Naoto Yanai
Naoto Yanai
Osaka Universiy
Verified email at
Cited by
Cited by
RBAC-SC: Role-based access control using smart contract
JP Cruz, Y Kaji, N Yanai
Ieee Access 6, 12240-12251, 2018
Eth2Vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts
N Ashizawa, N Yanai, JP Cruz, S Okamura
Proceedings of the 3rd ACM International Symposium on Blockchain and Secure …, 2021
Detecting flooding attack and accommodating burst traffic in delay-tolerant networks
TND Pham, CK Yeo, N Yanai, T Fujiwara
IEEE Transactions on Vehicular Technology 67 (1), 795-808, 2017
RA: Hunting for re-entrancy attacks in ethereum smart contracts via static analysis
Y Chinen, N Yanai, JP Cruz, S Okamura
2020 IEEE International Conference on Blockchain (Blockchain), 327-336, 2020
Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection
Y Chen, N Ashizawa, CK Yeo, N Yanai, S Yean
Knowledge-Based Systems 224, 107086, 2021
Model extraction attacks on recurrent neural networks
T Takemura, N Yanai, T Fujiwara
Journal of Information Processing 28, 1010-1024, 2020
ISDSR+: improving the security and availability of secure routing protocol
H Kojima, N Yanai, JP Cruz
IEEE Access 7, 74849-74868, 2019
Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption
T Iwasaki, N Yanai, M Inamura, K Iwamura
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
A secure structured multisignature scheme based on a non-commutative ring homomorphism
N Yanai, E Chida, M Mambo
IEICE transactions on fundamentals of electronics, communications and …, 2011
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
N Yanai, R Tso, M Mambo, E Okamoto
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 30-54, 2012
ISDSR: Secure DSR with ID-based Sequential Aggregate Signature.
K Muranaka, N Yanai, S Okamura, T Fujiwara
SECRYPT, 376-387, 2016
Key-aggregate searchable encryption, revisited: formal foundations for cloud applications, and their implementation
M Kamimura, N Yanai, S Okamura, JP Cruz
IEEE Access 8, 24153-24169, 2020
An ordered multisignature scheme under the CDH assumption without random oracles
N Yanai, M Mambo, E Okamoto
Information Security, 367-377, 2015
Anonymous broadcast authentication for securely remote-controlling IoT devices
Y Watanabe, N Yanai, J Shikata
International Conference on Advanced Information Networking and Applications …, 2021
An anonymous authentication protocol for the smart grid
H Kishimoto, N Yanai, S Okamura
Smart Micro-Grid Systems Security and Privacy, 29-52, 2018
Certificateless ordered sequential aggregate signature scheme
N Yanai, R Tso, M Mambo, E Okamoto
2011 Third International Conference on Intelligent Networking and …, 2011
Self-organizing map assisted deep autoencoding gaussian mixture model for intrusion detection
Y Chen, N Ashizawa, S Yean, CK Yeo, N Yanai
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
MOBIUS: model-oblivious binarized neural networks
H Kitai, JP Cruz, N Yanai, N Nishida, T Oba, Y Unagami, T Teruya, ...
IEEE Access 7, 139021-139034, 2019
Meeting tight security for multisignatures in the plain public key model
N Yanai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
Provably secure structured signature schemes with tighter reductions
N Yanai, T Iwasaki, M Inamura, K Iwamura
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20