default search action
Takamichi Saito
Person information
- affiliation: Meiji University, Department of Information Science, Kawasaki, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c46]Masaki Ichino, Naoyuki Masuda, Takahiro Hayashi, Naoki Kodama, Takamichi Saito:
Device Classification via Passive Fingerprints with Clustering Algorithm. BWCCA 2023: 122-134 - 2021
- [c45]Bin Cheng, Tsubasa Kikuta, Yoshinao Toshimitsu, Takamichi Saito:
Investigation of Power Consumption Attack on Android Devices. AINA (2) 2021: 567-579 - 2020
- [c44]Takamichi Saito, Satoshi Shibata, Tsubasa Kikuta:
Comparison of OAuth/OpenID Connect Security in America and Japan. NBiS 2020: 200-210
2010 – 2019
- 2019
- [c43]Takamichi Saito, Tsubasa Kikuta, Rikita Koshiba:
How Securely Are OAuth/OpenID Connect Implemented in Japan? BWCCA 2019: 800-811 - [c42]Takamichi Saito, Rikita Koshiba:
Examination and Comparison of Countermeasures Against Web Tracking Technologies. IMIS 2019: 477-489 - 2018
- [c41]Takamichi Saito, Satoshi Yashiro, Kazuhisa Tanabe, Yuta Saito:
A Proposal and the Evaluation of a Hands-On Training System for Cyber Security. BWCCA 2018: 339-349 - [c40]Kazuhisa Tanabe, Ryohei Hosoya, Takamichi Saito:
Combining Features in Browser Fingerprinting. BWCCA 2018: 671-681 - [c39]Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki:
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. IWSEC 2018: 68-83 - [c38]Takamichi Saito, Takafumi Noda, Ryohei Hosoya, Kazuhisa Tanabe, Yuta Saito:
On Estimating Platforms of Web User with JavaScript Math Object. NBiS 2018: 407-418 - 2017
- [c37]Takamichi Saito, Shuta Kondo, Hiroyuki Miyazaki, Wang Bing, Ryohei Watanabe, Ryota Sugawara, Masateru Yokoyama:
Mitigating Use-After-Free Attack with Application Program Loader. AINA 2017: 919-924 - [c36]Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, Kazushi Takahashi:
Web Browser Tampering: Inspecting CPU Features from Side-Channel Information. BWCCA 2017: 392-403 - [c35]Krystian Lapa, Krzysztof Cpalka, Andrzej Przybyl, Takamichi Saito:
Fuzzy PID Controllers with FIR Filtering and a Method for Their Construction. ICAISC (2) 2017: 292-307 - [c34]Marcin Zalasinski, Krystian Lapa, Krzysztof Cpalka, Takamichi Saito:
A Method for Changes Prediction of the Dynamic Signature Global Features over Time. ICAISC (1) 2017: 761-772 - [c33]Takamichi Saito, Ryohei Hosoya, Koki Yasuda, Kazushi Takahashi, Yuta Tsunoda, Kazuhisa Tanabe, Masayuki Taneoka, Satoshi Yashiro:
Proposal and Implementation of a Countermeasure Against Event Tracking on the Web. IMIS 2017: 435-444 - [c32]Takamichi Saito, Kazushi Takahashi, Koki Yasuda, Kazuhisa Tanabe, Masayuki Taneoka, Ryohei Hosoya:
Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting? NBiS 2017: 504-517 - 2016
- [j5]Yoichi Hayashi, Yuki Tanaka, Tomohiro Takagi, Takamichi Saito, Hideaki Iiduka, Hiroaki Kikuchi, Guido Bologna, Sushmita Mitra:
Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores. J. Artif. Intell. Soft Comput. Res. 6(1): 35 (2016) - [c31]Takamichi Saito, Kazushi Takahashi, Koki Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi:
OS and Application Identification by Installed Fonts. AINA 2016: 684-689 - [c30]Krystian Lapa, Jacek Szczypta, Takamichi Saito:
Aspects of Evolutionary Construction of New Flexible PID-fuzzy Controller. ICAISC (1) 2016: 450-464 - [c29]Takamichi Saito, Koki Yasuda, Takayuki Ishikawa, Rio Hosoi, Kazushi Takahashi, Yongyan Chen, Marcin Zalasinski:
Estimating CPU Features by Browser Fingerprinting. IMIS 2016: 587-592 - [c28]Takamichi Saito, Yuta Tsunoda, Daichi Miyata, Ryohei Watanabe, Yongyan Chen:
An Authorization Scheme Concealing Client's Access from Authentication Server. IMIS 2016: 593-598 - [c27]Rio Hosoi, Takamichi Saito, Takayuki Ishikawa, Daichi Miyata, Yongyan Chen:
A Browser Scanner: Collecting Intranet Information. NBiS 2016: 140-145 - [c26]Takamichi Saito, Ryohei Watanabe, Shuta Kondo, Shota Sugawara, Masahiro Yokoyama:
A Survey of Prevention/Mitigation against Memory Corruption Attacks. NBiS 2016: 500-505 - 2015
- [c25]Yuto Iso, Takamichi Saito:
