Akira KANAOKA

J-GLOBAL         Last updated: Sep 27, 2016 at 15:44
 
Avatar
Name
Akira KANAOKA
URL
http://www.klab.is.sci.toho-u.ac.jp/
Affiliation
Toho University
Section
Faculty of Science Department of Information Science
Job title
Assistant Professor
Other affiliation
National Institute of Information and Communications Technology
Research funding number
00455924
Twitter ID
akirakanaoka

Research Areas

 
 

Academic & Professional Experience

 
Apr 2013
 - 
Today
Assistant Professor, Toho University
 
Apr 2011
 - 
Today
Invited Advisor, National Institute of Information and Communications Technology
 
Apr 2008
 - 
Mar 2013
Assistant Professor, University of Tsukuba
 
Apr 2007
 - 
Mar 2008
Researcher, University of Tsukuba
 
Apr 2004
 - 
Mar 2007
Researcher, SECOM, Co., Ltd.
 

Published Papers

 
Password Strength Meters using Social Influence
Takahiro OHYAMA, Akira KANAOKA
   Dec 2016   [Refereed]
Privacy Preserved Rule-based Risk Analysis through Secure Multi-Party Computation
Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto
The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015)      May 2015   [Refereed]
A KEM/DEM-based Construction for Secure and Anonymous Communication
Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
The 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015) <Fast Abstract>      Jul 2015   [Refereed]
METRO: Measurement Of End-to-End Route Trust
Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto
Journal of Information Processing   23(5)    2015   [Refereed]
Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi
IEEE Transactions on Emerging Topics in Computing      2015   [Refereed]
New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services
Yohtaro MIYANISHI, Akira KANAOKA, Fumiaki SATO, Xiaogong HAN, Shinji KITAGAMI, Yoshiyori URANO, Norio SHIRATORI
The International Workshop on New Models, Algorithms and Simulation Tools for Cloud Computing, Cloud Brokering, Internet Shopping, and e-Commerce Trading (BusinessClouds 2014)      Dec 2014   [Refereed]
Data Model for Android Package Information and Its Application to Risk Analysis System
Takeshi Takahashi, Koji Nakao, Akira Kanaoka
The first ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014)      Nov 2014   [Refereed]
Transparent Probabilistic Packet Marking
Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto
Journal of Information Processing   55(9)    Sep 2014   [Refereed]
Detection of backdoor communication based on Cookie insertion by an HTTP proxy server
Masahiko Kato, Hiroshi Koide, Akira Kanaoka, Bakuei Matsukawa, Norihiko Maeda, EIji Okamoto
55(9)    Sep 2014   [Refereed]
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme
Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Akira Kanaoka, Yuuki Takano, Shin'ichiro Matsuo
2014 IEEE World Congress on Services (SERVICES2014)      Jul 2014   [Refereed]
A Secure Genetic Algorithm for the Subset Cover Problem and its Application to Privacy Protection
Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson
Eighth Workshop in Information Security Theory and Practice (WISTP 2014)      Jun 2014   [Refereed]
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation
Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
The 29th ACM Symposium on Applied Computing (SAC 2014)      Mar 2014   [Refereed]
Toward Practical Searchable Symmetric Encryption
Wakaha Ogata, Keita Koiwa, Akira Kanaoka, and Shin'ichiro Matsuo
The 8th International Workshop on Security, IWSEC2013      Nov 2013   [Refereed]
METRO: Measurement Of End-to-End Route Trust
Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto
The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014)      Sep 2014   [Refereed]
Detection of Unexpected Services and Communication Paths in Networked Systems
Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto
Journal of Information Processing      Sep 2013   [Refereed]
Construction of a Multi-Domain Functional Encryption System on Functional Information Infrastructure
Yusuke Niwa, Akira Kanaoka, Eiji Okamoto
The 16th International Conference on Network-Based Information Systems (NBiS-2013)      Sep 2013   [Refereed]
A Device for Transparent Probabilistic Packet Marking
Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto
