default search action
Hitoshi Fuji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato:
Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages. J. Inf. Process. 27: 159-167 (2019) - 2018
- [j7]Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:
Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 929-944 (2018) - [j6]Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:
Multi-cast key distribution: scalable, dynamic and provably secure construction. Int. J. Inf. Sec. 17(5): 513-532 (2018) - [c10]Takashi Hatashima, Keita Nagai, Asami Kishi, Hikaru Uekusa, Shigeaki Tanimoto, Atsushi Kanai, Hitoshi Fuji, Kazuhiko Ohkubo:
Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime. COMPSAC (2) 2018: 707-712 - [c9]Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato:
Abnormal vehicle behavior induced using only fabricated informative CAN messages. HOST 2018: 134-137 - [c8]Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi:
Proposal of Secure Business Architecture by Visible Light Communication System. IIAI-AAI 2018: 817-822 - [c7]Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi:
Secure Visible Light Communication Business Architecture Based on Federation of ID Management. NBiS 2018: 578-589 - 2017
- [j5]Shoei Nashimoto, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
Buffer overflow attack with multiple fault injection and a proven countermeasure. J. Cryptogr. Eng. 7(1): 35-46 (2017) - [j4]Junko Takahashi, Yosuke Aragane, Toshiyuki Miyazawa, Hitoshi Fuji, Hirofumi Yamashita, Keita Hayakawa, Shintarou Ukai, Hiroshi Hayakawa:
Automotive Attacks and Countermeasures on LIN-Bus. J. Inf. Process. 25: 220-228 (2017) - 2016
- [c6]Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:
Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction. ProvSec 2016: 207-226 - [i1]Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction. IACR Cryptol. ePrint Arch. 2016: 833 (2016) - 2015
- [j3]Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 171-181 (2015) - [j2]Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji:
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 192-202 (2015) - 2014
- [c5]Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. COSADE 2014: 214-228 - 2013
- [c4]Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji:
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient. ACISP 2013: 286-301
2000 – 2009
- 2005
- [c3]Yuji Soejima, Eric Y. Chen, Hitoshi Fuji:
Detecting DDoS Attacks by Analyzing Client Response Patterns. SAINT Workshops 2005: 98-101 - 2003
- [j1]Dai Kashiwa, Eric Y. Chen, Hitoshi Fuji:
A countermeasure againstDDOS attacks using active networks technologies. Ann. des Télécommunications 58(3-4): 605-629 (2003) - 2002
- [c2]Yoshihiro Kitajima, Hitoshi Fuji, Seiichiro Satou, Hitoshi Ohsugi, Isao Gotou, Hitoshi Oono:
Consideration of EVMS Technique Application to Software Development. ECSQ 2002: 135-145 - 2000
- [c1]Teruyuki Komiya, Hitoshi Fuji, Motoi Sato:
A proposal on FlexibleCUG service architecture. ICPADS Workshops 2000: 315-320
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint