default search action
Yoshio Kakizaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Yuma Nishihira, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi, Hidenobu Watanabe, Tohru Kondo, Reiji Aibara:
Development of the Edge Computing Platform based on Modular Architecture using Intel SGX. AsiaJCIS 2023: 59-65 - 2022
- [c17]Yoshio Kakizaki, Renon Doine, Kenta Kuwana, Mikako Yoshida:
Implementing passive authentication with enhanced risk-based security. SITIS 2022: 78-83 - 2021
- [j4]Yoshio Kakizaki:
Editor's Message to Special Issue of Information Systems. J. Inf. Process. 29: 380 (2021) - 2020
- [c16]Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata:
Evaluation to Classify Ransomware Variants based on Correlations between APIs. ICISSP 2020: 465-472 - [c15]Yoshio Kakizaki, Ryôichi Sasaki, Tomohide Okochi, Hiroshi Yasuda:
CySec: Cybersecurity Review Program for Professionals in Japan. NBiS 2020: 280-289
2010 – 2019
- 2019
- [c14]Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka:
Password Strength Measurement without Password Disclosure. AsiaJCIS 2019: 157-164 - 2018
- [j3]Yoshio Kakizaki, Shiomi Nishibiro, Ryôichi Sasaki:
A Mixed Content Awareness Tool for Safe Browsing. J. Comput. 13(1): 90-99 (2018) - 2015
- [c13]Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki:
Evaluation of a Risk-Based Management Method for Online Accounts. CyberSec 2015: 52-57 - 2014
- [c12]Yoshio Kakizaki, Yoji Maeda, Hidekazu Tsuji:
E-butler: A User-Centric High Reliability Personal Portal Site. AINA Workshops 2014: 102-107 - [c11]Takao Okubo, Yoshio Kakizaki, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka:
Security and Privacy Behavior Definition for Behavior Driven Development. PROFES 2014: 306-309 - 2013
- [c10]Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura, Isao Echizen:
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number. AINA Workshops 2013: 877-882 - 2012
- [j2]Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:
Identifier Migration for Identity Continuance in Single Sign-On. J. Information Security 3(4): 307-313 (2012) - [c9]Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura:
Proposal of a watermarking scheme using winding number and unneeded synchronism. ISITA 2012: 802-805 - 2011
- [c8]Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura:
Fast Implementation of the Advanced Encryption Standard Using Atmega1281. ARES 2011: 342-346 - [c7]Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura:
Key Management Scheme Applicable to Various Topologies of Sensor Networks. ARES 2011: 448-453 - [c6]Yoshio Kakizaki, Maeda Kazunari, Keiichi Iwamura:
Identity Continuance in Single Sign-On with Authentication Server Failure. IMIS 2011: 597-602 - [c5]Maeda Kazunari, Yoshio Kakizaki, Keiichi Iwamura:
Identifier Migration in OpenID. IMIS 2011: 612-617 - 2010
- [c4]Yoshio Kakizaki, Keiichi Iwamura:
A Consideration of the Reliability of Registration and Attribute Exchange. ARES 2010: 574-579
2000 – 2009
- 2009
- [c3]Yoshio Kakizaki, Yoshiaki Yoshida, Hidekazu Tsuji:
An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information. ARES 2009: 984-989 - 2007
- [c2]Yoshio Kakizaki, Hidekazu Tsuji:
A New Method for Reducing the Revocation Delay in the Attribute Authentication. ARES 2007: 1175-1182 - 2006
- [j1]Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji:
A Method of An Anonymous Authentication For Flat-rate Service. J. Comput. 1(8): 36-42 (2006) - [c1]Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji:
A Proposal of An Anonymous Authentication Method For Flat-rate Service. ARES 2006: 551-557
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint