc. Of Foundations of Computer Security (FCS'03), affiliated workshop with IEEE LICS'03   pp.75-84   2003

     More details

  • 管理者に対して秘匿性を保証したセキュアインスタントメッセージングプロトコル

    情報処理学会論文誌   44 ( 8 )   2042 - 2050   2003

     More details

  • 菊池、暗号と暗号プロトコル

    情報処理学会連続セミナー「次世代ネットワーク環境における基幹技術」、第3回セキュリティ技術   15-30, Feb. 2003   2003

     More details

  • 米山計昇、高崎勲、菊池、中西、Web識別問題における2クラス、多クラス決定木の比較

    情報処理学会研究報告、コンピュータセキュリティ、2003-CSES-20   77-82, Feb. 2003   2003

     More details

  • 樋口 祐樹、菊池、中西、Forward-SecureなRing署名スキーム

    2003年暗号と情報セキュリティシンポジウム(SCIS 2003), 電子情報通信学会   423-427, Jan. 2003   2003

     More details

  • Development of Remote Control Vehicle via Internet and its Usability in terms of Quality of Service (Special Issue on Information Media)

    Kikuchi Hiroaki, Nakanishi Shohachiro

    Proceedings of the School of Information Technology and Electronics, Tokai University   2 ( 1 )   27 - 33   2002.9

     More details

    Publisher:東海大学  

    A remote control over the Internet opens up new applications including remote medical treatment, remote education, or conference. The current Internet, however, has no guarantee for the quality of service (QoS), which may be required from a variety of application. For example, a particular application requires a high bandwidth. A transfer delay is critical property with network conference. In this paper, we use a remote control vehicle in order to evaluate how much quality is required for realtime driving a vehicle. Our developed Internet-control vehicle supports a video and audio conference between the vehicle and the driver. Four types of communication network with various quality of services, including LAN, Wave LAN, Personal Handy Phone (PHS), and a cellular phone, are used to control the vehicle.

    CiNii Research

    researchmap

  • Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm (Special Issue on Information Media)

    Kikuchi Hiroaki, Nakanishi Shohachiro

    Proceedings of the School of Information Technology and Electronics, Tokai University   2 ( 1 )   21 - 25   2002.9

     More details

    Language:English   Publisher:東海大学  

    An enormous web pages are published over the Internet and are going to be used for market researches. At the current status of web pages, there is no standard format to classify pages though particular types of pages are often required form a marketing viewpoint. This paper addresses the issues of web page classification problem, whose goal is to find the best logic formula that identifies a set of web pages from the whole web page database. In the proposed algorithm, web pages are characterized with an array of boolean variable that tells whether or not a keyword is included by the page. Information gain is used to evaluate the best classifier for the given web page samples. Finally, the resulting logic formula is used to make a survey of population in terms of favorite sports.

    CiNii Research

    researchmap

  • ファジィ真理値の双半束について

    菊池 浩明

    ファジィシステムシンポジウム講演論文集   18   591 - 592   2002.8

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Implementation and Experimental Run of Distributed Auction System Which Hides Private Information of Bidders(<Special Issue>Special Issue on Computer Security Toward Electronic Society)

    KIKUCHI HIROAKI, UESUGI EIJI, KAWABATA HIRONOBU, MIYAMOTO MASAAKI, OGINO KUMIKO

    IPSJ Journal   43 ( 8 )   2598 - 2609   2002.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    By applying a secure distributed protocol and a public key encryption, we developed an anonymous auction system in Java language. This system has ability to conceal information about bidder except for a successful bidder and a seller. Usability and practicability of the system are evaluated in internet environment. The results of the evaluation confirms that the execution time is good for practical use and the user interface is suitable for beginners.

    CiNii Research

    researchmap

  • Scalability of Online Public-key Certificate Protocol

    KIKUCHI Hiroaki, NAKANISHI Shohachiro

    Transactions of Information Processing Society of Japan   43 ( 8 )   2659 - 2664   2002.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Public Key Infrastructure (PKI) is one of the key security technologies in the Internet. This paper studies a behavior of size of Certifiacte Revocation List (CRL), which is a standard way for revoking certificate, by introducing probabilistic model for certificate dynamics. The main result is that a meaningful revocation ratio is bounded by 0.5. Under the probabilistic assmuption, an online certificate verification protocol is proved to be not always efficient from the viewpoint of scalability.

    CiNii Research

    researchmap

  • Hierarchical fuzzy modeling and jointly expandable functions

    H Kikuchi, N Takagi

    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS   17 ( 5 )   515 - 529   2002.5

     More details

  • FUZZ-IEEE2001参加報告

    菊池 浩明

    日本ファジィ学会誌   14 ( 2 )   138 - 140   2002.4

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    DOI: 10.3156/jfuzzy.14.2_138

    CiNii Research

    researchmap

  • Multiple Neural Network System with Column Module Structure

    Ohmura Akihiro, Kikuchi Hiroaki, Kamimura Ryotaro, Nakanishi Shohachiro

    IEICE technical report. Neurocomputing   101 ( 735 )   191 - 196   2002.3

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    The authors propose a new type neural network modeling tha frontal lobe, which have a multi-layer and column structures in the human brain. This neural network is composed of multi-layers in which each layer is competitive layer of SOM network and the column structure is constituted in multi-layers by the learning, which is the method using conditional entropy. The column structure plays the role of associating an attribute with the other attribute of the object the neural network can process the date having multi-attributes of objects at the same time.

    CiNii Research

    researchmap

  • H. Kikuchi, Decision Tree Analysis of Course Evaluation Data

    Joint 1st International Confere3nce on Soft Computing and Intelligent Systems and 3rd International Symposium on Advanced Intelligent Systems(SCIS & ISIS 2002)   1-5, Oct. 2002   2002

     More details

  • 高崎勲、米山計昇、菊池、中西、Webページの分類におけるキーワードの抽出について

    第7回曖昧な気持ちに挑むワークショップ、日本ファジィ学会評価問題研究会   9-13, Nov. 2002   2002

     More details

  • Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm (SCHOOL OF INFORMATION TECHNOLOGY AND ELECTRONICS)

    Kikuchi Hiroaki, Nakanishi Shohachiro

    Proceedings of the School of Engineering of Tokai University   27   67 - 71   2002

     More details

    Language:English   Publisher:Tokai University  

    An enormous web pages are published over the Internet and are going to be used for market researches. At the current status of web pages, there is no standard format to classify pages though particular types of pages are often required form a marketing viewpoint. This paper addresses the issues of web page classification problem, whose goal is to find the best logic formula that identifies a set of web pages from the whole web page database. In the proposed algorithm, web pages are characterized with an array of boolean variable that tells whether or not a keyword is included by the page. Information gain is used to evaluate the best classifier for the given web page samples. Finally, the resulting logic formula is used to make a survey of population in terms of favorite sports.

    CiNii Research

    researchmap

  • 菊池、ファジィ真理値の双半束について

    第18回ファジィシステムシンポジウム講演論文集   591-592, Aug. 2002   2002

     More details

  • <Abstract>Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm

    Kikuchi Hiroaki, Nakanishi Shohachiro

    Proceedings of the School of Engineering of Tokai University   27   102 - 102   2002

     More details

    Language:English   Publisher:Tokai University  

    CiNii Research

    researchmap

  • <Abstract>Development of Remote Control Vehicle via Internet and its Usability in terms of Quality of Service

    Kikuchi Hiroaki, Nakanishi Shohachiro

    Proceedings of the School of Engineering of Tokai University   27   103 - 103   2002

     More details

    Language:English   Publisher:Tokai University  

    CiNii Research

    researchmap

  • (m + 1) st-price auction protocol

    KIKUCHI H.

    Proc. 5th Financial Cryptography Conference (FC 2001)   E85-A(3), 676-683   2002

  • de Morgan bisemilattice of fuzzy truth value

    H Kikuchi, N Takagi

    ISMVL 2002: 32ND IEEE INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC, PROCEEDINGS   180 - 184   2002

     More details

    Language:English  

    Web of Science

    researchmap

  • 菊池、上杉栄二、川畑博信、宮本昌明、荻野久美子、入札者情報を秘匿した分散オークションシステムの実装と実証実験

    情報処理学会論文誌   43 ( 8 )   2598-2609, 2002   2002

     More details

  • 菊池、秋山曜佑、多田美奈子、中西、セキュアインスタントメッセージングシステムの実装

    コンピュータセキュリティシンポジウム2002(CSS 2002), 情報処理学会   395-399, Oct. 2002   2002

     More details

  • 中里純二、永由勇二、杉浦啓泰、菊池、中西、ブロードキャスト暗号を用いたコンテンツ配信システムの実装

    コンピュータセキュリティシンポジウム2002(CSS 2002), 情報処理学会   395-399, Oct. 2002   2002

     More details

  • 杉原尚明、中里純二、菊池、中西、リング構造を用いたタイムスタンプスキーム

    コンピュータセキュリティシンポジウム2002(CSS 2002), 情報処理学会   13-16, Oct. 2002   2002

     More details

  • 中里純二、菊池、中西、秘密線形フィードバックシフトレジスタを用いた電子選挙システムの実装

    中里純二

    マルチメディア、分散、協調とモバイル(DICOMO 2002)シンポジウム   97-100, July 2002 - 100   2002

  • Oblivious counter and majority protocol

    H Kikuchi

    INFORMATION SECURITY, PROCEEDINGS   2433   437 - 445   2002

     More details

    Language:English  

    Web of Science

    researchmap

  • H. Kikuchi, Decision Tree Analysis of Course Evaluation Data

    Joint 1st International Confere3nce on Soft Computing and Intelligent Systems and 3rd International Symposium on Advanced Intelligent Systems(SCIS & ISIS 2002)   1-5, Oct. 2002   2002

     More details

  • 菊池、中西、インターネットを介した遠隔制御車の実装と通信品質が操作性に及ぼす影響

    東海大学紀要電子情報学部   2 ( 1 )   27-33, 2002   2002

     More details

  • 菊池、中西、決定木アルゴリズムによるウェブページの分類法の提案

    東海大学紀要電子情報学部   2 ( 1 )   21-25, 2002   2002

     More details

  • H. Kikuchi, Oblivious Counter and Majority Protocol

    5th International Conference on Information Security(ISC 2002), Springer-Verlag, LNCS 2433   437-445, 2002   2002

     More details

  • Multi-Interval Truth Values (第17回ファジィシステムシンポジウム--科学技術と自然の調和を目指して)

    高木 昇, 菊池 浩明, 中島 恭一

    ファジィシステムシンポジウム講演論文集   17   551 - 554   2001.9

     More details

    Language:English   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Subsets of Fuzzy Linguistic Truth Value to be de Morgan Bisemilattice

    KIKUCHI Hiroaki, TAKAGI Noboru

    17   555 - 558   2001.9

     More details

    Language:English  

    CiNii Research

    researchmap

  • Construction of Neural Network with Environmental Adaptability by Complex Number

    OHMURA Akihiro, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   17   53 - 56   2001.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • On Unification of Sensory Information by Column-Module Structure in Neural Networks

    OHMURA Akihiro, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   17   57 - 60   2001.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Multi-Interval Truth Values

    TAKAGI Noboru, KIKUCHI Hiroaki, NAKASHIMA Kyoichi

    ファジィシステムシンポジウム講演論文集   17   551 - 554   2001.9

     More details

    Language:English  

    CiNii Research

    researchmap

  • Handling with Missing Attribute in Decision Tree Learning

    YONEYAMA Kazunori, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   17   743 - 746   2001.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Certificate revocation protocol using k-ary hash tree

    H Kikuchi, K Abe, S Nakanishi

    IEICE TRANSACTIONS ON COMMUNICATIONS   E84B ( 8 )   2026 - 2032   2001.8

     More details

    Language:English  

    Web of Science

    researchmap

  • Oblivious Counter

    KIKUCHI Hiroaki, NAKAZATO Junji, NAKANISHI Shohachiro

    IPSJ SIG Notes   2001 ( 75 )   45 - 51   2001.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    The paper presents a new protocol for counting 1-bit secrets without revealing if the bit is 1 or 0 in publicly varifiable way. Other than the conventional multi-party protocols that involve enormous number of rounds and huge bandwidth consumption, the proposed protocol, based on the Mix and Match approach[2]in which computations are dealt with ciphertexts, requires a non-interactive constant number of round and simple but verifiable computation for both of sender and counter. The expected application of proposed protocol is an(one-bit)secret voting in which voters cast a ballot encrypted for distributed public key and an oblivious party makes a tally of how many votes are polled.

    CiNii Research

    researchmap

  • Oblivious Counter

    KIKUCHI Hiroaki, NAKAZATO Junji, NAKANISHI Shohachiro

    Technical report of IEICE. ISEC   101 ( 214 )   45 - 51   2001.7

     More details

    Language:English   Publisher:一般社団法人電子情報通信学会  

    The paper presents a new protocol for counting 1-bit secrets without revealing if the bit is 1 or 0 in publicly verifiable way.Other than the conventional multi-party protocols that involve enormous number of rounds and huge bandwidth consumtion, the proposed protocol, based on the Mix and Match approach [2]in which computations are dealt with ciphertexts, requires a non-interactive constant number of round and simple but verifiable computation for both of sender and counter.The expected application of proposed protocol is an (one-bit) secret voting in which voters cast a ballot encrypted for distributed public key and an oblivious party makes a tally of how many votes are polled.

    CiNii Research

    researchmap

  • N.Takagi, H.Kikuchi and K.Nakashima Multi-Interval Truth Valued Logic

    The 10th IEEE Intl. Conf. On Fuzzy Systems (FUZZ-IEEE 2001)   PS4(P319), 1-4   2001

     More details

  • Closures of fuzzy linguistic truth value with regards to the extension principle

    H Kikuchi

    10TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3   PS5(P112), 1-4   1416 - 1419   2001

     More details

    Language:English  

    Web of Science

    researchmap

  • N.Takagi, H.Kikuchi and K.Nakashima Multi-Interval Truth Valued Logic

    The Second Korea-Japan Joint Symposium on Multiple-Valued Logic (JS-MVL 2001)   45-48   2001

     More details

  • Hiroaki Kikuchi (M+1)st-Price Auction Protocol

    Proc. of The Fifth International Conference on Financial Cryptography ‘01 IFCA   291-298   2001

     More details

    Fabruary 2001

    researchmap

  • Power auction protocol without revealing winning bids

    H Kikuchi

    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS   61-64   61 - 64   2001

     More details

  • Multi-interval truth valued logic

    N Takagi, H Kikuchi, K Nakashima

    10TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3   PS4(P319), 1-4   1119 - 1122   2001

     More details

    Language:English  

    Web of Science

    researchmap

  • H. Kikuchi Closures of fuzzy linguistic truth value with regards to the extension principle

    The 10th IEEE Intl. Conf. On Fuzzy Systems (FUZZ-IEEE 2001)   PS5(P112), 1-4   2001

     More details

  • Identification of incompletely specified fuzzy unate logic function

    H Kikuchi

    31ST INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC, PROCEEDINGS   116-121   116 - 121   2001

     More details

    Language:English  

    Web of Science

    researchmap

  • H.Kikuchi and N.Takagi Classes of Fuzzy Linguistic Truth Value to be de Morgan Bisemilattice

    The Second Kore-Japan Joint Symposium on Multiple-Valued Logic (JS-MVL 2001)   108-109   2001

     More details

  • Hiroaki Kikuchi (M+1)st-Price Auction Protocol

    Proc. of The Fifth International Conference on Financial Cryptography ‘01,IFCA   291-298   2001

     More details

    Fabruary 2001

    researchmap

  • H.Kikuchi, K. Abe and S.Nakanishi Optimal Data Structure for Certificate Revocation

    First Intl. Workshop for Asian PKI (IWAP 2001)   101-116   2001

     More details

  • Remote control algorithms of the radio-controlled car based on a QoS of Network

    2000 ( 15 )   97 - 102   2000.12

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Propeties of Long-term Memory for Facial Images

    KIKUCHI Hiroaki, HATTORI Tatsuya, NAKANISHI Shohachiro

    インテリジェント・システム・シンポジウム講演論文集 = FAN Symposium : fuzzy, artificial intelligence, neural networks and computational intelligence   10   265 - 267   2000.10

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • On Incompletely Specified Unite Fuzzy Switching Function

    KIKUCHI Hiroaki

    インテリジェント・システム・シンポジウム講演論文集 = FAN Symposium : fuzzy, artificial intelligence, neural networks and computational intelligence   10   1 - 4   2000.10

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Blind Group Signature

    Sai Kousetsu, Kikuchi Hiroaki, Nakanishi Shohatiro

    Technical report of IEICE. ISEC   100 ( 323 )   29 - 34   2000.9

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    A group signature scheme[Cha 91][CS 97][KP 98]allows members of a group to sign message on the group&#039;s behalf such that the resulting signature does not reveal their identity and is useful for many applications in which privacy of identity is critical. In the conventional group signature schemes, given a group signature, no one but the group administrator learns who is signer. This paper proposes a new blind group signature scheme which prevents even an group administrator from signers identifying in order to make the proposed scheme usable for the electronic voting.

    CiNii Research

    researchmap

  • Key Escrow Protocol with Distributed Power of Key Generation Authority

    Sai Kousetsu, Hotta Shinji, Kikuchi Hiroaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2000 ( 80 )   79 - 83   2000.9

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    The importance of key escrow is increasing as many secret communications take placed over the Internet. It&#039;s required to provide an investigation of terrorists and to prepare for key lost. Miyazaki et.al[MISS 97]proposed a secure key escrow protocol based on the Yaksha[Gan 95]. In their protocol, the power of a key genarating authority is too strong and thus the secret key shared by client might be revealed through the KGA. In this paper, we propose a modified key escrow protocol which improves the privacy of shared key.

    CiNii Research

    researchmap

  • Key Escrow Protocol with Distributed Power of Key Generation Authority

    SAI Kousetsu, HOTTA Shinji, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    IPSJ SIG Notes   2000 ( 80 )   79 - 83   2000.9

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    The importance of key escrow is increasing as many secret communications take placed over the Internet. It&#039;s required to provide an investigation of terrorists and to prepare for key lost. Miyazaki et.al[MISS 97]proposed a secure key escrow protocol based on the Yaksha[Gan 95]. In their protocol, the power of a key genarating authority is too strong and thus the secret key shared by client might be revealed through the KGA. In this paper, we propose a modified key escrow protocol which improves the privacy of shared key.

    CiNii Research

    researchmap

  • Pattern Recognition System by Acquired Knowledge in Neural Network

    IKEDA Shinya, ONO Yoshitsugu, KIKUCHI Hiroaki, KAMIMURA Ryotaro, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   117 - 118   2000.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Closures of fuzzy linguistic truth value with regards to the extension principle

    KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   203 - 206   2000.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Identifying Incompletely Specified Unite Fuzzy Switching Function

    KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   207 - 210   2000.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Hybrid Neural Networks of Multi-Layer Network and Kohonen Network for the Data needs a Large Number of Input Units

    ONO Yoshitsugu, IKEDA Shinya, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   105 - 106   2000.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Neural Networks with Multi-kind Inputs

    ONO Yoshitsugu, KIKUCHI Hiroaki, KAMIMURA Ryotaro, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   107 - 110   2000.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Identification of Input Data of Neural Networks producing the Same Output After Lerning

    ONO Yoshitsugu, KIKUCHI Hiroaki, KAMIMURA Ryotaro, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   111 - 114   2000.9

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • The Design of Neural Networks Structure

    OHMURA Akihiro, ONO Yoshitsugu, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   16   115 - 116   2000.9

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Expected Reduction of Cost for Online Certification Status Verification With Red-Black Hash Tree

    Abe Kensuke, Kikuchi Hiroaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2000 ( 36 )   35 - 40   2000.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Certificate Revocation is one of the critical issues for a practical public-key infrastructure. A new efficient revocation protocol using one-way hash tree structure instead of the classical list structure, which is known as a standard for revocation, was proposed and examined in communication and computation costs reduction[KA00]. A tree approach, however, might be of O(n) in the worst case when all entries are sorted in descending order. A red-black tree is a binary sorted tree with one extra bit per node, which is used for balancing tree and to guarantee that operations of search and ins...

    CiNii Research

    researchmap

  • Expected Reduction of Cost for Online Certification Status Verification With Red - Black Hash Tree

    ABE Kensuke, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    IPSJ SIG Notes   2000 ( 36 )   35 - 40   2000.5

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Certificate Revocation is one of the critical issues for a practical public-key infrastructure. A new efficient revocation protocol using one-way hash tree structure instead of the classical list structure, which is known as a standard for revocation, was proposed and examined in communication and computation costs reduction[KA00]. A tree approach, however, might be of O(n) in the worst case when all entries are sorted in descending order. A red-black tree is a binary sorted tree with one extra bit per node, which is used for balancing tree and to guarantee that operations of search and insertion take O(log_2n)in the worst case. In this paper, we study the red-black hash tree for online cerficate status verification and estimate the reduction of costs against the binary search tree in terms of communication and computation costs in revocation.

    CiNii Research

    researchmap

  • Online Certificate Status Verification Server Using Binary Search Hash Tree

    ABE Kensuke, KIKUCHI Hiroaki, NAKANISHI Shohachiro

    IPSJ SIG Notes   2000 ( 30 )   131 - 136   2000.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CRT (Certificate Revocation Tree) is a method using hash tree for public-key certificate revocation. In [KA98], we have implemented an experimental CRT system using the S-expression, and shown that its communication cost is smaller than that of CRL. In this paper, we implement an online certificate status verification server using CRT expressed in binary search tree, and examine the system performance in comparison with [KA98]. Based on experimental data, we show that the latency of CRT is smaller than that of CRL. We also estimate the performance of the system to which an actual revocation data derived from a CRL is applied.

    CiNii Research

    researchmap

  • Online Certificate Status Verification Server Using Binary Search Hash Tree

    Abe Kensuke, Kikuchi Hiroaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2000 ( 30 )   131 - 136   2000.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CRT (Certificate Revocation Tree) is a method using hash tree for public-key certificate revocation. In [KA98], we have implemented an experimental CRT system using the S-expression, and shown that its communication cost is smaller than that of CRL. In this paper, we implement an online certificate status verification server using CRT expressed in binary search tree, and examine the system performance in comparison with [KA98]. Based on experimental data, we show that the latency of CRT is smaller than that of CRL. We also estimate the performance of the system to which an actual revocation data derived from a CRL is applied.

    CiNii Research

    researchmap

  • ハッシュ木を用いたオンライン証明書状態検証サーバ

    安部 謙介, 菊池 浩明, 中西 祥八郎

    情報処理学会研究報告. マルチメディア通信と分散処理研究会報告   2000 ( 30 )   131 - 136   2000.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    現在、公開鍵証明書の廃止方式の1つにハッシュ木を用いたCRT(Certificate Revocation Tree)がある。我々は[KA98]において、S式を用いたCRTの試験実装を行い、CRLに対して通信コスト面での優位性を示した。本稿では、CRTを2分検索木で表現したオンライン証明書状態検証サーバの実装について述べるとともに、[KA98]との比較検討を行う。その結果から、処理コストにおいてもCRTがCRLに比べ高速であることを示す。また、本実装に実際のCRLを適用した場合、パフォーマンスがどの程度改善されるかについても報告する。

    CiNii Research

    researchmap

  • Online Certificate Status Verification Server Using Binary Search Hash Tree

    Abe Kensuke, Kikuchi Hiroaki, Nakanishi Shohachiro

    IPSJ SIG Notes   2000 ( 30 )   131 - 136   2000.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CRT (Certificate Revocation Tree) is a method using hash tree for public-key certificate revocation. In [KA98], we have implemented an experimental CRT system using the S-expression, and shown that its communication cost is smaller than that of CRL. In this paper, we implement an online certificate status verification server using CRT expressed in binary search tree, and examine the system performance in comparison with [KA98]. Based on experimental data, we show that the latency of CRT is smaller than that of CRL. We also estimate the performance of the system to which an actual revocation...

    CiNii Research

    researchmap

  • Hiroaki Kikuchi Can we remember faces much easier than numbers?

    The fourth Asian Fuzzy Systems Symposium (AFSS2000)   706-710   2000

     More details

    2000 June

    researchmap

  • Hiroaki Kikuchi, Shinji Hotta, Kensuke Abe and Shohachiro Nakanishi Resolving Winner and Winning bid without Revealing Privacy of Bids

    Parallel and Distributed Systems: Workshops. International Workshop on Next Generation Internet (NGITA2000)IEEE   307-312   2000

     More details

    July 2000

    researchmap

  • Hiroaki Kikuchi Can we remember faces much easier than numbers?

    The fourth Asian Fuzzy Systems Symposium (AFSS2000)   706-710   2000

     More details

    2000 June

    researchmap

  • Hiroaki Kikuchi, Shinji Hotta, Kensuke Abe and Shohachiro Nakanishi Resolving Winner and Winning bid without Revealing Privacy of Bids

    Parallel and Distributed Systems: Workshops. International Workshop on Next Generation Internet (NGITA2000)Ieee   307-312   2000

     More details

    July 2000

    researchmap

  • ファジィ論理の新世紀への提言(ファジィの新世紀への提言)

    菊池 浩明

    日本ファジィ学会誌   11 ( 6 )   74 - 75   1999.12

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    CiNii Research

    researchmap

  • Recognition of Multi kinds Inputs at Hidden layer of Neural Network

    ONO Yoshitsugu, KIKUCHI Hiroaki, KAMIMURA Ryotaro, NAKANISHI Shohachiro

    IEICE technical report. Neurocomputing   99 ( 473 )   31 - 37   1999.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Neural networks have been used as a tool for pattern recognition in which a single kind information have been processed. However the human brain is able to process many kind information of an object, such as a shape, color, size, and so on, at a same time. The main purpose of this paper is to construct the neural network which can unify the different kinds of information for an object as the same thing. We use three layers network in which the unit in hidden layers is connected with the units in its neighborhood. Finally, we verify that the network proposed in this paper can unify the different kind information for an object at hidden layer by the simulations, as human brain.

    CiNii Research

    researchmap

  • Recognition of Multi kinds Inputs at Hidden layer of Neural Network

    Ono Yoshitsugu, Kikuchi Hiroaki, Kamimura Ryotaro, Nakanishi Shohachiro

    IEICE technical report. Neurocomputing   99 ( 473 )   31 - 37   1999.11

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Neural networks have been used as a tool for pattern recognition in which a single kind information have been processed. However the human brain is able to process many kind information of an object, such as a shape, color, size, and so on, at a same time. The main purpose of this paper is to construct the neural network which can unify the different kinds of information for an object as the same thing. We use three layers network in which the unit in hidden layers is connected with the units in its neighborhood. Finally, we verify that the network proposed in this paper can unify the diffe...

