Login / Signup
Hitoshi Fuji
Publication Activity (10 Years)
Years Active: 2000-2019
Publications (10 Years): 11
Top Topics
Signcryption Scheme
Key Distribution
Countermeasures
Evaluation Method
Top Venues
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
J. Inf. Process.
HOST
ProvSec
</>
Publications
</>
Junko Takahashi
,
Masashi Tanaka
,
Hitoshi Fuji
,
Toshio Narita
,
Shunsuke Matsumoto
,
Hiroki Sato
Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages.
J. Inf. Process.
27 (2019)
Kazuki Yoneyama
,
Reo Yoshida
,
Yuto Kawahara
,
Tetsutaro Kobayashi
,
Hitoshi Fuji
,
Tomohide Yamamoto
Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(6) (2018)
Kazuki Yoneyama
,
Reo Yoshida
,
Yuto Kawahara
,
Tetsutaro Kobayashi
,
Hitoshi Fuji
,
Tomohide Yamamoto
Multi-cast key distribution: scalable, dynamic and provably secure construction.
Int. J. Inf. Sec.
17 (5) (2018)
Junko Takahashi
,
Masashi Tanaka
,
Hitoshi Fuji
,
Toshio Narita
,
Shunsuke Matsumoto
,
Hiroki Sato
Abnormal vehicle behavior induced using only fabricated informative CAN messages.
HOST
(2018)
Takashi Hatashima
,
Keita Nagai
,
Asami Kishi
,
Hikaru Uekusa
,
Shigeaki Tanimoto
,
Atsushi Kanai
,
Hitoshi Fuji
,
Kazuhiko Ohkubo
Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime.
COMPSAC (2)
(2018)
Shigeaki Tanimoto
,
Chise Nakamura
,
Motoi Iwashita
,
Shinsuke Matsui
,
Takashi Hatashima
,
Hitoshi Fuji
,
Kazuhiko Ohkubo
,
Junichi Egawa
,
Yohsuke Kinouchi
Proposal of Secure Business Architecture by Visible Light Communication System.
IIAI-AAI
(2018)
Shigeaki Tanimoto
,
Chise Nakamura
,
Motoi Iwashita
,
Shinsuke Matsui
,
Takashi Hatashima
,
Hitoshi Fuji
,
Kazuhiko Ohkubo
,
Junichi Egawa
,
Yohsuke Kinouchi
Secure Visible Light Communication Business Architecture Based on Federation of ID Management.
NBiS
(2018)
Junko Takahashi
,
Yosuke Aragane
,
Toshiyuki Miyazawa
,
Hitoshi Fuji
,
Hirofumi Yamashita
,
Keita Hayakawa
,
Shintarou Ukai
,
Hiroshi Hayakawa
Automotive Attacks and Countermeasures on LIN-Bus.
J. Inf. Process.
25 (2017)
Shoei Nashimoto
,
Naofumi Homma
,
Yu-ichi Hayashi
,
Junko Takahashi
,
Hitoshi Fuji
,
Takafumi Aoki
Buffer overflow attack with multiple fault injection and a proven countermeasure.
J. Cryptogr. Eng.
7 (1) (2017)
Kazuki Yoneyama
,
Reo Yoshida
,
Yuto Kawahara
,
Tetsutaro Kobayashi
,
Hitoshi Fuji
,
Tomohide Yamamoto
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
IACR Cryptol. ePrint Arch.
2016 (2016)
Kazuki Yoneyama
,
Reo Yoshida
,
Yuto Kawahara
,
Tetsutaro Kobayashi
,
Hitoshi Fuji
,
Tomohide Yamamoto
Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
ProvSec
(2016)
Sho Endo
,
Naofumi Homma
,
Yu-ichi Hayashi
,
Junko Takahashi
,
Hitoshi Fuji
,
Takafumi Aoki
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2015)
Junko Takahashi
,
Toshinori Fukunaga
,
Kazumaro Aoki
,
Hitoshi Fuji
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2015)
Sho Endo
,
Naofumi Homma
,
Yu-ichi Hayashi
,
Junko Takahashi
,
Hitoshi Fuji
,
Takafumi Aoki
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure.
COSADE
(2014)
Junko Takahashi
,
Toshinori Fukunaga
,
Kazumaro Aoki
,
Hitoshi Fuji
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
ACISP
(2013)
Yuji Soejima
,
Eric Y. Chen
,
Hitoshi Fuji
Detecting DDoS Attacks by Analyzing Client Response Patterns.
SAINT Workshops
(2005)
Dai Kashiwa
,
Eric Y. Chen
,
Hitoshi Fuji
A countermeasure againstDDOS attacks using active networks technologies.
Ann. des Télécommunications
58 (3-4) (2003)
Yoshihiro Kitajima
,
Hitoshi Fuji
,
Seiichiro Satou
,
Hitoshi Ohsugi
,
Isao Gotou
,
Hitoshi Oono
Consideration of EVMS Technique Application to Software Development.
ECSQ
(2002)
Teruyuki Komiya
,
Hitoshi Fuji
,
Motoi Sato
A proposal on FlexibleCUG service architecture.
ICPADS Workshops
(2000)