The 4th IEEE International Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2013)      Jul 2013   [Refereed]
Risk Visualization and Alerting System for Mobile Devices: Architecture and Proof-of-Concept Implementation
Takeshi Takahashi, Keita Emura, Tadashi Minowa, Akira Kanaoka, Shin'ichiro Matsuo
the First International Workshop on Security in Embedded Systems and Smartphones (AsiaCCS SESP 2013)      May 2013   [Refereed]
Tracing Attacks on Advanced Persistent Threat in Networked Systems
Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto
5th Symposium on Configuration Analytics and Automation (SafeConfig 2012)      Oct 2012   [Refereed]
Discovery of Unexpected Services and Communication Paths in Networked Systems
Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto
5th Symposium on Configuration Analytics and Automation (SafeConfig 2012)      Oct 2012   [Refereed]
A Combined Machine Learning Method for the Detection of Attacks
Hirotaka Kokubo, Masahiro Mambo, Akira Kanaoka, Eiji Okamoto
IPSJ Journal   53(9)    Sep 2012   [Refereed]
Achieving Identity-based Encryption Enabled SSL/TLS and Its Implementation on the OpenSSL and Apache HTTP Server
Akira Kanaoka, Takuya Houri, Eiji Okamoto
JWIS 2011      Oct 2011   [Refereed]
Optimum Probability Estimation for Probabilistic Packet Marking
M. Okada, A. KANAOKA, M. Katsuno, E. Okamoto
IPSJ Journal   52(9)    Sep 2011   [Refereed]
A Method for Vulnerability Risk Assessment in Networked Systems and Its System Development
T. Harada, A. KANAOKA, M. Kato, Y. Katsuno, E. Okamoto
IPSJ Journal   52(9)    Sep 2011   [Refereed]
32-bit AS Number Based IP Traceback
M. Okada, A. Kanaoka, Y. Katsuno, E. Okamoto
the Fifth International Workshop on Advances in Information Security (WAIS-2011)      Jun 2011   [Refereed]
Probabilistic Packet Marking Method Considering Topology Property for Efficiently Re-building DoS Attack Paths
A. Kanaoka, M. Okada, Y. Katsuno, E. Okamoto
IPSJ Journal   52(3)    Mar 2011   [Refereed]
Trust Framework for Identity-based Cryptography
A. Kanaoka, M. Shimaoka, E. Okamoto
IPSJ Journal   51(9) 1692-1701   Sep 2010   [Refereed]
Multi-Layered Network Description Model for Secure Networked System Design
A. Kanaoka, T. Harada, M. Katoh, Y. Katsuno, E. Okamoto
IPSJ Journal   51(9) 1726-1735   Sep 2010   [Refereed]
RFC Supported Implementation of Key Generation Center for Identity-based Encryption
A. Kanaoka, T. Houri, E. Okamoto
The 5th Joint Workshop on Information Security (JWIS 2010)      Aug 2010   [Refereed]
Identifying Potentially-Impacted Area using CVSS for Networked Systems
T. Harada, A. Kanaoka, E. Okamoto, M. Kato
The First Workshop on Convergence Security and Privacy (CSnP 2010)      Jul 2010   [Refereed]
Propagation Model for a Mass-mailing Worm with Mailing List
A. Kanaoka, Y. Katsuno, E. Okamoto
IPSJ Journal   51(3) 682-690   Mar 2010   [Refereed]
FPGA and ASIC Implementations of the ηT Pairing in Characteristic Three
Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, and Hiroyasu Yamamoto
Computers and Electrical Engineering   36(1) 73-87   Jan 2010   [Refereed]
Extraction of Parameters from Well Managed Networked System in Access Control
. Kanaoka, M. Katoh, N. Toudou, E. Okamoto
Proceedings of The Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009)   56-61   May 2009   [Refereed]
Propagation Model for a Mass-Mailing Worm with Mailing List
A. Kanaoka, E. Okamoto
Proceedings of World Academy of Science, Engineering and Technology (WASET)   36 99-102   Dec 2008   [Refereed]
Networked System Modeling and its Access Control Characteristic Analysis
A. Kanaoka, M. Katoh, N. Toudou, E. Okamoto
Proceedings of World Academy of Science, Engineering and Technology (WASET),   35 125-133   Nov 2008   [Refereed]
Multivariate Statistical Analysis of Network Traffic for Intrusion Detection
A. Kanaoka, E. Okamoto
Proceedings of the 14th International Conference on Database and Expert Systems Applications (DEXA2003)   472-476   Sep 2003   [Refereed]
On Optimum CDMA System over Additive Colored Gaussian Noise
A.Kanaoka, Y.Sato
The 5th CDMA International Conference & Exhibition      Nov 2000   [Refereed]
Blind Equalization with Arbitrarily Fixed Time Delay
A.Kanaoka, Y.Sato
Proceedings of The 30th. ISCIE International Symposium on Stochastic Systems Theory and Its Application   129-133   Nov 1998   [Refereed]

Misc

 
Large-scale Measurement Study of BGP Origin Validation Effect against Mis-Origination
Masahito Ando, Masayuki Okada, Akira Kanaoka
The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016) Poster Session      Aug 2016   [Refereed]
"I’m Stuck, Too!" Revisiting Difficulties of Using Web Authentication Mechanisms for Visually Impaired Person
Yuta Ota, Akira Kanaoka, Tatsuya Mori
The twelfth Symposium on Usable Privacy and Security (SOUPS 2016) Poster Session      Jun 2016   [Refereed]
暗号と社会の素敵な出会い:0.編集にあたって
56(11) 1056-1057   Nov 2015
StorXCrypt: An Architecture for Multi App Multi Device Cryptographic Support for Android and its Implementation
Daisuke Moriyama, Akira Kanaoka, Ryo Takeuchi, Moti Yung
24th USENIX Security Symposium Poster Session      Aug 2015   [Refereed]
Password Strength Meters using Social Influence
Takahiro Ohyama, Akira Kanaoka
   Jul 2015
A Trial to Quantify about User's Sense of Safety in Multi Party Calculation - Toward establishing "Safely Dependability Theory" of Information Systems-
Yohtaro Miyanishi , Xiaogong Han , Akira Knaoka , Fumiaki Sato , Shinji Kitagami , Yoshiyori Urano , Norio Shiratori
2015-CSEC-68(41) 1-6   Feb 2015
Secure Multi-party Computation Based Privacy Preserved Risk Analysis
Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto
Computer Security Symposium 2014 (CSS2014)      Oct 2014
How do you build trust with your user?: Third party framework and its user interface providing trust information of cryptographic protocols
Akira Kanaoka
IWSEC 2014 Poster Session      Aug 2014   [Refereed]
Tracing Attacks on Advanced Persistent Threat in Networked Systems
Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto
21st USENIX Security Symposium Poster Session      Aug 2012   [Refereed]
Transparent Probabilistic Packet Marking: Proposal and Development
Akira Kanaoka, Nasato Goto, Masayuki Okada, Eiji Okamoto
21st USENIX Security Symposium Poster Session      Aug 2012   [Refereed]
Architecture Design for Visualizing Risks and Implementing Adequate Security
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa
   Jul 2012
Visualization of user’s end-to-end security risks
Takeshi Takahashi, Shin’ichiro Matsuo, Akira Kanaoka, Keita Emura, Yuuki Takano
The eighth Symposium on Usable Privacy and Security (SOUPS 2012) Poster Session      Jul 2012
Workshop on Usable Security (USEC12) Report
Akira KANAOKA, Takeshi TAKAHASHI
IPSJ SIG Technical Reports   2012-SPT-3(18) 1-3   May 2012
Toward Practical Probabilistic Packet Marking
Akira Kanaoka, Eiji Okamoto
IWSEC 2011 Poster      Nov 2011   [Refereed]
Toward Practical Probabilistic Packet Marking
A. Kanaoka, M. Okada, E. Okamoto
   Oct 2011
Prototype System for Visualizing Security Risks on Mobile Devices
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Tadashi Minowa
The eighth Symposium on Usable Privacy and Security (SOUPS 2012) Demo Session      Jul 2012

Conference Activities & Talks

 
Identity-based Crypto's Potential or: How I Pounded rice-cake with Prof. Rivest [Invited]
Akira KANAOKA
13 Dec 2013   
Akira KANAOKA, Masayuki OKADA, Ichita HIGURASHI, Nasato GOTO
Open Router Competition   Jun 2012   
Probabilistic Packet Marking as a Defense for DDoS Attacks [Invited]
Akira KANAOKA
2010 Japan-Taiwan Joint Research Symposium on Cryptography and Information Technology toward Next IT-society   Nov 2010   

Awards & Honors

 
May 2015
The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015) Best Paper Award
 
Oct 2011
Best Paper Awards, JWIS 2011: The 6th Joint Workshop on Information Security
 

Research Grants & Projects

 
Japan Society for the Promotion of Science: Grants-in-Aid for Scientific Research
Project Year: Apr 2013 - Mar 2015    Investigator(s): Akira KANAOKA

Others

 
The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012) Technical Program Committee
Pairing 2007 Organizing co-Chairs(2007)
2009 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2009) Sub-Track Technical Program Committee (2.2 Information and network security) (2009)
Asiacrypt 2009 Local Organizing Committee (2009)
Joint Workshop on Information Security(JWIS) Technical Program Committee (2008, 2009, 2010, 2011)
The first Asia-Pacific Workshop on Cyber Security (APWCS 2010) Program Committee
The Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012) Track 11 Program Committee
The 10th International Workshop on Security (IWSEC2015) Local Organizing Committee
The 11th International Workshop on Security (IWSEC2016) Local Organizing Committee
The 9thth International Copnference on Provable Security (ProvSec 2015) Organizing Committee
IEICE Special Section on Security, Privacy and Anonymity of Internet of Things, Guest Associate Editor
The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015) Technical Program Committee
The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016) Technical Program Committee