default search action
Hajime Watanabe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j7]Hajime Watanabe, Mondher Bouazizi, Tomoaki Ohtsuki:
Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection. IEEE Access 6: 13825-13835 (2018) - [j6]Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1440-1455 (2018) - 2017
- [i6]Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi, Kaoru Maeda, Tatsuya Hayashi, Yuichi Ioku:
HTTP Authentication Extensions for Interactive Clients. RFC 8053: 1-28 (2017) - [i5]Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi, Kaoru Maeda, Tatsuya Hayashi, Yuichi Ioku:
Mutual Authentication Protocol for HTTP. RFC 8120: 1-53 (2017) - [i4]Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi, Kaoru Maeda, Tatsuya Hayashi, Yuichi Ioku:
Mutual Authentication Protocol for HTTP: Cryptographic Algorithms Based on the Key Agreement Mechanism 3 (KAM3). RFC 8121: 1-17 (2017) - 2016
- [j5]Takao Murakami, Hajime Watanabe:
Localization Attacks Using Matrix and Tensor Factorization. IEEE Trans. Inf. Forensics Secur. 11(8): 1647-1660 (2016) - [c17]Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. SCN 2016: 42-61 - 2014
- [c16]Takao Murakami, Hajime Watanabe:
Location prediction attacks using tensor factorization and optimal defenses. IEEE BigData 2014: 13-21 - [c15]Michitomo Yamaguchi, Toru Nakata, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi:
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people. SMC 2014: 3946-3951 - 2013
- [c14]Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. SECRYPT 2013: 339-346 - 2011
- [j4]Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Nuttapong Attrapadung, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
Secure Broadcast System with Simultaneous Individual Messaging. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1328-1337 (2011) - [c13]Miodrag J. Mihaljevic, Hideki Imai, Michael W. David, Kazukuni Kobara, Hajime Watanabe:
On advanced cryptographic techniques for information security of smart grid AMI. CSIIRW 2011: 64 - 2010
- [c12]Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. ISITA 2010: 690-695
2000 – 2009
- 2009
- [j3]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An improvement of discrete Tardos fingerprinting codes. Des. Codes Cryptogr. 52(3): 339-362 (2009) - [j2]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe:
An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 197-206 (2009) - [c11]Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki:
PAKE-based mutual HTTP authentication for preventing phishing attacks. WWW 2009: 1143-1144 - [i3]Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi:
PAKE-based mutual HTTP authentication for preventing phishing attacks. CoRR abs/0911.5230 (2009) - 2008
- [c10]Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33 - [i2]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An improvement of discrete Tardos fingerprinting codes. IACR Cryptol. ePrint Arch. 2008: 338 (2008) - 2007
- [c9]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. AAECC 2007: 80-89 - [c8]Satoshi Fujitsu, Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users. CCNC 2007: 1068-1072 - [c7]Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe:
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. EuroPKI 2007: 143-153 - [c6]Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. Information Hiding 2007: 279-293 - 2006
- [c5]Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. AAECC 2006: 154-162 - [c4]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [i1]Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. CoRR abs/cs/0610036 (2006) - 2003
- [j1]Hajime Watanabe, Takashi Kitagawa:
A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(10): 2589-2595 (2003) - 2002
- [c3]Hajime Watanabe, Takashi Kitagawa:
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. ICICS 2002: 173-183 - [c2]Madoka Hasegawa, Hajime Watanabe, Takashi Yamada, Shigeo Kato:
Watermarking method for extracting embedded data without original image. VCIP 2002: 915-922
1990 – 1999
- 1997
- [c1]Hajime Watanabe, Tadao Kasami:
A secure code for recipient watermarking against conspiracy attacks by all users. ICICS 1997: 414-423
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint