研究・学術実績

FLOW

ゼタントのメンバーの学術研究の実績をご紹介いたします。

国際学術論文誌

J. Kurihara, T. Kubo and T. Tanaka, "mu-ODNS: A Distributed Approach to DNS Anonymization with Collusion Resistance," Computer Networks, Elsevier, vol. 237, p. 110078, Dec. 2023.

国際学術会議

J. Kurihara, "Security and Privacy in DNS (Tutorial)," in Proceedings of the 2021 Society Conference of IEICE, Online, Sep. 14–17, 2021.

国際学術会議

J. Kurihara, and T. Kubo, "Mutualized oblivious DNS (mu-ODNS): Hiding a tree in the wild forest," Technical Report of IEICE, vol. 121, no. 102, NS2021-44, pp. 63–68, Jul. 2021.

プレプリント

J. Kurihara, and T. Kubo, "Mutualized oblivious DNS (mu-ODNS): Hiding a tree in the wild forest," Apr. 2021. [Online].

国際学術論文誌

I. Kurihara, J. Kurihara and T. Tanaka, "A New Security Measure in Secret Sharing Schemes and Secure Network Coding," IEEE Access, vol. 12, pp. 69163–69171, May 2024.

国際学術論文誌

J. Kurihara, T. Nakamura and R. Watanabe, "Private information retrieval from coded storage in the presence of omniscient and limited-knowledge Byzantine adversaries", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E104-A, no. 9, pp. 1271–1283, Sep. 2021.

国際学術論文誌

J. Kurihara, and T. Nakamura, "On the resistance to Byzantine and unresponsive servers in code-based PIR schemes," IEICE Communications Express, vol. 9, no. 7, pp. 342–347, Jul. 2020.

国際学術会議

R. Aoshima, J. Kurihara, and T. Tanaka, "Aggregable Generalized Deduplication," in Proceedings of the International Symposium on Information Theory and Its Applications 2024 (ISITA 2024), Taipei, Taiwan, Nov. 2024.

国際学術会議

K. Nakano, J. Kurihara, and T. Tanaka, "Private Information Delivery from Coded Storage against Byzantine and Eavesdropping Attacks," in Proceedings of the International Symposium on Information Theory and Its Applications 2024 (ISITA 2024), Taipei, Taiwan, Nov. 2024.

国際学術会議

R. Watanabe, A. Kubota, J. Kurihara, and K. Sakurai, "Extension of Resource Authorization Method with SSI in Edge Computing," in Advanced Information Networking and Applications, Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA 2024), Volume 6, ser. Lecture Notes Lecture Notes on Data Engineering and Communications Technologies, L. Barolli, Ed., vol. 204. Springer, Cham, 2024, pp. 385–394.

国際学術会議

R. Watanabe, A. Kubota, and J. Kurihara, "Application of Generalized Deduplication Techniques in Edge Computing Environments," in Advanced Information Networking and Applications, Proceedings of the 37-th International Conference on Advanced Information Networking and Applications (AINA 2023), Volume 3, ser. Lecture Notes in Networks and Systems, L. Barolli, Ed., vol. 655. Springer, Cham, 2023, pp. 585–596.

国際学術会議

R. Watanabe, A. Kubota, and J. Kurihara, "Resource Authorization Methods for Edge Computing," in Advanced Information Networking and Applications, Proceedings of the 36-th International Conference on Advanced Information Networking and Applications (AINA 2022), ser. Lecture Notes in Networks and Systems, L. Barolli, F. Hussain, and T. Enokido, Eds., vol. 449. Springer, Cham, 2022, pp. 167–179. 国内口頭発表

国際学術会議

K. Nakano, J. Kurihara, and T. Tanaka, "Private Information Delivery based on Arbitrary Linear Codes, and Its Characterization," Poster presentation at the 47-th Symposium on Information Theory and Its Applications (SITA 2024), Fukui, Japan, Dec. 10-13, 2024. (in Japanese)

国際学術会議

H. Kimura, J. Kurihara, and T. Tanaka, "Security Analysis of the Smart Lock Products against the Device Hijacking Attacks," in Proceedings of the Computer Security Symposium 2024 (CSS 2024), Kobe, Japan, Oct. 22–25, 2022.

国際学術会議

S. Hashimoto, T. Tanaka, and J. Kurihara, "A Monitoring Mechanism to realize the Byzantine Resilience in Federated Learning via Client Tracking," to appear in Proceedings of the Computer Security Symposium 2024 (CSS 2024), Kobe, Japan, Oct. 22–25, 2022. (in Japanese)

国際学術会議

K. Kita, J. Kurihara, and T. Tanaka, "An Authorization Method of Computing Resources for Handover of Edge Nodes in MEC Environment," in Proceedings of the 2024 Society Conference of IEICE, Saitama, Japan, Sep. 10–13, 2024. (in Japanese)

国際学術会議

R. Watanabe, A. Kubota, J. Kurihara, and K. Sakurai, "Extension of Resource Authorization Method with SSI in Edge Computing," CSEC Technical Report, Chiba, Japan, Mar. 18–19, 2024. (in Japanese)

国際学術会議

T. Kanayama, T. Tanaka, and J. Kurihara, "A study on privacy preserving detection system for phishing sites," in Proceedings of the 2024 IEICE General Conference, Hiroshima, Japan, Mar. 4–8, 2024. (in Japanese)

国際学術会議

I. Kurihara, J. Kurihara, and T. Tanaka, "A New Security Measure in Secret Sharing Schemes and Secure Network Coding," in Proceedings of the 2023 Computer Security Symposium 2023 (CSS2023), Fukuoka, Japan, Oct. 30–Nov. 2, 2023. (in Japanese)

国際学術会議

I. Kurihara, J. Kurihara, and T. Tanaka, "Individual Insecurity in Ramp Secret Sharing Schemes," in Proceedings of the 2023 IEICE General Conference, Saitama, Japan, Mar. 7–10, 2023. (in Japanese)

国際学術会議

R. Watanabe, A. Kubota, and J. Kurihara, "Application of generalized deduplication techniques in edge computing environments" in Proceedings of the Computer Security Symposium 2022 (CSS 2022), Kumamoto, Japan, Oct. 24–27, 2022.

国際学術会議

R. Watanabe, A. Kubota, and J. Kurihara, "Resource Authorization Patterns on Edge Computing," Technical Report of IEICE, vol. 120, no. 414, IN2020-68, pp. 85–90, Mar. 2021.

国際学術会議

J. Kurihara, T. Nakamura, and R. Watanabe, "On the Resistance to Byzantine and Unresponsive Servers in Code-based PIR Schemes," in Error-Correcting Codes Workshop (ECCWS) 2020, Online, Sep. 2–3, 2020. (in Japanese)