    CiNii Research

    researchmap

  • ニューラルネットワークによるファジィ推論の抽出 (第15回ファジィシステムシンポジウム--やりまっせ!新世紀のたおやか技術 日本ファジィ学会設立10周年記念大会) -- (学習(3))

    小野 能嗣, 菊池 浩明, 上村 龍太郎

    ファジィシステムシンポジウム講演論文集   15   495 - 498   1999.6

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • 平均深さの観点から見た決定木学習アルゴリズムの評価 (第15回ファジィシステムシンポジウム--やりまっせ!新世紀のたおやか技術 日本ファジィ学会設立10周年記念大会) -- (学習(5))

    菊池 浩明, 中西 祥八郎

    ファジィシステムシンポジウム講演論文集   15   519 - 522   1999.6

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Webページの識別問題とインターネットサーベイへの応用 (第15回ファジィシステムシンポジウム--やりまっせ!新世紀のたおやか技術 日本ファジィ学会設立10周年記念大会) -- (WWW検索(2))

    菊池 浩明, 中西 祥八郎

    ファジィシステムシンポジウム講演論文集   15   643 - 646   1999.6

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • 検索エンジンの二次キーワードの検討 (第15回ファジィシステムシンポジウム--やりまっせ!新世紀のたおやか技術 日本ファジィ学会設立10周年記念大会) -- (WWW検索(3))

    佐々木 豊, 菊池 浩明, 中西 祥八郎

    ファジィシステムシンポジウム講演論文集   15   655 - 658   1999.6

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • 顔に対するヒトの記憶容量について (第15回ファジィシステムシンポジウム--やりまっせ!新世紀のたおやか技術 日本ファジィ学会設立10周年記念大会) -- (顔)

    菊池 浩明, 中西 祥八郎

    ファジィシステムシンポジウム講演論文集   15   701 - 704   1999.6

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • ニューラルネットワークによる多種入力 (第15回ファジィシステムシンポジウム--やりまっせ!新世紀のたおやか技術 日本ファジィ学会設立10周年記念大会) -- (ニューラルネットワーク(3))

    小野 能嗣, 菊池 浩明, 上村 龍太郎

    ファジィシステムシンポジウム講演論文集   15   171 - 174   1999.6

     More details

    Language:Japanese   Publisher:日本ファジィ学会  

    CiNii Research

    researchmap

  • Student discount problem in electronic tickets and SPKI/SDSI freamwork for authorization

    Kikuchi Hiroaki, Kawakura Yasushi

    IPSJ SIG Notes   99 ( 45 )   25 - 30   1999.5

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    SPKI/SDSI is a framework in which both user authentication and access authorization to be dealt with an uniform certificate format. In this paper we studies some issues in electrionic tickets in conjunction with student discount and present a solution made by the SPKI/SDSI framework.

    CiNii Research

    researchmap

  • Usability Evaluation of Remote Control Vehicle in terms of Quality of Service

    Kikuchi Hiroaki, Abe Kensuke, Nakanishi Shohachiro

    IPSJ SIG Notes   99 ( 30 )   49 - 54   1999.4

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A remote control over the Internet opens up new applications including remote mdeical treatment, remote education, of conference. The current Internet, however, has not guaranteed the quality of service (QoS), which may be required from a variety of application. For example, a particular application requires a high bandwidth. A transfer delay is critical property with network conference. In this paper, we use a remote control vehicle in order to evaluate how much quality is required for real-time driving a vehicle. Our developed Internet-control vehicle supports a video and audio conference...

    CiNii Research

    researchmap

  • 2R-7 Internet Car : A car remotely controled via the Internet Development and Evaluation

    Sasaki Tatsunori, Yamashita Keita, Abe Kensuke, Kikuchi Hiroaki, Nakanishi Shohachiro

    全国大会講演論文集   58 ( 3 )   "3 - 557"-"3-558"   1999.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    CiNii Research

    researchmap

  • Logical Approach for Identification of Web pages and Application to Marketing

    菊池 崇宏, 菊池 浩明, 中西 祥八郎

    全国大会講演論文集   58 ( 0 )   41 - 42   1999.3

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • k分ハッシュ木を用いた証明書廃止木(CRT)の更新方式と提案と評価 共同

    1999年暗号と情報セキュリティシンポジウム(SCIS99)予稿集 電子情報通信学会   II   615 - 620   1999

     More details

  • H.Kikuchi, Michaell Harkavy And J.D.Tygar. Multi-round Anonymous Auction.

    IEICE Trans. Inf. & Syst.   E-82D(4), 769-777   1999

     More details

  • 匿名オークションを実現する分散システムの実装する分散システムの実装と評価

    菊池浩明

    Proc. CSS'99   123 - 128   1999

  • インターネットにおけるプライバシ技術構築と適用に関する研究開発

    菊池浩明

    第15回IPA技術発表会, (1996. 10. 30-31)   1999

  • H.Kikuchi, Michael Harkavy And J.D.Tygar. Multi-round Anonymous Auction.

    IEICE Trans. Inf. & Syst.   E82-D(4), 769-777   1999

     More details

  • PKIにおける公開鍵証明書のダイナミクスとオンライン証明書検証プロトコルのスケーラビリティ 共同

    1999年暗号と情報セキュリティシンポジウム(SCIS99)予稿集 電子情報通信学会   II   609 - 620   1999

     More details

  • Certificate Revocation and Update Using Binary Hash Tree

    Kikuchi Hiroaki, Abe Kensuke, Nakanishi Shohachiro

    IPSJ SIG Notes   98 ( 84 )   51 - 56   1998.9

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A CRL(Certificate Revocation List) defined in X.509 is currently used for revocation. To corp with issue of CRL, that includes a high communication cost and low latency for update, OCSP, Delta-CRL, CRT(Cetificate Revocation Tree) and Authenticated Directory have been proposed. In this paper, we implement experimental CRT system, and the expected reduction of communication cost in comparison with CRL. We also propose a new update method which is more efficient in communication than Naor&#039;s evaluate method.

    CiNii Research

    researchmap

  • Certificate Revocation and Update Using Binary Hash Tree

    Kikuchi Hiroaki, Abe Kensuke, Nakanishi Shohachiro

    IPSJ SIG Notes   1998 ( 84 )   51 - 56   1998.9

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    A CRL(Certificate Revocation List) defined in X.509 is currently used for revocation. To corp with issue of CRL, that includes a high communication cost and low latency for update, OCSP, Delta-CRL, CRT(Cetificate Revocation Tree) and Authenticated Directory have been proposed. In this paper, we implement experimental CRT system, and the expected reduction of communication cost in comparison with CRL. We also propose a new update method which is more efficient in communication than Naor&#039;s evaluate method.

    CiNii Research

    researchmap

  • Identification of incompletely specified multiple-valued Kleenean functions

    N Takagi, H Kikuchi, K Nakashima, M Mukadiono

    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS   28 ( 5 )   637 - 647   1998.9

  • Functional completeness of hierarchical fuzzy modeling

    H Kikuchi, A Otake, S Nakanishi

    INFORMATION SCIENCES   110 ( 1-2 )   51 - 60   1998.9

     More details

  • Sender and Recipient Anonymous Communication without Public Key Cryptography

    KIKUCHI Hiroaki

    IPSJ SIG Notes   1998 ( 54 )   41 - 46   1998.5

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    We propose a new idea to archive an anonymous communication network which provides both sender and recipient anonymities under the condition that the overall traffic may be analyzed. The proposed protocol, which is based on a secret function computation of addition using secret sharing schemes, is estimated with regards to bandwidth and time delay. We show that the bandwidth spend in computation of the proposed protocol is linear to the number of entities, but is limited within a fraction of the total bandwidth.

    CiNii Research

    researchmap

  • Stochastic Voting Protocol

    CMU-CS-98-112   1998

     More details

  • 「インターネット上の匿名通信路方式の評価」

    1998年暗号と情報セキュリティシンポジウム   3 ( 3 )   1 - 8   1998

     More details

  • 「効率的なl-out-of-k紛失通信」

    1998年暗号と情報セキュリティシンポジウム   1 ( 3 )   1 - 7   1998

     More details

  • How to Survive like a grad student 「CMU滞在記」

    10 ( 2 )   72 - 78   1998

     More details

  • Sender and Recipient Anonymous Communication Without Public Key Encryption 単独

    98   41 - 46   1998

     More details

  • Implication-based Learning 共同

    VJFUZZY IFSA   1   1 - 6   1998

     More details

  • Electronic auctions with private bids

    M Harkavy, JD Tygar, H Kikuchi

    PROCEEDINGS OF THE 3RD USENIX WORKSHOP ON ELECTRONIC COMMERCE   3   61 - 73   1998

     More details

    Language:English  

    Web of Science

    researchmap

  • 直交複雑度を用いた決定木学習 共同

    多値論理研究ノート 多値論理研究会   21 ( 3 )   1 - 6   1998

     More details

  • 匿名通信路 単独

    Networld+Interop Tokyo 98 日本ソフトバンク   1   59 - 75   1998

     More details

  • 利用者登録の不要な匿名オークション 共同

    コンピューターセキュリティシンポジウム(CSS98)論文集 情報処理学会   98 ( 12 )   243 - 248   1998

     More details

  • 2分ハッシュ木を用いた証明書廃止・更新システム 共同

    情報処理学会コンピューターセキュリティ研究会研究報告 情報処理学会   98 ( 84 )   51 - 56   1998

     More details

  • インターネットにおけるプライバシ保護の研究

    JISA会報(社団法人情報サービス産業協会)   98 ( 52 )   34 - 40   1998

     More details

  • How To Survive Like a Grad Student「CMU留学記」

    菊池 浩明

    日本ファジィ学会誌   10 ( 2 )   252 - 258   1998

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    &lt;p&gt;&lt;/p&gt;

    CiNii Research

    researchmap

  • 遺伝的アルゴリズムに基づく知識抽出 共同

    14回ファジィシステムシンポジウム講演論文集 日本ファジィ学会   FA2-1   535 - 536   1998

     More details

  • 含意に基づく知識抽出 共同

    14回ファジィシステムシンポジウム講演論文集 日本ファジィ学会   FD1-2   701 - 702   1998

     More details

  • 列複雑度に基づくファジィ決定木の同定 共同

    14回ファジィシステムシンポジウム講演論文集 日本ファジィ学会   WF6-2   349 - 352   1998

     More details

  • Hierarchical Fuzzy Modeling Based on Ortho-Linear Functions

    KIKUCHI Hiroaki, TAKAGI Noboru, NAKANISHI Shouhachirou

    ファジィシステムシンポジウム講演論文集   13   435 - 438   1997.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Character Diagnosis of Fuzzy Systems by Genetic Algorithm and Fuzzy Inference

    OKAMURA Masakazu, OTANI Shinobu, KIKUCHI Hiroaki, YAGER Ronald R, NAKANISHI Shohachiro

    ファジィシステムシンポジウム講演論文集   13   349 - 352   1997.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • On-Line Handwritten Alphabet Character Recognition System by Immune Mechanism

    TOMODA Daisuke, KAKIGAO Hitoshi, KIKUCHI Hiroaki, NAKANISHI Shouhachiro

    ファジィシステムシンポジウム講演論文集   13   357 - 358   1997.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Diagnosis of a Fuzzy System Character

    OHTANI Shinobu, OKAMURA Masakazu, KIKUCHI Hiroaki, YAGER Ronald R, NAKANISHI Shouhachirou

    ファジィシステムシンポジウム講演論文集   13   727 - 730   1997.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • ディジタルキャッシュの原理と課題

    菊池 浩明

    Bit   29 ( 4 )   22 - 29   1997.4

     More details

    Language:Japanese   Publisher:共立出版  

    CiNii Research

    researchmap

  • Technical Issues and The Trend of Email Encryption

    Kikuchi Hiroaki

    Proceedings of the IEICE General Conference   1997   582 - 583   1997.3

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    インターネットの商用化の際して, 最も始めにセキュリティ強化が試みられたのが電子メールであった. メールには, 暗号化や電子署名に対する自然な需要があり, 他のアプリケーションほど即応性が重要でないため, 暗号化にかかるオーバーヘッドを無視できたという技術的な要素がある. 更に, エンド・ツー・エンドで暗号化復号化処理を行うことで, 中間に位置するネットワークの性質や制限にも影響を受けないで部分的に導入が図れるという利点もあった. こうして, ほとんどの環境で暗号化電子メールを利用することは可能となってきた. 例えば, 米国コンピュータ緊急対策チームCERTが提出するAdvisoryは, PGP (後述)によってデジタル署名されていて, 偽の情報を防止している. メッセージの暗号化は技術的にはほぼ実用可能な域に達していると考えられる. ところが, 現実にはまだ一般的に利用されてはいない. 最も大きな理由はプロ卜コルの標準化であろう. 本稿では, いくつかの暗号化プロトコルの現状について報告し, 現実的な運用フェーズに至るための技術課題について検討する.

    CiNii Research

    researchmap

  • Is the Technologies Making Internet Secure?

    KIKUCHI Hiroaki

    The Journal of the Institute of Electronics,Information and Communication Engineers   80 ( 2 )   137 - 145   1997.2

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    インターネットは学術研究目的で発達してきたという歴史的な背景から, セキュリティに対する考慮が甘いことは広く認識されており, それ故に, 昨今の商用利用が進められるにあたって, 最も重要視されたのがセキュリティの強化であった. これらの試みが, 目まぐるしく展開する技術革新の中で, どこまで本来の目的を達成できたのだろうか? 本稿では, 実現性の観点から次の三つに分類して検討する. 1. セキュリティ強化が完成した分野 2. まもなく実現されようとしている分野 3. 重要性が見過ごされている分野

    CiNii Research

    researchmap

  • 暗号化電子メールの実用化動向とその課題

    1997年電子情報通信学会総合大会講演論文集,基礎境界   382 - 383   1997

     More details

  • "Is Prime Implicant Enough Rich to Approximate Our Knowledge? "

    Proc. of Secenth International Fuzzy Systems Association   259 - 264   1997

     More details

  • インターネットのセキュリティについて

    明治大学博紫会特別講演   1997

     More details

  • ネットワークセキュリティ (翻訳)

    プリンスティスホール   ( 6月 )   1997

     More details

  • 「証明書発行局間の証明書情報共有機構の設計」

    桜井三子

    1997年暗号と情報セキュリティシンポジウム   8D   1 - 10   1997

  • 「オンライン証明書発行局パッケージ(ICAP)の実装と評価」

    服部浩之

    1997年暗号と情報セキュリティシンポジウム   8C   1 - 10   1997

  • 「暗号化サーバによる電子メールのプライバシ強化の堤案」

    山崎直洋

    1997年暗号と情報セキュリティシンポジウム   8A   1 - 8   1997

  • On a Variation of Restrication Conditions Involved by Maximizing infomation of Neural Networks

    MACHIDA Tetsuya, KAMIMURA Ryotaro, KIKUCHI Hiroaki, NAKANISI Shouhachirou

    ファジィシステムシンポジウム講演論文集   12   261 - 264   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Orthogonal Expansion of Fuzzy Switching Functions

    KIKUCHI Hiroaki, NAKANISHI Shohachiro, TAKAGI Noboru

    ファジィシステムシンポジウム講演論文集   12   385 - 388   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • A Valuation of P-Fuzzy Logic Model : A Logic of the Men, A Logic of the Women

    TSUKAHARA Yasuaki, KIKUCHI Hiroaki, NAKANISI Shouhachirou

    ファジィシステムシンポジウム講演論文集   12   403 - 406   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Development of Knowledge Extraction System Based on Fuzzy Logic Functions

    KUTSUWADA T, TAKAGI N, KIKUCHI H, NAKASHIMA K

    ファジィシステムシンポジウム講演論文集   12   407 - 410   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Diagnosis of a Fuzzy System Character

    OHTANI Shinobu, KIKUCHI Hiroaki, YAGER Ronald R, NAKANISHI Shouhachirou

    ファジィシステムシンポジウム講演論文集   12   499 - 502   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Nonorthogonal Expansion of Fuzzy Switching Functions

    KIKUCHI Hiroaki, TAKAGI Noboru, NAKANISHI Shouhachirou

    ファジィシステムシンポジウム講演論文集   12   389 - 392   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Fuzzy Logical Decision Diagram

    TSUKAHARA Yasuaki, KIKUCHI Hiroaki, NAKANISI Shouhachirou

    ファジィシステムシンポジウム講演論文集   12   399 - 402   1996.6

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Design and Implementation of an Electric Anonymous Polling System

    YOKOKAWA Noriko, KIKICHI Hiroaki, MURAI Jun

    IPSJ SIG Notes   96 ( 20 )   73 - 78   1996.2

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper describes a system that eliminate four injustices: &quot;privacy violation&quot;, &quot;impersonate&quot;, &quot;multi-polling&quot; and &quot;alteration/fabrication&quot;. This system is achived by four individual entities called &quot;Agent&quot;s. The mechanism of Blind Signature with RSA public-key encryption is used to detect privacy violation and alteration/fabrication. An authentication system prevents masquarade and multi-polling. A prototype of this system is implemented. This system fulfills the original definition of the term &quot;communication&quot; on communication using computers. With this system, opinions of users can be ...

    CiNii Research

    researchmap

  • Catbell - An authentication system based on public key certificate in World Wide Web

    Kikuchi Hiroaki

    IPSJ SIG Notes   96 ( 12 )   233 - 238   1996.1

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper studies an attempt to extend user authentication and digital signature facilities to World Wide Web. After pointing several drawback of WWW, an authentication based on public key certificate is described, and then its security and usability are discussed.

    CiNii Research

    researchmap

  • "An Implementation of Digital Coupon Privacy Oriented Browsing System in the Internet, "

    SEO K.

    Asian Computing Science conference, ASIAN'96, Post Conference Workshop on Computer Networking,   73 - 80   1996

  • プライバシを考慮したホームページへのアクセスシステムの実装 (インターネットコンファレンス'96論文集) -- (Session 1(Application 1)〔和文〕)

    妹尾 健史, 菊池 浩明, 中西 祥八郎

    インタ-ネットコンファレンス論文集   ( 1996 )   11 - 16   1996

     More details

    Language:Japanese   Publisher:日本ソフトウェア科学会インタ-ネットテクノロジ研究会〔ほか〕  

    CiNii Research

    researchmap

  • 5. 「階層化ファジィモデリングの関数的完全性について」(評価問題研究会 FAN Symposium'95 オーガナイズドセッション)

    菊池 浩明, 大竹 章裕, 中西 祥八郎

    日本ファジィ学会誌   7 ( 6 )   1168 - 1169   1995.12

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    CiNii Research

    researchmap

  • Performance Evaluation of an Implementation of Certificate Distribution System in Internet Privacy Enhanced Mail

    KIKUCHI Hiroaki, KURODA Yasutsugu, NAGAI Takeshi

    IPSJ Journal   36 ( 8 )   2063 - 2070   1995.8

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    Privacy Enhanced Mail (PEM) is proposed in Internet standard RFC 1421-1424. Using public key cryptosystem, PEM provides the user authentication, integrity, and the confidentiality of contents of electronic mail. The distribution of certificate which contains a user identifier and the public key is current issue for a practical use of PEM in the Internet. This paper proposes a public key certificate distribution system using the WHOIS ptotocol, and evaluates the performance of an implementation based on the statistics of electronic mail sending. Main result is that a local certificate cashe for a week reduces the traffic of requests to certificate distribution server by 2/5.

    CiNii Research

    researchmap

  • Identification of P-Fuzzy Switching Functions

    KIKUCHI Hiroaki, MUKAIDONO Masao

    IEICE transactions on fundamentals of electronics, communications and computer sciences   78 ( 7 )   860 - 868   1995.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A P-Fuzzy Switching Function is a meaningful class of fuzzy switching functions that is representable by a logic formula consisting of prime implicants. This paper aims at extracting knowledge represented as prime implicants from a given learning data. The main results are the necessary and sufficient conditions for the learning data to be representable with P-fuzzy switching functions, and to be determined by unique logic formula.

    CiNii Research

    researchmap

  • Security On the Internet

    Murai Jun, Kikuchi Hiroaki

    Technical report of IEICE. Forum on advanced communications ethics   95 ( 64 )   25 - 32   1995.5

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    This paper studies the security issues on the Internet.

    CiNii Research

    researchmap

  • ニューラルネットワークの獲得知識に対するファジィの融合

    上村 龍太郎, 長峰 伸明, 黒沢 正明, 菊池 浩明, 中西 祥八郎

    電気学会研究会資料. IIC, 産業計測制御研究会   1995 ( 19 )   1 - 10   1995.3

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Algorithms of solving the illust-logic puzzles

    Kikuchi Hiroaki

    情報処理学会研究報告知能と複雑系(ICS)   95 ( 23 )   127 - 132   1995.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    This paper studies the &quot;illust-logic puzzle,&quot; which is of a n×m matrix to be filled with 1 and 0 based on two sequences specifying run-lengths of 1-elements. After some of properties of the illust-logic puzzle are clarified, some algorithms to solve any given puzzle are proposed. Also, the completeness and the soundness, properties of algorithms that provide an assurance that every puzzle can be solved and every answer is correct in the algorithm, are proved. Finally, the computational time used by algorithm is estimated, and an actual execution time on a computer are shown.

    CiNii Research

    researchmap

  • Fitting Problem of Fuzzy Switching Functions - Acquirement of Knowledge by Logic Formula -

    KIKUCHI Hiroaki, MUKAIDONO Masao

    The Transactions of the Institute of Electronics,Information and Communication Engineers.   77 ( 9 )   595 - 604   1994.9

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    ファジー論理関数の当てはめ問題とは,定義域として,[0,1]^nのある部分集合Aをもつ部分関数f_0→[0,1]が与えられたとき,f_0を近似する誤差最小のファジー論理関数を求める問題である.この問題を解くことは,被験者がいくつかのサンプルについて行った評価値から,その被験者の評価の論理式を同定することを意味する.しかしながら,n変数のファジー論理関数の数は2^&lt;3n&gt;のオーダであり,それらを逐次計算して誤差を評価することは現実的ではない.そこで,本論文では,問題をいくつかの小さな部分問題に分割し,局所的に最適な部分関数を見出し,それらを結合することで,任意の部分関数について当てはめ問題を解くアルゴリズムを考える.

    CiNii Research

    researchmap

  • Indentifying Fuzzy Switching Function - Necessary and Sufficeient Conditions for Restriction to Be a Fuzzy Switcing Function -

    KIKUCHI Hiroaki, MUKAIDONO Masao

    The Transactions of the Institute of Electronics,Information and Communication Engineers.   77 ( 7 )   465 - 476   1994.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    n変数ファジー論理関数とは,n個の変数からなる論理式で表現される写像[0,1]^n→[0,1]である.本論文では,定義域として,[0,1]^nのある部分集合Aをもつ部分関数f:A→[0,1]が与えられたとき,それを表現するファジー論理関数の同定を試みる.まず,無限濃度のファジー真理値を有限の値で考察するために,量子化集合を定義する.それらの性質を調べ,任意に与えられた部分関数を満たすファジー論理関数が存在するための必要十分条件(実現可能性)と,それが一意的に定まるための必要十分条件(一意性)を明らかにする.最後に,与えられたサンプルのあいまいな評価値から,その評価を決定していた本質的な論理構造を導出する簡単な例を示し,従来のニューラルネットワークやファジー推論による試みと比較検討する.

    CiNii Research

    researchmap

  • An implementation of secure broadcast communication in Privacy Enhanced Mail

    黒田 康嗣, 菊池 浩明

    全国大会講演論文集   48 ( 0 )   253 - 254   1994.3

     More details

    Language:Japanese  

    計算機の相互接続による広域ネットワークの商用化に伴い、ユーザを特定した機密性のある同報通信が強く求められている。同報暗号通信方式には、メンバ間で暗号鍵を共有する共通鍵方式と、各メンバが全メンバの公開鍵のリストを管理する個別鍵方式の2種類がある。しかし、共通鍵方式では、暗号鍵の横流しの恐れあり、閉鎖性に問題がある。一方、個別鍵方式では、横流しの心配はないが、メンバの追加や削除が困難である。そこで本稿では、上記方式の問題点を指摘し、その問題を解決するために、送信者と受信者の間に鍵交換センタを設けた鍵交換方式を提案する。さちに提案方式に基づく同報暗号メールシステムの実装について報告する。

    CiNii Research

    researchmap

  • Issuing Public Key Certificate with Notary for Privacy Enhanced Mail

    菊池 浩明, 黒田 康嗣

    全国大会講演論文集   48 ( 0 )   251 - 252   1994.3

     More details

    Language:Japanese  

    広域ネットワークInternetの商用利用が進むに伴い, 電子メールのセキュリティの重要性が問題となっている. 現在普及している電子メールシステムでは, 中継ネットワークでの盗聴と, 改竄に対する考慮がされていないためである. そこで, 暗号技術を適用し電子メールのセキュリティを強化するPEM(Privacy Enhanced Mail)が提案され, 現在世界中で盛んに実装と接続実験が繰り返されている. PEMでは, 公開鍵暗号と秘密鍵暗号をハイブリッドに組み合わせて暗号処理を高速化し, 信頼できる第三者(発行局)により電子署名された公開鍵証明書(証明書)によって公開鍵を安全に, かつ効率的に管理することを主な特徴としている. ところが, 証明書を正しく発行するためには, 申請者が正規のユーザであり, 偽りのない申請をしているかどうかを確認しなければならず, この証明書発行時のユーザ認証をどのように実現するかが, 発行局の大きな課題となっていた. ユーザの規模が小さい場合は, 管理者が直接確認したり, 信頼できる正規ユーザリストとの照合したりする認証が可能だが, 本研究が意図するInternetの様な大規模な環境では現実的ではない. 多数の発行局を階層的に組織する提案もあるが, 無計画な階層化では, 発行局が乱立してユーザ情報が分散し, 証明書の検索や配布が困難となる恐れもある. そこで, 本稿では, この課題に対して, 公証人による申請方式を提案する. そして, 提案方式を実装した発行局での運用実験を行ない, その安全性と広域環境での有効性を検討する.

    CiNii Research

    researchmap

  • Linear Resolution for Fuzzy Logic Program

    KIKUCHI Hiroaki, MUKAIDONO Masao

    Journal of Japan Society for Fuzzy Theory and Systems   6 ( 2 )   294 - 304   1994

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    Fuzzy Logic Programming is the theoretical foundation of Fuzzy Prolog which is a fuzzy Programming language based on fuzzy logic. In this paper, Fuzzy Logic Programming is defined such that (1) fuzzy definite clause which is a logic formula for a representation of uncertain assertion, (2)fuzzy logical consequence which is a fuzzy definite clause characterized to be correct conclusion, (3)SLD-resolution which is a procedure to obtain fuzzy logical consequences from a set of fuzzy definite clauses, (4)degree of resolution which is the value giving a fuzzy logical consequence with the highest confidence. The main results concern the soundness and completeness of SLD-resolution, that is, a fuzzy definite clause is Fuzzy logical consequence, if and only if it is resolved by SLD-resolution.

