Journal: IEICE Transactions

Volume 99-D, Issue 8

1964 -- 1965Guojun Wang. Foreword
1966 -- 1973Huaqun Wang, Keqiu Li, Kaoru Ota, Jian Shen. Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things
1974 -- 1981Remi Ando, Shigeyoshi Shima, Toshihiko Takemura. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
1982 -- 1990Licheng Wang, Jing Li, Haseeb Ahmad. Challenges of Fully Homomorphic Encryptions for the Internet of Things
1991 -- 2001Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su. Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense
2002 -- 2009Jinli Rao, Zhangqing He, Shu Xu, Kui Dai, Xuecheng Zou. BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
2010 -- 2018Anfeng Liu, Xiao Liu, He Li, Jun Long. MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs
2019 -- 2026Guangquan Xu, Yuanyuan Ren, Yuanbin Han, Xiaohong Li, Zhiyong Feng. Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
2027 -- 2035Kai Fan, Zhao Du, Yuanyuan Gong, Yue Wang, Tongjiang Yan, Hui Li 0006, Yintang Yang. A Secure RFID Application Revocation Scheme for IoT
2036 -- 2043Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Ming Su, Gang Wang, Xiaoguang Liu. CloudS: A Multi-Cloud Storage System with Multi-Level Security
2044 -- 2055Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin. A Matrix Based ORAM: Design, Implementation and Experimental Analysis
2056 -- 2060Toshifumi Nishinaga, Masahiro Mambo. Implementation of µNaCl on 32-bit ARM Cortex-M0
2061 -- 2068GuanJun Liu, Changjun Jiang. Behavioral Equivalence of Security-Oriented Interactive Systems
2069 -- 2078Mohammad Rasool Sarrafi Aghdam, Noboru Sonehara. Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
2079 -- 2089Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang. Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
2090 -- 2099Min Shao, Min Sik Kim, Victor C. Valgenti, Jungkeun Park. Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
2100 -- 2108Komang Oka Saputra, Wei-Chung Teng, Takaaki Nara. Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority
2109 -- 2120Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai. Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation
2121 -- 2130Hyeongboo Baek, Jaewoo Lee, Yongjae Lee, Hyunsoo Yoon. Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems
2131 -- 2139Shutchon Premchaisawatt, Nararat Ruangchaijatupon. The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning
2140 -- 2150Sila Chunwijitra, Chanchai Junlouchai, Sitdhibong Laokok, Pornchai Tummarattananont, Kamthorn Krairaksa, Chai Wutiwiwatchai. An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform
2151 -- 2160Tetsuya Watanabe, Kosuke Araki, Toshimitsu Yamaguchi, Kazunori Minatani. Development of Tactile Graph Generation Web Application Using R Statistics Software Environment
2161 -- 2171Chien-Quang Le, Sang Phan, Thanh Duc Ngo, Duy-Dinh Le, Shin'ichi Satoh, Duc Anh Duong. Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection
2172 -- 2176So Jin Ahn, Dae-Yon Hwang, Miyoung Kang, Jin-Young Choi. Hierarchical System Schedulability Analysis Framework Using UPPAAL
2177 -- 2181Duc Tiep Vu, Kyungbaek Kim. Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network
2182 -- 2185Hideo Fujiwara, Katsuya Fujiwara. Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
2186 -- 2189Huawei Tao, Ruiyu Liang, Cheng Zha, Xinran Zhang, Li Zhao. Spectral Features Based on Local Hu Moments of Gabor Spectrograms for Speech Emotion Recognition
2190 -- 2193Guohao Lyu, Hui Yin, Xinyan Yu, Siwei Luo. A Local Characteristic Image Restoration Based on Convolutional Neural Network
2194 -- 2198Jun-Sang Yoo, Ji-Hoon Choi, Kang-Sun Choi, Dae Yeol Lee, Hui-Yong Kim, Jong-Ok Kim. Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution