Takeshi Shimoyama
Applied Filters
- Takeshi Shimoyama
- AuthorRemove filter
People
Colleagues
- Takeshi Shimoyama (38)
- Jun Kogure (10)
- Tetsuya Izu (9)
- Jun Yajima (7)
- Masaya Yasuda (7)
- Takeshi Koshiba (7)
- Yu Sasaki (7)
- Kazuhiro Yokoyama (6)
- Masahiko Takenaka (6)
- Kazuo Ohta (5)
- Noboru Kunihiro (5)
- Shiho Moriai (5)
- Toshinobu Kaneko (5)
- Yusuke Naito (4)
- Chiaki Ohtahara (3)
- Hitoshi Yanami (3)
- Keita Okada (2)
- Naoyuki Shinohara (2)
- Terutoshi Iwasaki (2)
- Tsuyoshi Takagi (2)
Publication
Proceedings/Book Names
- FSE '02: Revised Papers from the 9th International Workshop on Fast Software Encryption (2)
- ACISP'03: Proceedings of the 8th Australasian conference on Information security and privacy (1)
- ACISP'07: Proceedings of the 12th Australasian conference on Information security and privacy (1)
- ACISP'11: Proceedings of the 16th Australasian conference on Information security and privacy (1)
- ARES '07: Proceedings of the The Second International Conference on Availability, Reliability and Security (1)
- ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security (1)
- ASIACRYPT'06: Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security (1)
- CCSW '13: Proceedings of the 2013 ACM workshop on Cloud computing security workshop (1)
- CHES '07: Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems (1)
- Cryptography and Coding (1)
- Cryptography and Coding'07: Proceedings of the 11th IMA international conference on Cryptography and coding (1)
- Inscrypt'10: Proceedings of the 6th international conference on Information security and cryptology (1)
- IWSEC'07: Proceedings of the Security 2nd international conference on Advances in information and computer security (1)
- IWSEC'10: Proceedings of the 5th international conference on Advances in information and computer security (1)
- NBIS '10: Proceedings of the 2010 13th International Conference on Network-Based Information Systems (1)
- SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud Computing (1)
- SCN'02: Proceedings of the 3rd international conference on Security in communication networks (1)
- VIETCRYPT'06: Proceedings of the First international conference on Cryptology in Vietnam (1)
- WISA'05: Proceedings of the 6th international conference on Information Security Applications (1)
- WISA'11: Proceedings of the 12th international conference on Information Security Applications (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- Article
How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts
- Tetsuya Izu
FUJITSU LABORATORIES Ltd., 4-1-1, Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588, Japan
, - Takeshi Shimoyama
FUJITSU LABORATORIES Ltd., 4-1-1, Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588, Japan
, - Masahiko Takenaka
FUJITSU LABORATORIES Ltd., 4-1-1, Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588, Japan
AbstractThis paper shows how to forge a time-stamp which the latest version of Adobe’s Acrobat and Acrobat Reader accept improperly. The target signature algorithm is RSASSA-PKCS1-v1_5 with a 1024-bit public composite and the public key e = 3, and our ...
- 0Citation
MetricsTotal Citations0
- Tetsuya Izu
- article
Computational hardness of IFP and ECDLP
- Masaya Yasuda
Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan 819-0395
, - Takeshi Shimoyama
Fujitsu Laboratories LTD, Kawasaki, Japan 211-8588
, - Jun Kogure
Fujitsu Laboratories LTD, Kawasaki, Japan 211-8588
, - Tetsuya Izu
Data Analytics Research Division, FUJITSU Laboratories of Europe Ltd., Middlesex, United Kingdom UB4 8FE
Applicable Algebra in Engineering, Communication and Computing, Volume 27, Issue 6•December 2016, pp 493-521 • https://doi.org/10.1007/s00200-016-0291-xThe RSA cryptosystem and elliptic curve cryptography (ECC) have been used practically and widely in public key cryptography. The security of RSA and ECC respectively relies on the computational hardness of the integer factorization problem (IFP) and the ...
- 2Citation
MetricsTotal Citations2
- Masaya Yasuda
- article
New packing method in somewhat homomorphic encryption and its applications
- Masaya Yasuda
Fujitsu Laboratories Ltd., 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, Kanagawa 211-8588, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, Kanagawa 211-8588, Japan
, - Jun Kogure
Fujitsu Laboratories Ltd., 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, Kanagawa 211-8588, Japan
, - Kazuhiro Yokoyama
Department of Mathematics, Rikkyo University, Tokyo 171-8501, Japan
, - Takeshi Koshiba
Division of Mathematics, Electronics and Informatics, Graduate School of Science and Engineering, Saitama University, Saitama, 338-8570, Japan
Security and Communication Networks, Volume 8, Issue 13•September 2015, pp 2194-2213 • https://doi.org/10.1002/sec.1164Somewhat homomorphic encryption is public key encryption supporting a limited number of additions and multiplications on encrypted data. This encryption gives a powerful tool in performing meaningful computations with protecting data confidentiality, ...
- 10Citation
MetricsTotal Citations10
- Masaya Yasuda
- research-articlePublished By ACMPublished By ACM
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption
- Masaya Yasuda
Fujitsu Laboratories Ltd., Kawasaki, Japan
, - Takeshi Koshiba
Saitama University, Saitama, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., Kawasaki, Japan
, - Jun Kogure
Fujitsu Laboratories Ltd., Kawasaki, Japan
, - Kazuhiro Yokoyama
Rikkyo University, Nishi-Ikebukuro, Japan
SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud Computing•April 2015, pp 53-61• https://doi.org/10.1145/2732516.2732521Homomorphic encryption can support meaningful operations on encrypted data, and hence it enables users to outsource their data in encrypted format to cloud services. However, homomorphic encryption cannot operate on ciphertexts with different keys in ...
- 0Citation
- 191
- Downloads
MetricsTotal Citations0Total Downloads191
- Masaya Yasuda
- research-articlePublished By ACMPublished By ACM
Secure pattern matching using somewhat homomorphic encryption
- Masaya Yasuda
FUJITSU LABORATORIES LTD., Kawasaki, Japan
, - Takeshi Shimoyama
FUJITSU LABORATORIES LTD., Kawasaki, Japan
, - Jun Kogure
FUJITSU LABORATORIES LTD., Kawasaki, Japan
, - Kazuhiro Yokoyama
Rikkyo University, Nishi-Ikebukuro, Tokyo, Japan
, - Takeshi Koshiba
Saitama University, Saitama, Japan
CCSW '13: Proceedings of the 2013 ACM workshop on Cloud computing security workshop•November 2013, pp 65-76• https://doi.org/10.1145/2517488.2517497The basic pattern matching problem is to find the locations where a pattern occurs in a text. Recently, secure pattern matching has been received much attention in various areas, including privacy-preserving DNA matching and secure biometric ...
- 66Citation
- 1,537
- Downloads
MetricsTotal Citations66Total Downloads1,537Last 12 Months86Last 6 weeks5
- Masaya Yasuda
- Article
Practical Packing Method in Somewhat Homomorphic Encryption
- Masaya Yasuda
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
, - Jun Kogure
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
, - Kazuhiro Yokoyama
Department of Mathematics, Rikkyo University, Tokyo, Japan
, - Takeshi Koshiba
Division of Mathematics, Electronics and Informatics, Graduate School of Science and Engineering, Saitama University, Sakura, Saitama, Japan
Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247•September 2013, pp 34-50• https://doi.org/10.1007/978-3-642-54568-9_3Somewhat homomorphic encryption is public key encryption supporting a limited number of both additions and multiplications on encrypted data, which is useful for performing fundamental computations with protecting the data confidentiality. In this paper,...
- 5Citation
MetricsTotal Citations5
- Masaya Yasuda
- Article
Breaking pairing-based cryptosystems using ηT pairing over GF(397)
- Takuya Hayashi
Kyushu University, Japan
, - Takeshi Shimoyama
FUJITSU LABORATORIES Ltd., Japan
, - Naoyuki Shinohara
National Institute of Information and Communications Technology, Japan
, - Tsuyoshi Takagi
Kyushu University, Japan
ASIACRYPT'12: Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security•December 2012, pp 43-60• https://doi.org/10.1007/978-3-642-34961-4_5In this paper, we discuss solving the DLP over GF(36·97) by using the function field sieve (FFS) for breaking paring-based cryptosystems using the ηT pairing over GF(397). The extension degree 97 has been intensively used in benchmarking tests for the ...
- 3Citation
MetricsTotal Citations3
- Takuya Hayashi
- Article
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices
- Masaya Yasuda
Fujitsu Laboratories Ltd., Nakahara-ku, Japan
, - Jun Yajima
Fujitsu Laboratories Ltd., Nakahara-ku, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., Nakahara-ku, Japan
, - Jun Kogure
Fujitsu Laboratories Ltd., Nakahara-ku, Japan
EuroPKI 2012: Revised Selected Papers of the 9th European Workshop on Public Key Infrastructures, Services and Applications - Volume 7868•September 2012, pp 1-16• https://doi.org/10.1007/978-3-642-40012-4_1In 2009, Gentry first proposed a concrete method for constructing a fully homomorphic encryption FHE scheme, which supports arbitrary operations on encrypted data. The construction of the FHE scheme starts from a somewhat homomorphic encryption SHE ...
- 1Citation
MetricsTotal Citations1
- Masaya Yasuda
- Article
On the strength comparison of the ECDLP and the IFP
- Masaya Yasuda
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
, - Jun Kogure
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
, - Tetsuya Izu
Fujitsu Laboratories Ltd., Nakahara-ku, Kawasaki, Japan
SCN'12: Proceedings of the 8th international conference on Security and Cryptography for Networks•September 2012, pp 302-325• https://doi.org/10.1007/978-3-642-32928-9_17At present, the RSA cryptosystem is most widely used in public key cryptography. On the other hand, elliptic curve cryptography (ECC) has recently received much attention since smaller ECC key sizes provide the same security level as RSA. Although there ...
- 3Citation
MetricsTotal Citations3
- Masaya Yasuda
- Article
Key length estimation of pairing-based cryptosystems using ηT pairing
- Naoyuki Shinohara
National Institute of Information and Communications Technology, Japan
, - Takeshi Shimoyama
FUJITSU LABORATORIES Ltd., Japan
, - Takuya Hayashi
Kyushu University, Japan
, - Tsuyoshi Takagi
Kyushu University, Japan
ISPEC'12: Proceedings of the 8th international conference on Information Security Practice and Experience•April 2012, pp 228-244• https://doi.org/10.1007/978-3-642-29101-2_16The security of pairing-based cryptosystems depends on the difficulty of the discrete logarithm problem (DLP) over certain types of finite fields. One of the most efficient algorithms for computing a pairing is the ηT pairing over supersingular curves ...
- 2Citation
MetricsTotal Citations2
- Naoyuki Shinohara
- Article
Preimage attacks on Full-ARIRANG: analysis of DM-Mode with middle feed-forward
- Chiaki Ohtahara
Chuo-University, Japan
, - Keita Okada
Chuo-University, Japan
, - Yu Sasaki
NTT Information Sharing Platform Laboratories, NTT Corporation, Musashino-shi, Tokyo, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories LTD, Japan
WISA'11: Proceedings of the 12th international conference on Information Security Applications•August 2011, pp 40-54• https://doi.org/10.1007/978-3-642-27890-7_4In this paper, we present preimage attacks on hash function ARIRANG, which is one of the first round candidates in the SHA-3 competition. Although ARIRANG was not chosen for the second round, the vulnerability as a hash function has not been discovered ...
- 2Citation
MetricsTotal Citations2
- Chiaki Ohtahara
- Article
Preimage attacks on full-ARIRANG
- Chiaki Ohtahara
Chuo-University
, - Keita Okada
Chuo-University
, - Yu Sasaki
NTT Corporation
, - Takeshi Shimoyama
Fujitsu Laboratories LTD.
ACISP'11: Proceedings of the 16th Australasian conference on Information security and privacy•July 2011, pp 417-422This paper presents ongoing work toward the first preimage attacks on hash function ARIRANG, which is one of the first round candidates in the SHA-3 competition. ARIRANG has an unique design where the feed-forward operation is computed not only after ...
- 0Citation
MetricsTotal Citations0
- Chiaki Ohtahara
- Article
Matrix representation of conditions for the collision attack of SHA-1 and its application to the message modification
- Jun Yajima
Fujitsu Limited, Kawasaki, Japan
, - Takeshi Shimoyama
Fujitsu Limited, Kawasaki, Japan
IWSEC'10: Proceedings of the 5th international conference on Advances in information and computer security•November 2010, pp 267-284In this paper, we propose a matrix representation of Chaining Variable Condition (CVC) and Message Condition (MC) for the collision attack on the hash function SHA-1. Then we apply this to an algorithm for constructing the Message Modification procedure ...
- 0Citation
MetricsTotal Citations0
- Jun Yajima
- Article
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160
- Chiaki Ohtahara
Chuo-University
, - Yu Sasaki
NTT Corporation
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd.
Inscrypt'10: Proceedings of the 6th international conference on Information security and cryptology•October 2010, pp 169-186This paper presents the first results on the preimage resistance of ISO standard hash functions RIPEMD-128 and RIPEMD-160. They were designed as strengthened versions of RIPEMD. While preimage attacks on the first 33 steps and intermediate 35 steps of ...
- 7Citation
MetricsTotal Citations7
- Chiaki Ohtahara
- Article
CAIRN: Dedicated Integer Factoring Devices
NBIS '10: Proceedings of the 2010 13th International Conference on Network-Based Information Systems•September 2010, pp 558-563• https://doi.org/10.1109/NBiS.2010.60The integer factoring problem is known as one of the hard problem in cryptology, and some public-key cryptosystems including RSA are designed based of this fact. Recently, several dedicated integer factoring devices have been proposed, however, no ...
