Method for detecting a malicious domain by using whois and dns features M Kuyama, Y Kakizaki, R Sasaki The third international conference on digital security and forensics …, 2016 | 43 | 2016 |
A decentralized attribute management method and its implementation Y Kakizaki, H Tsuji Journal of Information Processing and Management 3 (1), 61-69, 2012 | 24 | 2012 |
Method for detecting a malicious domain by using only well-known information M Kuyama, Y Kakizaki, R Sasaki International Journal of Cyber-Security and Digital Forensics 5 (4), 166-174, 2016 | 10 | 2016 |
Evaluation to Classify Ransomware Variants based on Correlations between APIs. J Zhou, M Hirose, Y Kakizaki, A Inomata ICISSP, 465-472, 2020 | 8 | 2020 |
Security and privacy behavior definition for behavior driven development T Okubo, Y Kakizaki, T Kobashi, H Washizaki, S Ogata, H Kaiya, ... Product-Focused Software Process Improvement: 15th International Conference …, 2014 | 8 | 2014 |
Identity continuance in single sign-on with authentication server failure K Yoshio, M Kazunari, I Keiichi 2011 Fifth International Conference on Innovative Mobile and Internet …, 2011 | 7 | 2011 |
Development and Evaluation of Intelligent Network Forensic System LIFT Using Bayesian Network for Targeted Attack Detection and Prevention. R Sasaki, H Yamaki, Y Kakizaki, K Shimazaki, M Terada, T Uehara International Journal of Cyber-Security and Digital Forensics 7 (4), 344-354, 2018 | 5 | 2018 |
A New Method for Reducing the Revocation Delay in the Attribute Authentication Y Kakizaki, H Tsuji The Second International Conference on Availability, Reliability and …, 2007 | 5 | 2007 |
A Method of An Anonymous Authentication For Flat-rate Service. Y Kakizaki, H Yamamoto, H Tsuji J. Comput. 1 (8), 36-42, 2006 | 5 | 2006 |
Evaluation of a Risk-Based Management Method for Online Accounts T Akiyama, K Otani, Y Kakizaki, R Sasaki 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 4 | 2015 |
Key management scheme applicable to various topologies of sensor networks H Yukimaru, Y Kakizaki, K Iwamura 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 4 | 2011 |
A consideration of the reliability of registration and attribute exchange K Yoshio, K Keiichi 2010 International Conference on Availability, Reliability and Security, 574-579, 2010 | 4 | 2010 |
A proposal of an anonymous authentication method for flat-rate service Y Kakizaki, H Yamamoto, H Tsuji First International Conference on Availability, Reliability and Security …, 2006 | 4 | 2006 |
Password strength measurement without password disclosure T Sugai, T Ohigashi, Y Kakizaki, A Kanaoka 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 157-164, 2019 | 3 | 2019 |
Identifier Migration in OpenID M Kazunari, K Yoshio, I Keiichi 2011 Fifth International Conference on Innovative Mobile and Internet …, 2011 | 3 | 2011 |
A proposal of authentication method using attribute certificate Y Kakizaki, H Tsuji IPSJ SIG Technical Report, 2004 | 3 | 2004 |
Identifier migration for identity continuance in single sign-on Y Kakizaki, K Maeda, K Iwamura Journal of Information Security 3 (04), 307, 2012 | 2 | 2012 |
Fast implementation of the advanced encryption standard using atmega1281 K Toriumi, Y Kakizaki, K Iwamura 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 2 | 2011 |
Online Accounts Management Method Using Risk-Based Approach Y Kakizaki, T Akiyama, K Otani, R Sasaki Journal of Computer and Communications 4 (14), 26-36, 2016 | 1 | 2016 |
E-butler: A User-Centric High Reliability Personal Portal Site Y Kakizaki, Y Maeda, H Tsuji 2014 28th International Conference on Advanced Information Networking and …, 2014 | 1 | 2014 |