    DOI: 10.3156/jfuzzy.6.2_294

    CiNii Research

    researchmap

  • ファジィシステム国際会議FUZZ-IEEE'93に参加して

    菊池 浩明

    システム/制御/情報 : システム制御情報学会誌 = Systems, control and information   37 ( 7 )   428 - 429   1993.7

     More details

    Language:Japanese  

    CiNii Research

    researchmap

  • Some Considerations on the Implementation of a Privacy Enhanced Mail System

    菊池 浩明, 森下 哲次

    全国大会講演論文集   46 ( 0 )   99 - 100   1993.3

     More details

    Language:Japanese  

    計算機の相互接続による広域ネットワークの商用化に伴い,ネットワークアプリケーションのセキュリテイが問題となっている.これは,広域環境では,ネットワークの盗聴やパケットの改鼠が技術的に容易なためであり,こういった不正行為への対策として暗号技術の導入が強く求められている.そこで,実際に,電子メールを暗号化するシステムが試作されているが,広域環境での運用には次の問題点がある.1.大規模ユーザの鍵管理世界中の全ユーザについて,暗号鍵を個人管理することは非現実的である.2.処理速度公開鍵暗号は処理時間がかかり実用的でない.3.公開鍵データベースの必要性公開鍵を全世界に安全に分配するサービスは未開発である.公開鍵を偽れば容易にユーザのなりすましが出来るため,公開鍵の配布にも安全性が必要である.本稿では,Internetで標準化が進められている電子メールの暗号化形式であるPEM(Privacy Enhanced Mail)を取り上げる.これは,さまざまなネットワークの相互接続で構成されるというInternetの性質を考慮し,メールシステムや機種に特定しないで,通常のメールと併用できるという特徴を持っている.ただし,これまでは特許や輸出規制に関する問題などがあり,パッケージの公開を限定していたため,限定的な運用(S.Kentによれば92年9月で100人未満)にとどまっている.そこで我々は,運用に向けての課題を明らかにするため,PEMの独自実装と評価を行なった.

    CiNii Research

    researchmap

  • A BBS news gatcway to UNIX news system

    斉藤 紀, 松永 良太郎, 菊池 浩明, 森下 哲次

    全国大会講演論文集   46 ( 0 )   97 - 98   1993.3

     More details

    Language:Japanese  

    パソコン通信とUNIXネットワークとの連携は、研究者同士のより広範囲な情報交換の手段として注目を集めている。現在、商用パソコン通信サービスとインターネットとの間では、1対1の通信手段としてメール連携が既に試みられているが、同時に多数の利用者が議論に参加するN対Nの通信手段を提供することは、研究者のコミュニティを拡大し、コミュニケーションを円滑にする上で重要な課題である。今回この目的のために、パソコン通信内の以下に挙げる3つのサービスとUNIX二ュースとの連携システムを試作したので報告する。電子掲示版-全てのユーザが自由に利用できるオープンな情報交換の場。電子会議室-あるテーマに沿つてユーザ間で自由に意見を交換できるサービス。フォーラム-管理者によって整備されており、あるテーマに基づいて同じ意識や目的を持つたユーザ同士で情報交換、意見交換などを行なう場。この結果、UNIXユーザはパソコン通信にアクセスせずに、普段使い慣れたUNIXニュースでパソコン通信の記事を購読することができる。

    CiNii Research

    researchmap

  • インターネット電子掲示板におけるセキュリティ強化

    菊池浩明

    SCIS '93, 2A   1993

  • ファジィ理論入門--ファジィではないファジイのはなし-5完-

    向殿 政男, 菊池 浩明

    冷凍   66 ( 765 )   p748 - 754   1991.7

     More details

    Language:Japanese   Publisher:日本冷凍空調学会  

    CiNii Research

    researchmap

  • ファジィ理論入門--ファジィでないファジィのはなし-4-

    向殿 政男, 菊池 浩明

    冷凍   66 ( 764 )   p600 - 606   1991.6

     More details

    Language:Japanese   Publisher:日本冷凍空調学会  

    CiNii Research

    researchmap

  • ファジィ理論入門--ファジィでないファジィのはなし-3-

    向殿 政男, 菊池 浩明

    冷凍   66 ( 763 )   p544 - 549   1991.5

     More details

    Language:Japanese   Publisher:日本冷凍空調学会  

    CiNii Research

    researchmap

  • ファジィ理論入門--ファジィでないファジィのはなし-2-

    向殿 政男, 菊池 浩明

    冷凍   66 ( 762 )   p419 - 426   1991.4

     More details

    Language:Japanese   Publisher:日本冷凍空調学会  

    CiNii Research

    researchmap

  • ファジィ理論入門--ファジィでないファジィのはなし-1-

    向殿 政男, 菊池 浩明

    冷凍   66 ( 761 )   p300 - 305   1991.3

     More details

    Language:Japanese   Publisher:日本冷凍空調学会  

    CiNii Research

    researchmap

  • A Normal Form of Fuzzy Interval Logic Function

    菊池 浩明, 向殿 政男

    全国大会講演論文集   40 ( 0 )   45 - 46   1990.3

     More details

    Language:Japanese  

    ファジィ論理はあいまいさの理論であるファジィ集合論の本質である.ところが,我々の日常の論理にはファジィ論理では取り扱えない命題がいくつか存在する.例えば,次の命題の集合が恒真式として与えられたとする.{甘いものはおいしい, おいしいものは好き,太るものは好きでない,甘いものは太るものである}この時,命題「甘いものは好き」の真理値はどうなるだろうか? 真でありかつ偽である,これは矛盾である.逆に,上の恒真式の集合より,「高いものは好き」の真理値は定まるだろうか?これは未知と解釈できる.こうして,命題とその否定とが独立に閉区間[0,1]の値を真理値として取ることを許して,未知と矛盾のあいまいさを形式化することが本研究の動機である.ファジィインターバル論理では,/P/=0.5,/¬P/=0.4となる命題の真理値を[0.5,1-0.4]=[0.5,0.6]という区間真理値で表現する.本稿では,命題が区間真理値を取るとき,それらのまたは(∨),かつ(∧),否定(¬)で構成される論理式で表現するされる関数であるファジィインターバル論理関数の性質を明らかにして,その一意的に定まる標準形を提案する.

    CiNii Research

    researchmap

  • Proposal on Fuzzy Interval Logic

    MUKAIDONO Masao, KIKUCHI Hiroaki

    Journal of Japan Society for Fuzzy Theory and Systems   2 ( 2 )   209 - 222   1990

     More details

    Language:Japanese   Publisher:日本知能情報ファジィ学会  

    Fuzzy interval logic is proposed, which is a logical system extended from fuzzy logic for the purpose of representing unknown or contradictory information added to true and false. In the fuzzy interval logic, any proposition can be allowed to take an interval truth value [n, p], which is a special case of a linguistic truth value or the general case of a numerical one, where n and p are any values in the closed interval [0,1]. In this paper, introducing two partial ordered relations on the set of truth values of fuzzy interval logic, concerning truth and ambiguity, basic logic operators are defined. Some fundamental properties of a fuzzy interval logic function represented by a logic formula consisting of these operators and variables are studied. Kleene&#039;s law, which holds in fuzzy logic, doesn&#039;t hold here. The necessary and sufficient condition for two fuzzy logic formulas being equivalent each other is given using the quantization theorem. This shows that two fuzzy interval logic functions are equivalent when they take same value at only four values {[0,0], [1,1], [0,1], [1,0]}, that is, fuzzy interval logic is essentially four valued logic.

    DOI: 10.3156/jfuzzy.2.2_209

    CiNii Research

    researchmap

  • Online Handprinted Character Recognition in Fuzzy Prolog 'PROFIL'

    天野 光康, 菊池 浩明, 向殿 政男

    全国大会講演論文集   39 ( 0 )   542 - 543   1989.10

     More details

    Language:Japanese  

    オンライン手書き文字認識は,コンピュータへ情報を入力する上での有力な手段の一つである.しかし,認識率をあげるためにアルゴリズムが複雑化したもの,莫大な計算量と記憶領域を必要とするもの,辞書の構造が非常に複雑で辞書の変更や追加が容易でないものも少なくない.これらの多くは入力されたアナログ量を量子化することで認識を行なっていたが,その際のしきい値の決め方に問題があった.不特定筆記者による人力文字は,個人差のあるあいまいな情報であり,しきい値も本質的に一意に定まらない値である.このようなあいまい量を取り扱う理論としてファジィ理論があり,これを応用した文字認識システムがいくつか提案されている.本稿では,しきい値をファジィ数とした手法を提案し,このアルゴリズムをファジィProlog &#039;PROFIL&#039;を用いて実現した例を示す.並びに,構築された手書きひらがな文字認識システムの実験結果について報告する.

    CiNii Research

    researchmap

  • Shannon expansion in Fuzzy Interval Logic

    菊池 浩明, 向殿 政男

    全国大会講演論文集   39 ( 0 )   63 - 64   1989.10

     More details

    Language:Japanese  

    我々の日常のあいまいな論理構造を取り扱う論理体系にファジィ論理がある.そこに,真偽のあいまいさだけではなく,未知や矛盾に関するあいまいさを導入した論理体系=ファジィインターバル論理が提案されている.ここでは,ファジィ論理で用いられていた[0,1]上の数値の代わりに,区間[n,p]で真理値を取る.未知の度合はその閉区間の幅で,矛盾の度合は相当するファジィ集合の高さで表現される.「かつ」や「または」に相当する論理演算は,特殊な場合にファジィ論理を含む形で拡張されており,その代数系はドモルガン代数となることが知られている.また,それらの論理演算で構成される論理関数の数は有限であることも明らかにされている.本稿では,ファジィインターバル論理における論理関数の表現について議論する.そのために,2値論理で言うところのシャノン展開をファジィインターバル論理に拡張する.

    CiNii Research

    researchmap

  • Prolog in 4-valued logic

    菊池 浩明, 向殿 政男

    全国大会講演論文集   38 ( 0 )   1015 - 1016   1989.3

     More details

    Language:Japanese  

    Prologは述語論理に基づく論理型のプログラミング言語であり,そのプログラムの実行は導出原理による機械的証明手続きとして解釈できることがよく知られている.ところが,Prologでは,導出の効率のために述語論理の部分系であるホーン集合に限った導出しか実現されていない.よって,命題が偽であることの証明はできず,否定演算も通常の論理否定とは異なっている.通常これらの問題は閉世界仮説,すなわち,証明できないもの(未知,未定義)は偽であるとする仮説で理由付けられてはいるが,推論システムにとって本質的な情報である未知量を無視する考え方には疑問が残る.そこで本稿では,4値論理(真,偽,未知,矛盾)に基づくPrologを提案し,これまで偽と同一視することで排除されていた未知の情報を積極的に認めることを試みる.

    CiNii Research

    researchmap

▼display all

Presentations

  • オンラインターゲティング広告におけるユーザ閲覧履歴入札の数理モデル,

    田口 勇翔, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)2025  2025.3 

     More details

  • 合成データ生成における匿名化の適用に関する一検討

    森 毅, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)2025  2025.3 

     More details

  • カメラ画像を利用した人物追跡における日欧米法規制の違いを配慮したプライバシーチェック項目化の提案

    高木 淳二, 牛田 芽生恵, 松山 佳彦, 安部 登樹, 菊池 浩明

    情報処理学会,研究報告セキュリティ心理学とトラスト(SPT)2025  2025.3 

     More details

  • 2FAをバイパスする中間者攻撃ツールEvilginx によるフィッシング攻撃の脅威分析

    太田和希, 菊池浩明

    情報処理学会第87回全国大会  2025.3 

     More details

  • ウェブサイトからマウス履歴を取得するセッションリプレイサービスの検出ツールの開発

    田口凱之, 菊池浩明

    情報処理学会第87回全国大会  2025.3 

     More details

  • 頭部と両手腕のモーションデータのDTW距離に基づくVRユーザ識別

    三浦 晃暉, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)2025  2025.3 

     More details

  • ポイズニング攻撃に対してロバストなKey-Valueデータにおけるローカル差分プライバシプロトコル

    堀込 光, 藤田 真浩, 菊池 浩明, Chia-Mu Yu

    コンピュータセキュリティシンポジウム2024  2024.10 

     More details

  • LDPを満たした決定木学習

    菊池 浩明

    コンピュータセキュリティシンポジウム2024  2024.10 

     More details

  • Training Machine Learning Models for Behavior Estimation from Smartwatch with Local Differential Privacy

    2024.10 

     More details

  • PerturbationCity: プライバシ保護合成ビデオ

    牛田 芽生恵, 松山 佳彦, 菊池 浩明

    情報処理学会,コンピュータセキュリティシンポジウム2024  2024.10 

     More details

  • Key-ValueデータのLDPプロトコルPCKVの推定値操作攻撃の提案と評価

    谷口 輝海, 菊池 浩明

    コンピュータセキュリティシンポジウム2024  2024.10 

     More details

  • 差分プライバシーを保証したモデル説明DPGD-Explainに対するレコード再構築リスクの実験評価

    當麻 僚太郎, 菊池 浩明

    コンピュータセキュリティシンポジウム2024  2024.10 

     More details

  • ポリファーマシーの差分プライベートなリスク因子分析

    菊池,浩明, Andres,Hernandez-Matamoros

    研究報告コンピュータセキュリティ(CSEC)2024  2024.7 

     More details

  • シャッフルモデルにおける差分プライバシの ポイズニング攻撃の耐性評価

    堀込 光, 藤田 真浩, 菊池, 浩明

    マルチメディア,分散,協調とモバイルシンポジウム2024  2024.6 

     More details

  • Header Bidding情報を用いたペルソナに応じたターゲティング広告の調査

    田口 勇翔, 菊池 浩明

    マルチメディア,分散,協調とモバイルシンポジウム2024  2024.6 

     More details

  • 匿名化されたヘルスケアデータのプライバシーベンチマーク

    菊池浩明, 千田浩司

    2024年度人工知能学会全国大会  2024.5 

     More details

  • セッションリプレイサービスからの個人識別性と国内外サイトにおけるプライバシーポリシーでの公表状況

    梶間 大地, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)2024  2024.3 

     More details

  • 紛失通信とアダマール変換を用いてポイズニング安全性を強化したLDP方式の提案

    清水正浩, 菊池浩明

    電子情報通信学会  2024.3 

     More details

  • AIモデルの説明可能性LIMEとShapley値からの属性推定リスクの評価

    當麻僚太郎, 菊池浩明

    電子情報通信学会  2024.3 

     More details

  • カメラ画像を利用したサービスへの受容性を高めるプライバシー保護の仕組みの調査

    牛田 芽生恵, 名田 元, 安部 登樹, 菊池 浩明

    研究報告コンシューマ・デバイス&システム(CDS)  2024.1 

     More details

  • 高次元データの局所差分プライバシーの推定精度を向上する擬似逆行列ベース手法

    菊池浩明

    コンピュータセキュリティシンポジウム2023  2023.10 

     More details

  • AIモデルの説明可能性Shapley値からの属性推定リスクの評価とその対策

    當麻 僚太郎, 菊池 浩明

    コンピュータセキュリティシンポジウム2023  2023.10 

     More details

  • 匿名化において差分プライバシーは十分に安全な指標になっているか?

    野島 良, 王 立華, 菊池 浩明

    コンピュータセキュリティシンポジウム2023  2023.10 

     More details

  • A Randomized Response Layer for Ensuring User Privacy in Synthetic Data Generation

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    2023.10 

     More details

  • 歩容に基づく個人識別におけるKinectとOpenPoseの多人数追跡評価

    當麻 僚太郎, 谷口 輝海, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)  2023.3 

     More details

  • IPブラックリストを用いたResidential IP Proxyホスト検知手法の提案

    北原拓海, 菊池浩明

    情報処理学会,第85回全国大会講  2023.3 

     More details

  • プライバシーポリシーへの記載がない隠しセッションリプレイサービスの導入状況調査

    梶間 大地, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)  2023.3 

     More details

  • 匿名化された健康診断と診療履歴の時系列データによる糖尿病罹患予測

    清水正浩, 石山晴斗, 菊池浩明

    情報処理学会,第85回全国大会  2023.3 

     More details

  • Residential IP Proxyサービスのホストを介した潜在的不正行為の調査

    守屋,龍一, 北原,拓海, 福田,ひかり, 菊池,浩明

    研究報告コンピュータセキュリティ(CSEC)  2023.3 

     More details

  • 個人データの各種利用方法の可否に関する社会調査結果と分析

    中川 裕志, 菊池 浩明

    研究報告セキュリティ心理学とトラスト(SPT), 2022  2022.12 

     More details

  • Risk Evaluation of LDP scheme LoPub against Variational Autoencoder,

    Andres Hernandez-Matamoros, Hiroaki Kikuchi

    2022.10 

     More details

  • 個人データの利用に対する許容度に関する社会調査

    中川 裕志, 菊池 浩明

    コンピュータセキュリティシンポジウム2022  2022.10 

     More details

  • Estimating Joint Probability of Independently Randomized Multi-dimensional Data,

    H. Kikuchi, J. Domingo-Ferrer

    2022.10 

     More details

  • ポイズニング攻撃に対してロバストなEMアルゴリズムを用いたkey-valueデータにおけるLDP プロトコル

    堀込 光, 菊池 浩明, Chia-Mu Yu

    コンピュータセキュリティシンポジウム2022  2022.10 

     More details

  • 個人情報保護システム要件一覧抽出ツールの実現

    藤田 真浩, 山中 忠和, 松田 規, 吉村 礼子, 堀込 光, 伊藤 聡志, 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)  2022.7 

     More details

  • key-valueデータにおける局所差分プライバシーアルゴリズムPrivKVの改良

    堀込 光, 菊池 浩明, Chia-Mu Yu

    マルチメディア,分散,協調とモバイルシンポジウム (DICOMO 2022), 情報処理学会  2022.7 

     More details

  • ARPテーブルスプーフィング攻撃のリスク評価

    北原拓海, 菊池浩明

    情報処理学会,第84回全国大会  2022.3 

     More details

  • Residential IP Proxyサービスを悪用した不正行為の調査

    住友孝彰, 菊池浩明

    情報処理学会,第84回全国大会  2022.3 

     More details

  • Residential IP Proxy サービスを用いた位置情報・ターゲット広告の調査

    井窪竜矢, 福田ひかり, 菊池浩明

    情報処理学会,第84回全国大会  2022.3 

     More details

  • Webサイト上のターゲット広告の観測システムの開発

    青山綾佳, 梶間大地, 菊池浩明

    情報処理学会,第84回全国大会  2022.3 

     More details

  • 糖尿病罹患リスクを予測するヘルスケアデータの匿名化コンテストPWS Cup 2021 データの解析

    菊池浩明, 馬 瑞強

    2022年暗号と情報セキュリティシンポジウム SCIS 2022  2022.1 

     More details

  • PWS Cup 2021 – 糖尿病罹患リスクを予測するヘルスケアデータの匿名化コンテスト

    菊池浩明, 荒井ひろみ, 井口誠, 小栗秀暢, 黒政敦史, 千田浩司, 中川裕志, 中村優一, 西山賢志郎, 野島良, 波多野卓磨, 濱田浩気, 古川諒, 馬瑞強, 前田若菜, 村上隆夫, 山岡裕司, 山田明, 渡辺知恵美

    コンピュータセキュリティシンポジウム2021  2021.10 

     More details

  • 完全 k-concealment 匿名化を求める 精度の高いアルゴリズムの評価

    伊藤聡志, 菊池浩明

    コンピュータセキュリティシンポジウム2021  2021.10 

     More details

  • アドネットワークにおける広告効果指標の調査

    柴山 りな, 草野 蘭之介, 菊池 浩明

    マルチメディア,分散,協調とモバイルシンポジウム (DICOMO 2021), 情報処理学会  2021.6 

     More details

  • 歩数とレセプトの匿名加工情報を用いた歩行不足による生活習慣病の罹患リスク

    進藤翔太, 池上和輝, 伊藤聡志, 菊池浩明

    情報処理学会,第83回全国大会  2021.3 

     More details

  • 国内の匿名加工情報を一覧する利活用ポータルサイトの開発

    梶間大地, 伊藤聡志, 菊池浩明

    情報処理学会,第83回全国大会  2021.3 

     More details

  • 所属推定問題の山登り法に対する安全性について

    菊池 浩明

    2021年暗号と情報セキュリティシンポジウム SCIS 2021  2021.1 

     More details

  • Bitcoin取引履歴の特徴量に基づくアドレス識別リスクの評価

    松本 寛輝, 菊池 浩明

    コンピュータセキュリティシンポジウム2020  2020.10 

     More details

  • 匿名加工情報取扱事業者による公表情報を利用した匿名加工カタログの提案と実装

    藤田 真浩, 飯田 泰興, 服部 充洋, 山中 忠和, 松田 規, 伊藤 聡志, 菊池 浩明

    コンピュータセキュリティシンポジウム2020  2020.10 

     More details

  • 匿名加工情報取扱事業者の公表情報の記載内容に関する初期検討:匿名加工カタログの実装から得られた知見の報告

    藤田 真浩, 飯田 泰興, 服部 充洋, 山中 忠和, 松田 規, 伊藤 聡志, 菊池 浩明

    コンピュータセキュリティシンポジウム2020  2020.10 

     More details

  • 匿名加工情報の応用(2):各種傷病を予測する健康診断モデル

    池上 和輝, 伊藤 聡志, 菊池 浩明

    コンピュータセキュリティシンポジウム2020  2020.10 

     More details

  • 匿名加工情報の応用(1): 健康診断データとレセプトデータの分析とプライバシーリスク評価

    伊藤 聡志, 池上 和輝, 菊池 浩明

    コンピュータセキュリティシンポジウム2020  2020.10 

     More details

  • 匿名化による差分プライベートな購入履歴プロファイリング

    菊池 浩明

    コンピュータセキュリティシンポジウム2020  2020.10 

     More details

  • SMS通知機能を悪用した新たなパスワードリセット脆弱性の脅威評価

    柴山 りな, 菊池 浩明

    マルチメディア,分散,協調とモバイルシンポジウム (DICOMO 2020), 情報処理学会  2020.6 

     More details

  • Local Differential Privacyによりプライバシーを考慮した位置情報分布推定

    堀込 光, 菊池 浩明

    マルチメディア,分散,協調とモバイルシンポジウム (DICOMO 2020), 情報処理学会  2020.6 

     More details

  • 歩容データからの「歩きスマホ」の検出

    高松毅瑠, 菊池浩明

    情報処理学会,第82回全国大会  2020.3 

     More details

  • 多要素認証を悪用したパスワードリセット手法PRMitM攻撃の被害を増加させる新たな要因の調査

    柴山りな, 菊池浩明

    情報処理学会,第82回全国大会  2020.3 

     More details

  • Torネットワークのクローラシステム(2) CAPTCHA自動解析

    梶間大地, 菊池浩明, 鳥居洸希

    情報処理学会,第82回全国大会  2020.3 

     More details

  • 匿名加工情報取扱事業者を調査するクローラーシステムの開発

    金子侑紀, 小野敦樹, 伊藤 聡, 服部充洋, 飯田泰興, 藤田真浩, 山中忠和, 菊池浩明

    情報処理学会,第82回全国大会  2020.3 

     More details

  • 偽造Wi-Fiアクセスポイントによる現在地情報のスプーフィング攻撃の脅威

    江藤一樹, 菊池浩明

    情報処理学会,第82回全国大会  2020.3 

     More details

  • 取引件数の時間分布の相関を用いたBitcoin取引所のユーザの属性推定

    山崎孝順, 草野蘭之介, 松本寛輝, 井垣秀星, 菊池浩明

    情報処理学会,第82回全国大会  2020.3 

     More details

  • カナダにおけるBitcoin ATMの利用者調査

    井垣秀星, 松本寛輝, 菊池浩明

    情報処理学会,第82回全国大会  2020.3 

     More details

  • 履歴データの数理モデルの提案とk-匿名化に必要なダミーレコード数推定への応用

    伊藤 聡志, 菊池 浩明

    情報処理学会,研究報告コンピュータセキュリティ(CSEC)  2020.3 

     More details

  • Bitcoinサービス業者と利用者アドレスの種類の推定と評価

    松本 寛輝, 井垣 秀星, 菊池 浩明

    情報処理学会,研究報告コンピュータセキュリティ(CSEC)  2020.3 

     More details

  • 匿名加工実施者の意図に着目した匿名加工手法評価システム

    藤田真浩, 飯田泰興, 服部充洋, 山中忠和, 松田規, 菊池浩明

    暗号と情報セキュリティシンポジウム SCIS 2020  2020.1 

     More details

  • 企業のサイバーインシデントの予測 ~あなたの会社は何年後にサイバーインシデントを受けるか?~

    池上和輝, 菊池浩明

    暗号と情報セキュリティシンポジウム SCIS 2020  2020.1 

     More details

  • Residential IP Proxyサービスに悪用される住宅用ホストの調査

    半澤 映拓, 菊池 浩明

    コンピュータセキュリティシンポジウム2019  2019.10 

     More details

  • 履歴データに対する匿名化モデルk-concealmentの改良手法の提案

    伊藤 聡志, 菊池 浩明

    コンピュータセキュリティシンポジウム2019  2019.10 

     More details

  • PWS PWS Cup 2019: ID識別・トレース推定に強い位置情報の匿名加工技術を競う

    村上隆夫, 荒井ひろみ, 井口誠, 小栗秀暢, 菊池浩明, 黒政敦史, 中川裕志, 中村優一, 西山賢志郎, 野島良, 波多野卓磨, 濱田浩気, 山岡裕司, 山口高康, 山田明, 渡辺知恵美

