Login / Signup
Jun Kurihara
ORCID
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 15
Top Topics
Access Control
Security Model
Fine Grained
Clickstream Data
Top Venues
IEICE Trans. Commun.
MASS
ICN
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
</>
Publications
</>
Ryu Watanabe
,
Ayumu Kubota
,
Jun Kurihara
,
Kouichi Sakurai
Extension of Resource Authorization Method with SSI in Edge Computing.
AINA (6)
(2024)
Itaru Kurihara
,
Jun Kurihara
,
Toshiaki Tanaka
A New Security Measure in Secret Sharing Schemes and Secure Network Coding.
IEEE Access
12 (2024)
Jun Kurihara
,
Toshiaki Tanaka
,
Takeshi Kubo
μODNS: A distributed approach to DNS anonymization with collusion resistance.
Comput. Networks
237 (2023)
Ryu Watanabe
,
Ayumu Kubota
,
Jun Kurihara
Application of Generalized Deduplication Techniques in Edge Computing Environments.
AINA (3)
(2023)
Ryu Watanabe
,
Ayumu Kubota
,
Jun Kurihara
Resource Authorization Methods for Edge Computing.
AINA (1)
(2022)
Jun Kurihara
,
Takeshi Kubo
Mutualized oblivious DNS (μODNS): Hiding a tree in the wild forest.
CoRR
(2021)
Yuji Koike
,
Takuya Hayashi
,
Jun Kurihara
,
Takanori Isobe
Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2021)
Jun Kurihara
,
Toru Nakamura
,
Ryu Watanabe
Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2021)
Kazuaki Ueda
,
Kenji Yokota
,
Jun Kurihara
,
Atsushi Tagami
Two-Level Named Packet Forwarding for Enhancing the Performance of Virtualized ICN Router.
IEICE Trans. Commun.
(9) (2019)
Kalika Suksomboon
,
Atsushi Tagami
,
Anirban Basu
,
Jun Kurihara
In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control.
LCN
(2018)
Kalika Suksomboon
,
Atsushi Tagami
,
Anirban Basu
,
Jun Kurihara
IPRES: in-device proxy re-encryption service for secure ICN.
ICN
(2017)
Jun Kurihara
,
Kenji Yokota
,
Atsushi Tagami
List Interest: Simply Packing Interests Dramatically Reduces Router Workload in Content-Centric Networking.
IEICE Trans. Commun.
(12) (2016)
Jun Kurihara
,
Kenji Yokota
,
Atsushi Tagami
A Consumer-Driven Access Control Approach to Censorship Circumvention in Content-Centric Networking.
ICN
(2016)
Kenji Yokota
,
Kohei Sugiyama
,
Jun Kurihara
,
Atsushi Tagami
RTT-Based Caching Policies to Improve User-Centric Performance in CCN.
AINA
(2016)
Kazuaki Ueda
,
Kenji Yokota
,
Jun Kurihara
,
Atsushi Tagami
Towards the NFVI-Assisted ICN: Integrating ICN Forwarding into the Virtualization Infrastructure.
GLOBECOM
(2016)
Jun Kurihara
,
Kenji Yokota
,
Kazuaki Ueda
,
Atsushi Tagami
List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0.
MASS
(2015)
Jun Kurihara
,
Ersin Uzun
,
Christopher A. Wood
An encryption-based access control framework for content-centric networking.
Networking
(2015)
Kazuaki Ueda
,
Kenji Yokota
,
Jun Kurihara
,
Atsushi Tagami
A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking.
MASS
(2015)
Jun Kurihara
,
Ryutaroh Matsumoto
,
Tomohiko Uyematsu
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding.
IEEE Trans. Inf. Theory
61 (7) (2015)
Jun Kurihara
,
Ryutaroh Matsumoto
,
Tomohiko Uyematsu
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
CoRR
(2013)
Jun Kurihara
,
Tomohiko Uyematsu
,
Ryutaroh Matsumoto
Explicit construction of universal strongly secure network coding via MRD codes.
ISIT
(2012)
Jun Kurihara
,
Tomohiko Uyematsu
,
Ryutaroh Matsumoto
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(11) (2012)
Jun Kurihara
,
Tomohiko Uyematsu
,
Ryutaroh Matsumoto
New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding
CoRR
(2012)
Jun Kurihara
,
Tomohiko Uyematsu
,
Ryutaroh Matsumoto
New parameters of linear codes expressing security performance of universal secure network coding.
Allerton Conference
(2012)
Jun Kurihara
,
Tomohiko Uyematsu
Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight.
Allerton
(2011)
Jun Kurihara
,
Tomohiko Uyematsu
A Novel Realization of Threshold Schemes over Binary Field Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(6) (2011)
Yuto Nakano
,
Jun Kurihara
,
Shinsaku Kiyomoto
,
Toshiaki Tanaka
Stream Cipher-Based Hash Function and Its Security.
ICETE (Selected Papers)
(2010)
Yuto Nakano
,
Jun Kurihara
,
Shinsaku Kiyomoto
,
Toshiaki Tanaka
On a Construction of Stream-cipher-based Hash Functions.
SECRYPT
(2010)
Jun Kurihara
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
)-Threshold Ramp Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(8) (2009)
Carlos Cid
,
Shinsaku Kiyomoto
,
Jun Kurihara
The rakaposhi Stream Cipher.
ICICS
(2009)
Jun Kurihara
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
IACR Cryptol. ePrint Arch.
2008 (2008)
Jun Kurihara
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
)-Threshold Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2008)
Jun Kurihara
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
ISC
(2008)
Jun Kurihara
,
Shinsaku Kiyomoto
,
Kazuhide Fukushima
,
Toshiaki Tanaka
)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2008)