AsiaJCIS 2025: Author IndexAuthor | Papers |
---|
A | Asano, Kyoichi | A Generic Zero-Knowledge Range Argument with Preprocessing | C | Chen, Guan-Yu | Registered Key-Policy Attribute-Based Encryption | Chen, Wei-Rung | Circular Quantum Secret Sharing Based on SWAP Gates | E | Emura, Keita | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | F | Fan, Chun-I | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | Furumoto, Keisuke | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | G | Guan, Albert | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | H | Hayashi, Mizuki | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | Hirose, Kenjiro | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | Huang, Jheng-Jia | Registered Key-Policy Attribute-Based Encryption | I | Igarashi, Yasutaka | Improved Integral Cryptanalysis on Reduced-Round Piccolo | Iwamoto, Mitsugu | A Generic Zero-Knowledge Range Argument with Preprocessing | J | Ji, Yeontae | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | K | Kao, Shih-Pei | Registered Key-Policy Attribute-Based Encryption | Kikuchi, Hiroaki | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | Kim, Hyungyeop | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | Kim, Kwangjo | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | L | Lee, Yao Yu | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | Liang, Hai | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Liao, Tzu-Yu | Circular Quantum Secret Sharing Based on SWAP Gates | Lin, Iuon-Chang | Circular Quantum Secret Sharing Based on SWAP Gates | Lin, Jason | Circular Quantum Secret Sharing Based on SWAP Gates | Liu, Zi-Yuan | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | Lu, Yi-Jiin | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption | M | Miura, Koki | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | Miyaji, Atsuko | Key-Value Commitments with Unlinkability An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | Morikawa, Tomohiro | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | N | Nishino, Hinata | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | O | Okumura, Shinya | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | Omote, Kazumasa | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | P | Peng, Xinyong | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Prabowo, Theo Fanuela | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | Praditasari, Wibby Aldryani Astuti | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | R | Rimbawa, Danang | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | S | Sasaki, Ayako | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | Sawai, Yuki | A Generic Zero-Knowledge Range Argument with Preprocessing | Shibayama, Naoki | Improved Integral Cryptanalysis on Reduced-Round Piccolo | T | Takahashi, Takeshi | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | Tan, Chik How | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | Tao, Wenkang | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Tsai, Pei-Shiun | Circular Quantum Secret Sharing Based on SWAP Gates | Tsai, Tien-Lin | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption | Tseng, Yi-Fan | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption | Tsujimoto, Yuto | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | Tsujimura, Towa | Key-Value Commitments with Unlinkability | W | Wang, Shuo | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Wang, Wei-Hsueh | Registered Key-Policy Attribute-Based Encryption | Wang, Yujue | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Watanabe, Yohei | A Generic Zero-Knowledge Range Argument with Preprocessing | X | Xu, Yu | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | Y | Yi, Okyeon | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | Yoon, Hyejin | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | You, Gunsang | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | Youm, Heung Youl | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
|
|