- 0Citation
MetricsTotal Citations0
- research-articlePublished By ACMPublished By ACM
A strict evaluation method on the number of conditions for the SHA-1 collision search
- Jun Yajima
Fujitsu Laboratories Ltd., Kawasaki, Kanagawa, Japan
, - Terutoshi Iwasaki
Chuo-University, Tokyo, Japan
, - Yusuke Naito
The University of Electro-Communications, Tokyo, Japan
, - Yu Sasaki
The University of Electro-Communications, Tokyo, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., Kanagawa, Japan
, - Noboru Kunihiro
The University of Electro-Communications, Tokyo, Japan
, - Kazuo Ohta
The University of Electro-Communications, Tokyo, Japan
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security•March 2008, pp 10-20• https://doi.org/10.1145/1368310.1368316This paper proposes a new algorithm for evaluating the number of chaining variable conditions(CVCs) in the selecting step of a distrubance vector (DV) for the analysis of SHA-1 collision attack. The algorithm is constructed by combining the following ...
- 9Citation
- 367
- Downloads
MetricsTotal Citations9Total Downloads367Last 12 Months2
- Jun Yajima
- Article
How to forge a time-stamp which adobe's acrobat accepts
- Tetsuya Izu
FUJITSU LABORATORIES LTD., Kawasaki, Japan
, - Takeshi Shimoyama
FUJITSU LABORATORIES LTD., Kawasaki, Japan
, - Masahiko Takenaka
FUJITSU LABORATORIES LTD., Kawasaki, Japan
Cryptography and Coding'07: Proceedings of the 11th IMA international conference on Cryptography and coding•December 2007, pp 54-72This paper shows how to forge a time-stamp which the latest version of Adobe's Acrobat and Acrobat Reader accept improperly. The target signature algorithm is RSASSA-PKCS1-v1 5 with a 1024-bit public composite and the public key e = 3, and our ...
- 0Citation
- 2
- Downloads
MetricsTotal Citations0Total Downloads2
- Tetsuya Izu
- Article
Experiments on the linear algebra step in the number field sieve
- Kazumaro Aoki
NTT, Musashino-shi, Tokyo, Japan
, - Takeshi Shimoyama
Fujitsu Laboratories Ltd., Kawasaki-shi, Kanagawa-ken, Japan
, - Hiroki Ueda
Nippon Telegraph and Telephone West Corporation, Musashino-shi, Tokyo, Japan
IWSEC'07: Proceedings of the Security 2nd international conference on Advances in information and computer security•October 2007, pp 58-73This paper shows experimental results of the linear algebra step in the number field sieve on parallel environment with implementation techniques. We developed an efficient algorithm that shares the sum of vectors in each node, and the network structure ...
- 4Citation
- 1
- Downloads
MetricsTotal Citations4Total Downloads1
- Kazumaro Aoki
- Article
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
- Tetsuya Izu
FUJITSU Limited, 4-1-1 Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588, Japan
, - Jun Kogure
FUJITSU Limited, 4-1-1 Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588, Japan
, - Takeshi Shimoyama
FUJITSU Limited, 4-1-1 Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588, Japan
CHES '07: Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems•September 2007, pp 364-377• https://doi.org/10.1007/978-3-540-74735-2_25The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, and the number field sieve method (NFS), the most efficient algorithm for factoring large integers currently, is a threat for such ...
- 2Citation
MetricsTotal Citations2
- Tetsuya Izu
- Article
A new strategy for finding a differential path of SHA-1
- Jun Yajima
FUJITSU LABORATORIES LTD., Nakahara-ku, Kawasaki, Japan
, - Yu Sasaki
The University of Electro-Communications, Chofu-shi, Tokyo, Japan
, - Yusuke Naito
The University of Electro-Communications, Chofu-shi, Tokyo, Japan
, - Terutoshi Iwasaki
Chuo University, Tokyo, Japan
, - Takeshi Shimoyama
FUJITSU LABORATORIES LTD., Nakahara-ku, Kawasaki, Japan
, - Noboru Kunihiro
The University of Electro-Communications, Chofu-shi, Tokyo, Japan
, - Kazuo Ohta
The University of Electro-Communications, Chofu-shi, Tokyo, Japan
ACISP'07: Proceedings of the 12th Australasian conference on Information security and privacy•July 2007, pp 45-58In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path of Round 1 is very complex, and it takes much time to find one by hand. ...
- 4Citation
- 1
- Downloads
MetricsTotal Citations4Total Downloads1
- Jun Yajima
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner