Follow
Yoshio KAKIZAKI
Yoshio KAKIZAKI
Tokai University
Verified email at tokai.ac.jp - Homepage
Title
Cited by
Cited by
Year
Method for detecting a malicious domain by using whois and dns features
M Kuyama, Y Kakizaki, R Sasaki
The third international conference on digital security and forensics …, 2016
432016
A decentralized attribute management method and its implementation
Y Kakizaki, H Tsuji
Journal of Information Processing and Management 3 (1), 61-69, 2012
242012
Method for detecting a malicious domain by using only well-known information
M Kuyama, Y Kakizaki, R Sasaki
International Journal of Cyber-Security and Digital Forensics 5 (4), 166-174, 2016
102016
Evaluation to Classify Ransomware Variants based on Correlations between APIs.
J Zhou, M Hirose, Y Kakizaki, A Inomata
ICISSP, 465-472, 2020
82020
Security and privacy behavior definition for behavior driven development
T Okubo, Y Kakizaki, T Kobashi, H Washizaki, S Ogata, H Kaiya, ...
Product-Focused Software Process Improvement: 15th International Conference …, 2014
82014
Identity continuance in single sign-on with authentication server failure
K Yoshio, M Kazunari, I Keiichi
2011 Fifth International Conference on Innovative Mobile and Internet …, 2011
72011
Development and Evaluation of Intelligent Network Forensic System LIFT Using Bayesian Network for Targeted Attack Detection and Prevention.
R Sasaki, H Yamaki, Y Kakizaki, K Shimazaki, M Terada, T Uehara
International Journal of Cyber-Security and Digital Forensics 7 (4), 344-354, 2018
52018
A New Method for Reducing the Revocation Delay in the Attribute Authentication
Y Kakizaki, H Tsuji
The Second International Conference on Availability, Reliability and …, 2007
52007
A Method of An Anonymous Authentication For Flat-rate Service.
Y Kakizaki, H Yamamoto, H Tsuji
J. Comput. 1 (8), 36-42, 2006
52006
Evaluation of a Risk-Based Management Method for Online Accounts
T Akiyama, K Otani, Y Kakizaki, R Sasaki
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
42015
Key management scheme applicable to various topologies of sensor networks
H Yukimaru, Y Kakizaki, K Iwamura
2011 Sixth International Conference on Availability, Reliability and …, 2011
42011
A consideration of the reliability of registration and attribute exchange
K Yoshio, K Keiichi
2010 International Conference on Availability, Reliability and Security, 574-579, 2010
42010
A proposal of an anonymous authentication method for flat-rate service
Y Kakizaki, H Yamamoto, H Tsuji
First International Conference on Availability, Reliability and Security …, 2006
42006
Password strength measurement without password disclosure
T Sugai, T Ohigashi, Y Kakizaki, A Kanaoka
2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 157-164, 2019
32019
Identifier Migration in OpenID
M Kazunari, K Yoshio, I Keiichi
2011 Fifth International Conference on Innovative Mobile and Internet …, 2011
32011
A proposal of authentication method using attribute certificate
Y Kakizaki, H Tsuji
IPSJ SIG Technical Report, 2004
32004
Identifier migration for identity continuance in single sign-on
Y Kakizaki, K Maeda, K Iwamura
Journal of Information Security 3 (04), 307, 2012
22012
Fast implementation of the advanced encryption standard using atmega1281
K Toriumi, Y Kakizaki, K Iwamura
2011 Sixth International Conference on Availability, Reliability and …, 2011
22011
Online Accounts Management Method Using Risk-Based Approach
Y Kakizaki, T Akiyama, K Otani, R Sasaki
Journal of Computer and Communications 4 (14), 26-36, 2016
12016
E-butler: A User-Centric High Reliability Personal Portal Site
Y Kakizaki, Y Maeda, H Tsuji
2014 28th International Conference on Advanced Information Networking and …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20