​
Login / Signup
Nori Matsuda
Publication Activity (10 Years)
Years Active: 1997-2023
Publications (10 Years): 11
Top Topics
Private Data
Power Analysis
Factor Authentication
Countermeasures
Top Venues
J. Inf. Process.
ICASSP
ACISP (2)
IWSEC
</>
Publications
</>
Shun Hinatsu
,
Nori Matsuda
,
Hiroki Ishizuka
,
Sei Ikeda
,
Osamu Oshiro
Your Health Is Leaked: PPG Waveform Reconstruction Using Stealthily Recorded Physiological Signals.
EMBC
(2023)
Masahiro Fujita
,
Yasuoki Iida
,
Mitsuhiro Hattori
,
Tadakazu Yamanaka
,
Nori Matsuda
,
Satoshi Ito
,
Hiroaki Kikuchi
Proposal of anonymization dictionary using disclosed statements by business operators.
Internet Things
18 (2022)
Shinnosuke Nozaki
,
Ayumi Serizawa
,
Mizuho Yoshihira
,
Masahiro Fujita
,
Yoichi Shibata
,
Tadakazu Yamanaka
,
Nori Matsuda
,
Tetsushi Ohki
,
Masakatsu Nishigaki
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential.
NBiS
(2022)
Shun Hinatsu
,
Nori Matsuda
,
Hiroki Ishizuka
,
Sei Ikeda
,
Osamu Oshiro
Identification of PPG Measurement Sites Toward Countermeasures Against Biometric Presentation Attacks.
IEEE Access
10 (2022)
Masahiro Fujita
,
Yasuoki Iida
,
Mitsuhiro Hattori
,
Tadakazu Yamanaka
,
Nori Matsuda
,
Satoshi Ito
,
Hiroaki Kikuchi
Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators.
IMIS
(2021)
Nori Matsuda
,
Takato Hirano
,
Yutaka Kawai
,
Takashi Ito
,
Mitsuhiro Hattori
,
Tadakazu Yamanaka
,
Masakatsu Nishigaki
Public-key Searchable Encryption with Index Generation for Shared Database.
J. Inf. Process.
28 (2020)
Mitsuhiro Hattori
,
Takato Hirano
,
Nori Matsuda
,
Fumio Omatsu
,
Rina Shimizu
,
Ye Wang
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
J. Inf. Process.
26 (2018)
Mitsuhiro Hattori
,
Takato Hirano
,
Nori Matsuda
,
Rina Shimizu
,
Ye Wang
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
ACISP (2)
(2017)
Ye Wang
,
Nisarg Raval
,
Prakash Ishwar
,
Mitsuhiro Hattori
,
Takato Hirano
,
Nori Matsuda
,
Rina Shimizu
On methods for privacy-preserving energy disaggregation.
ICASSP
(2017)
Takato Hirano
,
Mitsuhiro Hattori
,
Yutaka Kawai
,
Nori Matsuda
,
Mitsugu Iwamoto
,
Kazuo Ohta
,
Yusuke Sakai
,
Tatsuji Munaka
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
IWSEC
(2016)
Takato Hirano
,
Takashi Ito
,
Yutaka Kawai
,
Nori Matsuda
,
Takumi Yamamoto
,
Tatsuji Munaka
A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
ISITA
(2016)
Mitsuhiro Hattori
,
Takato Hirano
,
Takashi Ito
,
Nori Matsuda
,
Takumi Mori
,
Yusuke Sakai
,
Kazuo Ohta
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2013)
Takato Hirano
,
Mitsuhiro Hattori
,
Takashi Ito
,
Nori Matsuda
Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.
IWSEC
(2013)
Takato Hirano
,
Mitsuhiro Hattori
,
Takashi Ito
,
Nori Matsuda
,
Takumi Mori
Homomorphic encryption based cancelable biometrics secure against replay and its related attack.
ISITA
(2012)
Mitsuhiro Hattori
,
Nori Matsuda
,
Takashi Ito
,
Yoichi Shibata
,
Katsuyuki Takashima
,
Takeshi Yoneda
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation.
J. Inf. Process.
20 (2) (2012)
Mitsuhiro Hattori
,
Nori Matsuda
,
Takashi Ito
,
Yoichi Shibata
,
Katsuyuki Takashima
,
Takeshi Yoneda
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation.
Inf. Media Technol.
7 (2) (2012)
Mitsuhiro Hattori
,
Takato Hirano
,
Takashi Ito
,
Nori Matsuda
,
Takumi Mori
,
Yusuke Sakai
,
Kazuo Ohta
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
IMACC
(2011)
Takashi Ito
,
Hidenori Ohta
,
Nori Matsuda
,
Takeshi Yoneda
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment.
SASN
(2005)
Jinhui Chao
,
Nori Matsuda
,
Shigeo Tsujii
Efficient construction of secure hyperelliptic discrete logarithm problems.
ICICS
(1997)