AsiaJCIS 2025: Author Index| Author | Papers |
|---|
| A | | Asano, Kyoichi | A Generic Zero-Knowledge Range Argument with Preprocessing | | C | | Chen, Guan-Yu | Registered Key-Policy Attribute-Based Encryption | | Chen, Wei-Rung | Circular Quantum Secret Sharing Based on SWAP Gates | | E | | Emura, Keita | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | | F | | Fan, Chun-I | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | | Furumoto, Keisuke | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | | G | | Guan, Albert | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | | H | | Hayashi, Mizuki | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | | Hirose, Kenjiro | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | | Huang, Jheng-Jia | Registered Key-Policy Attribute-Based Encryption | | I | | Igarashi, Yasutaka | Improved Integral Cryptanalysis on Reduced-Round Piccolo | | Iwamoto, Mitsugu | A Generic Zero-Knowledge Range Argument with Preprocessing | | J | | Ji, Yeontae | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | | K | | Kao, Shih-Pei | Registered Key-Policy Attribute-Based Encryption | | Kikuchi, Hiroaki | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | | Kim, Hyungyeop | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | | Kim, Kwangjo | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | | L | | Lee, Yao Yu | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | | Liang, Hai | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | | Liao, Tzu-Yu | Circular Quantum Secret Sharing Based on SWAP Gates | | Lin, Iuon-Chang | Circular Quantum Secret Sharing Based on SWAP Gates | | Lin, Jason | Circular Quantum Secret Sharing Based on SWAP Gates | | Liu, Zi-Yuan | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | | Lu, Yi-Jiin | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption | | M | | Miura, Koki | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | | Miyaji, Atsuko | Key-Value Commitments with Unlinkability An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | | Morikawa, Tomohiro | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | | N | | Nishino, Hinata | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | | O | | Okumura, Shinya | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | | Omote, Kazumasa | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | | P | | Peng, Xinyong | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | | Prabowo, Theo Fanuela | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | | Praditasari, Wibby Aldryani Astuti | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | | R | | Rimbawa, Danang | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | | S | | Sasaki, Ayako | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | | Sawai, Yuki | A Generic Zero-Knowledge Range Argument with Preprocessing | | Shibayama, Naoki | Improved Integral Cryptanalysis on Reduced-Round Piccolo | | T | | Takahashi, Takeshi | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | | Tan, Chik How | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | | Tao, Wenkang | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | | Tsai, Pei-Shiun | Circular Quantum Secret Sharing Based on SWAP Gates | | Tsai, Tien-Lin | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption | | Tseng, Yi-Fan | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption | | Tsujimoto, Yuto | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | | Tsujimura, Towa | Key-Value Commitments with Unlinkability | | W | | Wang, Shuo | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | | Wang, Wei-Hsueh | Registered Key-Policy Attribute-Based Encryption | | Wang, Yujue | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | | Watanabe, Yohei | A Generic Zero-Knowledge Range Argument with Preprocessing | | X | | Xu, Yu | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | | Y | | Yi, Okyeon | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | | Yoon, Hyejin | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | | You, Gunsang | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | | Youm, Heung Youl | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
|
|