    コンピュータセキュリティシンポジウム2019  2019.10 

     More details

  • 新聞報道される情報漏えい事故の属性分析

    新原 功一, 池上 和輝, 菊池 浩明

    情報処理学会,研究報告セキュリティ心理学とトラスト(SPT)  2019.7 

     More details

  • k-匿名性の安全性について

    山田 道洋, 菊池 浩明

    情報処理学会研究報告,コンピュータセキュリティ研究会  2019.3 

     More details

    Language:Japanese  

    researchmap

  • 企業プレスリリースからのサイバーインシデント情報の自動収集と分析

    池上 和輝, 山田 道洋, 菊池 浩明

    第81回全国大会講演  2019.3 

     More details

    Language:Japanese  

    researchmap

  • 歩容データからの属性暴露リスクについて

    三好 駿, 森 駿文, 菊池 浩明

    第81回全国大会講演  2019.3 

     More details

    Language:Japanese  

    researchmap

  • 一般化匿名加工された購買履歴データのRFM分析有用性評価

    小林 祐貴, 中村 幸輝, 伊藤 聡志, 菊池 浩明

    第81回全国大会講演  2019.3 

     More details

    Language:Japanese  

    researchmap

  • Torネットワークのクローラシステムの開発と違法商品販売サイトの調査

    鳥居 洸希, 菊池 浩明

    第81回全国大会講演  2019.3 

     More details

    Language:Japanese  

    researchmap

  • 平均取引時間分布の相関を用いたBitcoinユーザのタイムゾーンの推定

    井垣 秀星, 永田 幸大, 菊池 浩明

    第81回全国大会講演  2019.3 

     More details

    Language:Japanese  

    researchmap

  • 複数の歩容特徴量のk近傍による「歩きスマホ」にロバストな個人識別手法の提案

    森 駿文, 菊池 浩明

    暗号と情報セキュリティシンポジウム SCIS 2019  2019.1 

     More details

    Language:Japanese  

    researchmap

  • 体臭によるプライバシーの侵害度合いの調査

    岡本 健太郎, 菊池 浩明

    コンピュータセキュリティシンポジウム2018  2018.10 

     More details

    Language:Japanese  

    researchmap

  • 歩容データのDTW距離に基づく個人識別における複数部位のフュージョン手法

    森 駿文, 菊池 浩明

    コンピュータセキュリティシンポジウム2018  2018.10 

     More details

    Language:Japanese  

    researchmap

  • 経営マネジメント状況による情報漏洩インシデント削減効果の評価(2)

    山田 道洋, 池上 和輝, 菊池 浩明, 乾 孝治

    コンピュータセキュリティシンポジウム2018  2018.10 

     More details

    Language:Japanese  

    researchmap

  • PWS Cup 2018: 匿名加工再識別コンテストの設計~履歴データの一般化・再識別~

    濱田 浩気, 荒井 ひろみ, 小栗 秀暢, 菊池, 浩明, 黒政 敦史, 中川, 裕志, 西山, 賢志郎, 波多野, 卓磨, 村上 隆夫, 山岡, 裕司, 山田 明, 渡辺 知恵美

    コンピュータセキュリティシンポジウム2018  2018.10 

     More details

    Language:Japanese  

    researchmap

  • 歩容データのDTW距離に基づく個人識別手法の提案と外乱に対する評価

    森 駿文, 菊池 浩明

    マルチメディア,分散協調とモバイルシンポジウム  2018.7 

     More details

    Language:Japanese  

    researchmap

  • プロファイル型ホワイトリスト準最適化手法の提案

    重本 倫宏, 川口 信隆, 藤井 翔太, 藤井 康広, 西田 昌平, 菊池 浩明

    マルチメディア,分散協調とモバイルシンポジウム  2018.7 

     More details

    Language:Japanese  

    researchmap

  • CNNを用いた顔認証システムの開発と追跡停止に対する評価

    脇 一史, 森 駿文, 菊池 浩明

    第80回全国大会講演  2018.3 

     More details

    Language:Japanese  

    researchmap

  • 個人情報漏洩の損害額の新しい数理モデルの提案

    山田 道洋, 菊池 浩明, 松山 直樹, 乾 孝治

    情報処理学会研究報告コンピュータセキュリティ  2018.3 

     More details

    Language:Japanese  

    researchmap

  • Bitcoinアドレスの送金先集合に基づく匿名性の評価

    永田 倖大, 菊池 浩明

    情報処理学会研究報告コンピュータセキュリティ(CSEC)  2018.3 

     More details

    Language:Japanese  

    researchmap

  • 情報漏洩インシデントの調査に基づく漏えい原因のデータマイニング

    池上 和輝, 菊池 浩明

    第80回全国大会講演  2018.3 

     More details

    Language:Japanese  

    researchmap

  • 悪意のあるデバイスBadUSBによる攻撃のリスク調査

    山本 拓巳, 菊池 浩明

    第80回全国大会講演  2018.3 

     More details

  • 匿名化アルゴリズムの公開・非公開による再識別容易性の比較

    濱田 浩気, 岡田 莉奈, 小栗 秀暢, 菊池 浩明, 中川 裕志, 野島 良, 波多野 卓磨, 正木 彰伍, 渡辺 知恵美

    暗号と情報セキュリティシンポジウム SCIS 2018  2018.1 

     More details

    Language:Japanese  

    researchmap

  • 二要素認証を悪用したパスワードリセット手法PRMitMの影響評価

    笹航太, 菊池浩明

    暗号と情報セキュリティシンポジウム SCIS 2018  2018.1 

     More details

    Language:Japanese  

    researchmap

  • オノマトペCAPTCHAの開発と評価:日英の比較

    滋野莉子, 山田道洋, 菊池浩明, 坂本真樹

    第22回 曖昧な気持ちに挑むワークショップ, ファジィ学会  2017.11 

     More details

    Language:Japanese  

    researchmap

  • PWSCUP2017: 長期間の履歴データの再識別リスクを競う

    菊池浩明, 小栗秀暢, 中川裕志, 野島良, 波多野卓磨, 濱田浩気, 村上隆夫, 門田将徳, 山岡裕司, 山田明, 渡辺知恵美

    コンピュータセキュリティシンポジウム2017論文集  2017.10 

     More details

    Language:Japanese  

    researchmap

  • RIG Exploit Kitにおける攻撃傾向の調査

    山田道洋, 小池倫太郎, 菊池浩明, 黄緒平

    コンピュータセキュリティシンポジウム2017  2017.10 

     More details

    Language:Japanese  

    researchmap

  • 背景知識の違いによる匿名加工データの攻撃者モデルの分類 と評価

    伊藤聡志, 菊池浩明, 中川裕志

    コンピュータセキュリティシンポジウム2017  2017.10 

     More details

    Language:Japanese  

    researchmap

  • プライバシー保護したIoTモバイルヘルス心拍変動及び睡眠 段階の周波数解析に関する考察

    黄 緒平, 菊池 浩明, 范俊逸

    コンピュータセキュリティシンポジウム2017  2017.10 

     More details

    Language:Japanese  

    researchmap

  • セキュリティ対処の影響を考慮した自動対処システムの提案

    重本 倫宏, 藤井 康広, 菊池 浩明

    コンピュータセキュリティシンポジウム2017  2017.10 

     More details

    Language:Japanese  

    researchmap

  • Drive-by Download攻撃における RIG Exploit Kitの解析回避手法の調査

    小池倫太郎, 菊池浩明

    コンピュータセキュリティシンポジウム2017  2017.10 

     More details

    Language:Japanese  

    researchmap

  • 深度センサによる歩容特徴量を用いた個人識別・追跡方式の提案

    森駿文, 菊池浩明

    コンピュータセキュリティシンポジウム2017  2017.10 

     More details

    Language:Japanese  

    researchmap

  • オノマトペCAPTCHAの開発と評価

    滋野 莉子, 山田 道洋, 山口 通智, 菊池 浩明, 坂本 真樹

    マルチメディア,分散,協調とモバイル(DICOMO2017)シンポジウム (Dicomo 2017)  2017.7 

     More details

    Language:Japanese  

    researchmap

  • 内部犯行を誘発する決定木分析

    山田道洋,新原功一,菊池浩明

    情報処理学会全国大会  2017.3 

     More details

  • 乗降と物販履歴データの識別リスク分析と匿名加工の検討

    伊藤 聡志 , 原田 玲央 , 菊池 浩明

    研究報告コンピュータセキュリティ  2017.3 

     More details

  • 共有アカウントは内部不正を誘発するか?(2)

    新原 功一,山田 道洋,菊池 浩明

    暗号と情報セキュリティシンポジウム (SCIS2017)  2017.1 

     More details

    Language:Japanese  

    researchmap

  • 良い仮名化 悪い仮名化

    早稲田篤志,野島良,盛合志帆,菊池浩明

    暗号と情報セキュリティシンポジウム (SCIS2017)  2017.1 

     More details

  • 匿名加工・再識別コンテストPWSCUP 2016の報告 ~安全性と有用性の評価~

    小栗 秀暢,菊池 浩明,中川 裕志,野島 良,濱田 浩気,村上 隆夫,山岡 裕司,山口高康,渡辺 知恵美

    暗号と情報セキュリティシンポジウム (SCIS2017)  2017.1 

     More details

    Language:Japanese  

    researchmap

  • 共有アカウントは内部不正を誘発するか?

    新原 功一 , 山田 道洋 , 菊池 浩明

    コンピュータセキュリティシンポジウム2016  2016.10 

     More details

  • 多様な話者により発話されたランダムな音韻列と単語の識別問題を用いた音声型CAPTCHAの研究

    山口 通智 , 菊池 浩明

    コンピュータセキュリティシンポジウム2016  2016.10 

     More details

    Language:Japanese  

    researchmap

  • PWSCUP: 履歴データを安全に匿名加工せよ

    菊池 浩明 , 小栗 秀暢 , 野島 良 , 濱田 浩気 , 村上 隆夫 , 山岡 裕司 , 山口 高康 , 渡辺 知恵美

    コンピュータセキュリティシンポジウム2016  2016.10 

     More details

    Language:Japanese  

    researchmap

  • プライバシーを保護した垂直分割線形回帰システムの実装とDPCデータセットを用いた評価

    濱永 千佳 , 菊池 浩明 , 康永 秀生 , 松居 宏樹 , 橋本 英樹

    マルチメディア,分散協調とモバイルシンポジウム2016  2016.7 

     More details

    Language:Japanese  

    researchmap

  • ユークリッド距離を用いた再識別手法とPWSCup2015の匿名加工データを用いた評価

    伊藤 聡志 , 菊池 浩明

    研究報告コンピュータセキュリティ(CSEC)  2016.5 

     More details

  • あみだくじを用いた対話的なブラウザ履歴漏洩の研究

    笹 航大 , 清水 雄太 , 菊池 浩明

    第78回全国大会講演  2016.3 

     More details

    Language:Japanese  

    researchmap

  • 「サイバーセキュリティ分野における研究開発への期待」

    菊池浩明

    NICTサイバーセキュリティシンポジウム2016  2016.3 

     More details

    Language:Japanese  

    researchmap

  • 人間行動を用いた自律進化型防御システムの提案

    仲小路博史 , 重本倫宏 , 鬼頭哲郎 , 林直樹 , 寺田真敏 , 菊池浩明

    暗号と情報セキュリティシンポジウム (SCIS2016)  2016.1 

     More details

  • 組織間での分散秘匿ロジスティック回帰 による脳卒中の分析

    菊池浩明,康永秀生, 松居宏樹,橋本秀樹

    第26回日本疫学会学術総会講演  2016.1 

     More details

    Language:Japanese  

    researchmap

  • 匿名加工再識別コンテストPWSCUP2015の報告と匿名加工方法の評価

    菊池 浩明, 山口 高康, 濱田 浩気, 山岡 裕司, 小栗 秀暢, 佐久間 淳

    暗号と情報セキュリティシンポジウム (SCIS2016)  2016.1 

     More details

  • eラーニングモデルにおける内部犯行誘発要因:個人属性,環境,成績

    新原 功一, 菊池 浩明

    第20 回 曖昧な気持ちに挑むワークショップ講演  2015.11 

     More details

  • e ラーニングをモデルとした内部犯行の予測因子の識別

    新原 功一, 菊池 浩明

    コンピュータセキュリティシンポジウム2015  2015.10 

     More details

    Language:Japanese  

    researchmap

  • 匿名加工・再識別コンテストIce & Fire の設計

    菊池 浩明, 山口 高康, 濱田 浩気, 山岡 裕司, 小栗 秀暢, 佐久間 淳

    コンピュータセキュリティシンポジウム2015  2015.10 

     More details

    Language:Japanese  

    researchmap

  • Privacy Issues in Big Data and Privacy-preserving Data Mining International conference

    Hiroaki Kikuchi

    The 29th IEEE International Conference on the Advanced Information Networking and Applications (AINA), IEEE, 2015.  2015.3 

     More details

    Language:English  

    researchmap

  • Privacy-Preserving Data Mining for Medical Applications International conference

    Hiroaki Kikuchi

    2013 AI Forum, Tamkang, Taiwan, 2013.  2013.5 

     More details

    Language:English  

    researchmap

  • Implementation and Evaluation of Privacy-Preserving Epidemic Analysis System

    電子情報通信学会技術研究報告 : 信学技報  2012.11 

     More details

    Language:Japanese  

    researchmap

  • Implementation and Evaluation of Privacy-Preserving Epidemic Analysis System

    SATO Tomoki, KIKUCHI Hiroaki, SAKUMA Jun

    IEICE technical report. Information and communication system security  2012.11 

     More details

    Language:Japanese  

    This paper studies privacy issues about epidemiological study. Epidemiological study needs to preserve the privacy of subjects because of involved personal information. Privacy is preserved through the use of the secure scalar product protocol based on public key cryptsystem and the secure function evaluation. The secure function evaluation has limitation of the performance to evaluate a product and a squared root. Therefore, this paper proposes a new computationally-e cient scheme of privacy-preserving epidemiological analysis. The performance and security of the proposed scheme are evaluated based on trial implementation.

    researchmap

  • Privacy-Preserving Distributed Decision Tree Learning with Boolean Class Attributes

    The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013)  2012.3 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    Kouichi Ito, Mebae Ushida, Hiroshi Tsuda, Yuji Yamaoka

    researchmap

  • Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine - a performance case study

    Proceedings of the 27th ACM Symposium on Applied Computing (SAC) Cloud Computing track, ACM, 2012.  2012.3 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    Anirban Basu,Jaideep Vaidya

    researchmap

  • プライバシー保護データマイニングの研究動向とバイオメトリクス認証への応用

    第1回バイオメトリクスと認識・認証シンポジウム (SBRA2011), EICE  2011.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Privacy-Preserving Protocol for Epidemiology in Effect of Radiation

    SATO TOMOKI, KIKUCHI HIROAKI, SAKUMA JUN

    IEICE technical report. Social Implications of Technology and Information Ethics  2011.7 

     More details

    Language:Japanese  

    This paper studies privacy issues in epidemiologies that aims to clarify statistical significant of interested attribute that is distributed into two independent parties. The first proposed protocol computes the size of intersection of two subsets, e.g., set of workers in risk of radiation effect and set of dead people in a period of time, without revealing any of element of set. The second proposed protocol allows to perform a hypothesis test without revealing the size of intersections of two subsets. The performance of the proposed scheme are evaluated based on trial implementation.

    researchmap

  • プライバシー保護データマイニング

    情報処理学会全国大会  2011.3 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Privacy-Preserving Item Recommendation System in Cloud Computing

    A. Basu, J. Vaidya, T. Dimitrakos

    Poster in the International Workshop on Security (IWSEC 2011), IPSJ, IEICE, Japan.  2011 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • 生体認証とプライバシー

    情報処理学会北信越支部講演会  2010.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • グラフ3彩色問題を用いた非対称認証に対する検討

    小田雅洋, 渡邊幸聖, 山本匠, 尾形わかは, 西垣正勝

    電子情報通信学会,バイオメトリックシステムセキュリティ研究会  2009.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    小田雅洋, 渡邊幸聖・山本匠, 尾形わかは, 西垣正勝

    researchmap

  • Privacy-Preserving Data Mining - Concepts and Issues

    National Computer Science and Engineering Conference (NCSEC 2009)  2009.11 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

▼display all

Awards

  • CSEC研究賞

    2018.10   情報処理学会   経営マネジメント状況による情報漏洩インシデント削減効果の評価

    山田道洋, 池上和輝, 菊池浩明, 乾孝治

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

    researchmap

  • 学生論文賞

    2017.10   コンピュータセキュリティシンポジウム2017   Drive-by Download攻撃における RIG Exploit Kitの解析回避手法の調査

    小池倫太郎, 菊池浩明

     More details

  • JIP Outstanding Paper

    2017.6   Zip Distribution Model for Quantifying Risk of Re-identification from Trajectory Data

     More details

  • 暗号と情報セキュリティシンポジウム (SCIS2017), 電子情報通信学会

    2017.1   暗号と情報セキュリティシンポジウム (SCIS2017), 電子情報通信学会   商品商品の特徴による再識別リスクとクラスタリングを用いた購買履歴データ匿名加工手法の提案

    原田玲央,伊藤 聡志,菊池 浩明

     More details

  • 情報処理学会JIP特選論文

    2016.10   “Zip Distribution Model for Quantifying Risk of Re-identification from Trajectory Data”

     More details

  • 第2回プライバシワークショップ2016 PWS CUP匿名加工・再識別コンテスト再識別賞

    2016.10  

    伊藤 聡志, 原田 玲央, 岡本 健太郎, 菊池 浩明 (「チームステテコ伊藤2」)

     More details

▼display all

Research Projects

  • Local Differential Privacy Technology with Guaranteed Transparency

    Grant number:23K11110  2023.4 - 2026.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant amount:\4680000 ( Direct Cost: \3600000 、 Indirect Cost:\1080000 )

    researchmap

  • 安全性と有用性の保証のあるヘルスケア匿名コホート基盤

    Grant number:21470731  2021 - 2026

    戦略的な研究開発の推進 戦略的創造研究推進事業 CREST 

    菊池 浩明

      More details

    Authorship:Principal investigator 

    個人の権利利益の保護に配慮して,安心してヘルスケア情報を提供する技術に匿名化がある.しかし,加工によりヘルスケア情報の分析結果が歪められることになり,医療情報として有用性が認めら れるレベルの品質の保証がない.そこで,差分プライバシーを適用し,安全性の理論的な保証のある加工技術を開発する.

    researchmap

    J-GLOBAL

  • Study on anonymization algorithm and risk to be re-identified using open data competition

    Grant number:18H04099  2018.4 - 2023.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A)  Grant-in-Aid for Scientific Research (A)

      More details

    Authorship:Principal investigator 

    Grant amount:\42510000 ( Direct Cost: \32700000 、 Indirect Cost:\9810000 )

    researchmap

  • Privacy-Preserving Logistic Regression for Medical Big Data

    Grant number:15K00194  2015.4 - 2018.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

    Kikuchi Hiroaki, Hashimoto Hideki

      More details

    Authorship:Principal investigator 

    Grant amount:\4680000 ( Direct Cost: \3600000 、 Indirect Cost:\1080000 )

    In this study, we propose a new secure protocols for privacy-preserving logistic regression of two vertically partitioned datasets. Our protocol is efficient in the sense that coefficients of logistic model are converged in few iterations by using the Iteratively Re-weighted Least Squares (IRLS). In the comparison to one of the existing work using the stochastic gradient descent (SGD), our protocol improved the performance of estimate from 30,000 to 7 iterations. We study the feasibility of the proposed protocol over the the Diagnosis Procedure Combination (DPC) database, a large-scale claim-based database of Japanese hospitals that contains confidential status of patients. Our scheme allows to estimate the probability of death with some patient information without revealing confidential data to the other party. Using the toy dataset and the trial implementation of the proposed scheme, we examine the accuracy of the proposed scheme and study the feasibility.

    researchmap

  • Easy Security and Privacy

    Grant number:15H03385  2015.4 - 2018.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    Adams Andrew

      More details

    Grant amount:\15860000 ( Direct Cost: \12200000 、 Indirect Cost:\3660000 )

    A cross-country study of attitudes to Snowden's revelations in Japan, Germany, Spain, Sweden, Mexico, New Zealand, People's Republic of China, and Taiwan. Showing some useful and interesting similarities and differences between attitudes to government surveillance and expectations of privacy across those countries. In order to analyse social policy issues, the methods of film studies have been applied in new ways. This innovative method of analysis reveals the process by which citizens understand concepts such as technical and legal power, control, rationality, ethics, etc. via superhero movies

    researchmap

  • A Study of Privacy Protection in Information Retrieval

    Grant number:15H02700  2015.4 - 2018.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)  Grant-in-Aid for Scientific Research (B)

    NAKAGAWA Hiroshi

      More details

    Authorship:Coinvestigator(s) 

    Grant amount:\17420000 ( Direct Cost: \13400000 、 Indirect Cost:\4020000 )

    Although the use of personal data which is particularly useful among big data is drawing attention, privacy protection of personal data is legally obligatory, and in order to realize sufficient utilization, it is indispensable to incorporate privacy protection technologies. In this research, as privacy protection technology, we propose new methods and evaluate them for the following research topics: application of differential privacy to density ratio estimation, theoretical expansion of differential privacy, algorithm to anonymize perchase history data, confidentiality of question intention by adding dummy question, countermeasures against leakage of privacy from answers to questions, privacy protection technology using isomorphic public key cryptography.

    researchmap

  • A User Authentication Method for Touch Screen Devices Having the Tolerance to Smudge Attacks

    Grant number:25330159  2013.4 - 2017.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

    Uchida Osamu

      More details

    Authorship:Coinvestigator(s) 

    Grant amount:\3120000 ( Direct Cost: \2400000 、 Indirect Cost:\720000 )

    Users of smartphones and/or tablet computers browse and download confidential document
    files routinely. Therefore, the higher security level is needed for smartphones and tablet computers than conventional mobile phones (feature phones). In this study, we proposed a user authentication method for touch screen devices that is resistant to smudge attacks, which guesses authentication pattern from dirt on the screen. We actually implemented it as an application for smartphones. The proposed method is an image authentication method that uses images taken by users themselves as pass images, and is also resistant to observation attacks and recording attacks. In addition, we conducted various considerations on the success rate of authentication and attack resistance, and examined improvements to improve them.

    researchmap

  • Privacy-Preserving Epidemiology Study for Vertically Partitioned Datasets

    Grant number:22300028  2010 - 2013

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    KIKUCHI HIROAKI, SAKUMA Jun

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\14170000 ( Direct Cost: \10900000 、 Indirect Cost:\3270000 )

    This paper proposes a new privacy-preserving scheme for estimating the size of the intersection of two given secret subsets. Given the inner product of two Bloom filters (BFs) of the given sets, the proposed scheme applies Bayesian estimation under an assumption of beta distribution for an a priori probability of the size to be estimated. The BF retains the communication complexity and the Bayesian estimation improves the estimation accuracy.
    A possible application of the proposed protocol is an epidemiological datasets regarding two attributes, Helicobacter pylori infection and stomach cancer. Assuming information related to Helicobacter Pylori infection and stomach cancer are separately collected, the protocol demonstrates that a Chi-squared test can be performed without disclosing the contents of the two confidential databases.

    researchmap

  • Development of Theory of Mechanism Design for Information Network Economics

    Grant number:20240015  2008 - 2012

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    YOKOO Makoto, SUGAWARA Toshiharu, WATANABE Takahiro, KIKUCHI Hiroaki, ODA Hidenori, IZUMI Kiyoshi, MATSUBARA Shigeo, YAMAKI Hirofumi, IWASAKI Atsushi, SAKURAI Yuko, ITO Takayuki

      More details

    Grant amount:\49530000 ( Direct Cost: \38100000 、 Indirect Cost:\11430000 )

    We have developed the mechanism generators which automatically generate the mechanism that can satisfy the given conditions. Especially, we proposed component mechanisms stored in mechanism data bases and also developed the technologies of automated mechanism design which are fundamental to mechanism generators.As our research results, we presented 68 papers at international/domestic conferences and published 54 papers in international/domestic journals. We received the best student award in 2008 and the best student award runner up in 2009 at Int. Conf. on AutonomousAgents and Multiagent Systems (AAMAS), which is one of the top international conferences in the research field of multiagent systems. Furthermore, in 2008, we received the best paper award at IEEE/WIC/ACM Int. Conf. on Intelligent Agent Technology (IAT). Our paper on the automated mechanism design technologies received Funai best paper award at FIT2011, which is a major domestic conference on information technologies.

    researchmap

  • Asymmetric Remote Biometric Authentication using Zero-Knowledge Proof

    Grant number:18300022  2006 - 2009

    Ministry of Education, Culture, Sports, Science and Technology  Grants-in-Aid for Scientific Research(基盤研究(B))  基盤研究(B)

    Hiroaki KIKUCHI, Masakatsu NISHIGAKI, 尾形 わかは, Wakaha OGATA

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\10850000 ( Direct Cost: \9200000 、 Indirect Cost:\1650000 )

    In this study, a new method for secure remote biometric authentication preventing the vulnerability of compromised biometrics is presented. The idea is based on a public-key cryptographical protocol, referred as Zero-knowledge Proof, which allows a user to prove that she has surely a valid biometric data without revealing the data. Hence, the scheme is free from the risk of disclosure of biometric data. Even if a malicious administrator has a privilege access to the private database, it is infeasible for him to learn the private template.The estimation based on the experimental implementati...

    researchmap

  • Study on Privacy Preserving Data Mining

    Grant number:16500088  2004 - 2005

    Ministry of Education, Culture, Sports, Science and Technology  Grants-in-Aid for Scientific Research(基盤研究(C))  基盤研究(C)

    Hiroaki KIKUCHI

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\3700000 ( Direct Cost: \3700000 )

    Study on Data Mining from Private Database of Questionnaires.We have studied the issue of disclosures of private evaluation from web-based questionnaire and clarified that the potential souse of disclosures is malicious insiders who engaged into administrative tasks of public server. In order to prevent dishonest behavior of malicious parties, we have applied a new cryptographical protocol of secure function evaluation using homomorphic public-key algorithms. The conventional protocol of secure function evaluation, however, can not apply here because a variety of question styles other than ...

    researchmap

  • 広域分散網におけるアクセス制御技術

    Grant number:08780405  1996

    文部科学省  科学研究費補助金(奨励研究(A))  奨励研究(A)

    菊池 浩明

      More details

    Grant type:Competitive

    Grant amount:\1000000 ( Direct Cost: \1000000 )

    本研究では,広域分散網におけるアクセス制御の課題を考察し、より広い範囲に適用するための試験実装を行った.その結果,インターネットに代表される管理者分散型のネットワーク環境においては、各々異なるポリシ-を持つ組織に属する利用者同士が相互に接続するための相互接続性が最も重要であることが明らかになった.本研究で実施された成果は次の通りである.1.ゼロ知識証明を利用するための多倍長剰余演算などの基本処理を行なうプログラムを試験実装した.基本処理にかかる計算時間を測定し,現在の計算機の能力から十分実用可能であることを明らかにした.2.WWWサーバでのアクセス制御技術について調査し,提案するアクセス制御機構を組み込み可能であることを検証した.3.アクセス制御リストが,エンティティの数に対してどれだけ増加するか考察を行ない,ファジィ論理関数について行なわれている階層化の研究結果との相互関連性について検討した.なお,現実のインターネットにおいて試験運用を行なう計画については,本年度の研究では実施に至らなかった.

    researchmap

  • 公開鍵証明基盤

      More details

    Grant type:Competitive

    researchmap

  • ファジィ論理関数による知識獲得

      More details

    Grant type:Competitive

    researchmap

  • 匿名オークションプロトコル

      More details

    Grant type:Competitive

    researchmap

  • public key certificate infractructure

      More details

    Grant type:Competitive

    researchmap

  • Knowledge acquisition based on fuzzy switching functions

      More details

    Grant type:Competitive

    researchmap

  • Anonymous Auction Protocol

      More details

    Grant type:Competitive

    researchmap

▼display all