A Proposal and Implementation of an ID Federation that Conceals a Web Service from an Authentication Server. AINA 2015: 347-351 - [c24]Hiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito:
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies. AINA 2015: 510-514 - [c23]Yohei Kaneko, Takamichi Saito, Hiroaki Kikuchi:
Cryptographic Operation Load-Balancing between Cryptographic Module and CPU. AINA 2015: 698-705 - [c22]Naoki Takei, Takamichi Saito, Ko Takasu, Tomotaka Yamada:
Web Browser Fingerprinting Using Only Cascading Style Sheets. BWCCA 2015: 57-63 - [c21]Tomotaka Yamada, Takamichi Saito, Ko Takasu, Naoki Takei:
Robust Identification of Browser Fingerprint Comparison Using Edit Distance. BWCCA 2015: 107-113 - [c20]Ko Takasu, Takamichi Saito, Tomotaka Yamada, Takayuki Ishikawa:
A Survey of Hardware Features in Modern Browsers: 2015 Edition. IMIS 2015: 520-524 - [c19]Takamichi Saito, Hiroyuki Miyazaki, Takaaki Baba, Yoshifumi Sumida, Yosuke Hori:
Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions. IMIS 2015: 525-530 - [c18]Takamichi Saito, Daichi Miyata, Takafumi Watanabe, Yuta Nishikura:
Security Authorization Scheme for Web Applications. NBiS 2015: 250-256 - 2012
- [j4]Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai:
Authentication Binding between SSL/TLS and HTTP. IEICE Trans. Inf. Syst. 95-D(3): 797-803 (2012)
2000 – 2009
- 2009
- [j3]Takamichi Saito:
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme. IEICE Trans. Inf. Syst. 92-D(6): 1268-1279 (2009) - [c17]Satoshi Shimazaki, Takamichi Saito:
SSL Connection Failover in Web Clusters and its Evaluation. NBiS 2009: 254-259 - 2008
- [c16]Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai:
Authentication Binding between TLS and HTTP. NBiS 2008: 252-262 - 2007
- [c15]Ryosuke Hatsugai, Takamichi Saito:
Load-Balancing SSL Cluster Using Session Migration. AINA 2007: 62-67 - [c14]Takamichi Saito:
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme. IPDPS 2007: 1-8 - 2006
- [j2]Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno:
A privacy-enhanced access control. Syst. Comput. Jpn. 37(5): 77-86 (2006) - [j1]Takamichi Saito, Akio Morii, Tadashi Komori, Toshiyuki Kito, Fumio Mizoguchi:
Anti-spam mail system. Syst. Comput. Jpn. 37(13): 99-108 (2006) - [c13]Takamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito:
On Compromising Password-Based Authentication over HTTPS. AINA (1) 2006: 869-874 - 2005
- [c12]AbdelNasir Alshamsi, Takamichi Saito:
A Technical Comparison of IPSec and SSL. AINA 2005: 395-398 - [c11]Takamichi Saito:
Anti-SPAM System: Another Way of Preventing SPAM. DEXA Workshops 2005: 57-61 - 2004
- [c10]Tadashi Komori, Takamichi Saito:
A Secure Wireless LAN System Retaining Privacy. AINA (2) 2004: 370-375 - [i1]AbdelNasir Alshamsi, Takamichi Saito:
A Technical Comparison of IPSec and SSL. IACR Cryptol. ePrint Arch. 2004: 314 (2004) - 2003
- [c9]Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, Hiroshi G. Okuno:
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server . AINA 2003: 696-703 - 2002
- [c8]Takamichi Saito, Toshiyuki Kito, Kentaro Umesawa, Fumio Mizoguchi:
Architectural Defects of the Secure Shell. DEXA Workshops 2002: 22-28 - [c7]Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito:
Verification of Authentication Protocols Based on the Binding Relation. ISSS 2002: 299-316 - [c6]Tadashi Komori, Takamichi Saito:
The Secure DHCP System with User Authentication. LCN 2002: 123-131 - 2001
- [c5]Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno:
An Access Control with handling Private Information. IPDPS 2001: 172 - 2000
- [c4]Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno:
Privacy enhanced access control by SPKI. ICPADS Workshops 2000: 301-306 - [c3]Wu Wen, Takamichi Saito, Fumio Mizoguchi:
Security of Public Key Certificate Based Authentication Protocols. Public Key Cryptography 2000: 196-209 - [c2]Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno:
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. WETICE 2000: 201-206
1990 – 1999
- 1999
- [c1]Takamichi Saito, Wu Wen, Fumio Mizoguchi:
Incremental Analysis and Verification of Authentication Protocols. WETICE 1999: 192-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint