default search action
Ryôichi Sasaki
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Hiroshi Horikawa, Hisamichi Ohtani, Yuji Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Enhancement of a Company-Wide Information Security Management System Through Incident Learning. SN Comput. Sci. 4(3): 211 (2023) - [c65]Toshiya Seyama, Ryôichi Sasaki:
Trial of Risk Assessment for Business Application of Metaverse. MetaCom 2023: 632-636 - [c64]Ryôichi Sasaki:
AI and Security - What Changes with Generative AI. QRS Companion 2023: 208-215 - [c63]Ryôichi Sasaki:
Reconsideration of Risk Communication and Risk Assessment Support Methods for Security. QRS Companion 2023: 516-523 - [c62]Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:
An Ontology-Based Framework for Medical IoT Forensic Evidence. QRS Companion 2023: 863-864 - 2022
- [c61]Ryôichi Sasaki:
Trial Application of Risk Assessment Method for Metaverse. QRS Companion 2022: 120-128 - [c60]Taichi Hasegawa, Taiichi Saito, Ryôichi Sasaki:
Analyzing Metadata in PDF Files Published by Police Agencies in Japan. QRS Companion 2022: 145-151 - 2021
- [c59]Ryôichi Sasaki:
Application of Risk Assessment Method to Local Government Security Models. QRS Companion 2021: 1-8 - [c58]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST). QRS Companion 2021: 806-815 - 2020
- [c57]Yoshio Kakizaki, Ryôichi Sasaki, Tomohide Okochi, Hiroshi Yasuda:
CySec: Cybersecurity Review Program for Professionals in Japan. NBiS 2020: 280-289 - [c56]Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT. QRS Companion 2020: 168-175 - [c55]Haruki Kobayashi, Taiichi Saito, Ryôichi Sasaki:
Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations. QRS Companion 2020: 184-189 - [c54]Ryôichi Sasaki:
Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function. QRS Companion 2020: 190-197 - [c53]Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:
Towards a Holistic Approach to Medical IoT Forensics. QRS Companion 2020: 686-687
2010 – 2019
- 2018
- [j11]Yoshio Kakizaki, Shiomi Nishibiro, Ryôichi Sasaki:
A Mixed Content Awareness Tool for Safe Browsing. J. Comput. 13(1): 90-99 (2018) - [c52]Tomoko Kaneko, Yuji Takahashi, Takao Okubo, Ryôichi Sasaki:
An Assurance Case Approach for Software Code Security. WESPr-iMLSE@APSEC 2018: 10-17 - [c51]Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE 2018 Workshop Organizers. COMPSAC (2) 2018: 352 - [c50]Takuo Hayakawa, Ryôichi Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, Takao Okubo:
Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT. ICNCC 2018: 157-164 - 2017
- [c49]Hiroyuki Kimiyama, Naoki Yonezaki, Tomoaki Tsutsumi, Kaori Sano, Hirofumi Yamaki, Yoichiro Ueno, Ryôichi Sasaki, Hiroshi Kobayashi:
Autonomous and distributed internet security (AIS) infrastructure for safe internet. NOF 2017: 106-113 - [c48]Jigang Liu, Rashmi Kammar, Ryôichi Sasaki, Tetsutaro Uehara:
Malware Behavior Ontology for Digital Evidence. QRS Companion 2017: 585-586 - 2016
- [c47]Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE Workshop Organizers. COMPSAC Workshops 2016: 355 - [c46]Takashi Tsuchiya, Masahiro Fujita, Kenta Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks. HCI (20) 2016: 77-88 - 2015
- [j10]Masaki Samejima, Ryôichi Sasaki:
Chance-Constrained Programming Method of IT Risk Countermeasures for Social Consensus Making. IEEE Trans. Syst. Man Cybern. Syst. 45(5): 725-733 (2015) - [c45]Ryôichi Sasaki, Tetsutaro Uehara, Jigang Liu:
Message from the CFSE 2015 Workshop Organizers. COMPSAC Workshops 2015: 17 - [c44]Shota Okayasu, Ryôichi Sasaki:
Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a Botnet. COMPSAC Workshops 2015: 24-29 - [c43]Yuhei Umehara, Hayai Ando, Ryôichi Sasaki:
Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT Risks. COMPSAC Workshops 2015: 40-46 - [c42]Yifan Wang, Tetsutaro Uehara, Ryôichi Sasaki:
Fog Computing: Issues and Challenges in Security and Forensics. COMPSAC Workshops 2015: 53-59 - [c41]Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki:
Development of Intellectual Network Forensic System LIFT against Targeted Attacks. CyberSec 2015: 16-21 - [c40]Ryohei Koizumi, Ryôichi Sasaki:
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. CyberSec 2015: 28-33 - [c39]Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki:
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. CyberSec 2015: 40-45 - [c38]Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki:
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. CyberSec 2015: 46-51 - [c37]Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki:
Evaluation of a Risk-Based Management Method for Online Accounts. CyberSec 2015: 52-57 - 2014
- [c36]Naoki Kobayashi, Ryôichi Sasaki:
Proposal and Evaluation of Safe and Efficient Log Signature Scheme for the Preservation of Evidence. COMPSAC Workshops 2014: 343-347 - [c35]Hiroshi Yajima, Naohisa Tanabe, Ryôichi Sasaki:
Proposal of Collaborative Learning Support Method in Risk Communications. HCI (1) 2014: 457-465 - 2013
- [j9]Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu:
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 104-113 (2013) - [c34]Wataru Takahashi, Ryôichi Sasaki, Tetsutaro Uehara:
Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone. COMPSAC Workshops 2013: 21-26 - [c33]Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu:
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation. ICT-EurAsia 2013: 312-317 - [c32]Katsunori Sato, Masaki Samejima, Ryôichi Sasaki:
Chance-Constrained Programming Method by Constraints Aggregation for Social Consensus Making on IT Risk Countermeasure. SMC 2013: 4789-4793 - [i1]Isao Echizen, Günter Müller, Ryôichi Sasaki, A Min Tjoa:
Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5). NII Shonan Meet. Rep. 2013 (2013) - 2012
- [j8]Irfan Ahmed, Martin Naedele, Bradley L. Schatz, Ryôichi Sasaki, Andrew West:
Message from the guest editors. Int. J. Inf. Sec. 11(4): 213 (2012) - [j7]Ryôichi Sasaki:
Considerations on Risk Communication for IT Systems and Development of Support Systems. Inf. Media Technol. 7(4): 1606-1614 (2012) - [j6]Ryôichi Sasaki:
Considerations on Risk Communication for IT Systems and Development of Support Systems. J. Inf. Process. 20(4): 814-822 (2012) - [c31]Takashi Sakuma, Ryôichi Sasaki:
Proposal and Evaluation of the Digital Certificate System with Sumi-coating Module for Privacy Protection. COMPSAC Workshops 2012: 200-205 - [c30]Masaki Samejima, Ryôichi Sasaki:
Approximation method for chance-constrained programming of social consensus formation concerning IT risk countermeasure. SMC 2012: 2751-2755 - 2011
- [j5]Jigang Liu, Tetsutaro Uehara, Ryôichi Sasaki:
Development of digital forensics practice and research in Japan. Wirel. Commun. Mob. Comput. 11(2): 240-253 (2011) - [c29]Ryôichi Sasaki, Kazushige Takakusaki, Masaru Ohkawara, Hiroshi Yajima, Hidetaka Masuda, Tetsuro Kobayashi:
Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures. ARES 2011: 499-506 - [c28]Takashi Uemura, Shota Takagi, Yusuke Kosuda, Ryôichi Sasaki:
A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser. ARES 2011: 549-554 - [c27]Tatsuya Tanaka, Toshifumi Kai, Yusuke Tamura, Ryôichi Sasaki:
Development and Evaluation of Defaced Sites Automatic Detection System DICE. IIH-MSP 2011: 196-201 - 2010
- [j4]Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki:
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. J. Digit. Forensics Secur. Law 5(2): 21-34 (2010) - [c26]Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
A Security Measure Selection Scheme with Consideration of Potential Lawsuits. Security and Management 2010: 104-110 - [c25]Masaki Samejima, Masanori Akiyoshi, Norihisa Komoda, Ryôichi Sasaki:
Social consensus making support system by qualitative and quantitative hybrid simulation. SMC 2010: 896-901 - [c24]Kota Itakura, Masaki Samejima, Masanori Akiyoshi, Ryôichi Sasaki:
A consensus support system for deciding a combination of risk-reducing plans under uncertain parameters. SMC 2010: 2083-2087 - [e3]Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings. Lecture Notes in Computer Science 6434, Springer 2010, ISBN 978-3-642-16824-6 [contents] - [e2]Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings. Information Processing Society of Japan (IPSJ) 2010, ISBN 978-4-915256-78-3 [contents]
2000 – 2009
- 2009
- [c23]Yusuke Kosuda, Ryôichi Sasaki:
Proposal and Implementation of SSH Client System Using Ajax. I3E 2009: 184-196 - [c22]Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsutaro Uehara, Ryôichi Sasaki:
Implementing Boot Control for Windows Vista. IFIP Int. Conf. Digital Forensics 2009: 133-141 - [c21]Hirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, Ryôichi Sasaki:
Security Evaluation of Biometrics Authentications for Cellular Phones. IIH-MSP 2009: 34-39 - 2008
- [c20]Fumihisa Shibata, Hiroyuki Nakamoto, Ryôichi Sasaki, Asako Kimura, Hideyuki Tamura:
A View Management Method for Mobile Mixed Reality Systems. IPT/EGVE 2008: 17-24 - [c19]Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryôichi Sasaki:
Using Boot Control to Preserve the Integrity of Evidence. IFIP Int. Conf. Digital Forensics 2008: 61-74 - [c18]Kenshi Uematsu, Ryôichi Sasaki:
A Proposal of Falsification Detection System in Structural Design. IIH-MSP 2008: 137-142 - 2007
- [c17]Mitsuyuki Takatsuka, Masataka Tada, Ryôichi Sasaki:
Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence. FGCN (2) 2007: 102-107 - [c16]Hiroshi Yajima, Tomohiro Watanabe, Ryôichi Sasaki:
Evaluation of the Participant-Support Method for Information Acquisition in the "Multiplex Risk Communicator". HCI (9) 2007: 195-203 - [c15]Yuki Ashino, Ryôichi Sasaki:
Proposal of Digital Forensic System Using Security Device and Hysteresis Signature. IIH-MSP 2007: 3-7 - [c14]Mariko Irisawa, Yuki Ashino, Keisuke Fujita, Ryôichi Sasaki:
Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera. IIH-MSP 2007: 8-11 - 2006
- [c13]Hiroshi Yajima, Shinichi Matsumoto, Ryôichi Sasaki:
Proposal of Risk Communications Supporting Method in Multiplex Risk Communicator. ETFA 2006: 255-260 - [c12]Takanobu Masubuchi, Mitsuyuki Takatsuka, Ryôichi Sasaki:
A Digital Document Flexible Sanitizing Scheme. IIH-MSP 2006: 89-92 - 2005
- [j3]Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 239-246 (2005) - [c11]Kenji Yasu, Yasuhiko Akahane, Masami Ozaki, Koji Semoto, Ryôichi Sasaki:
Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail. I3E 2005: 203-217 - [c10]Ryôichi Sasaki, Saneyuki Ishii, Yuu Hidaka, Hiroshi Yajima, Hiroshi Yoshiura, Yuko Murayama:
Development Concept for and Trial Application of a "Mulutiplex Risk Communicator". I3E 2005: 607-621 - [e1]Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura:
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. IFIP 181, Springer 2005, ISBN 0-387-25658-X [contents] - 2002
- [c9]Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
Legally Authorized and Unauthorized Digital Evidence. Security Protocols Workshop 2002: 67-73 - [c8]Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh:
Combinatorial Optimization of Countermeasures against Illegal Copying. Security Protocols Workshop 2002: 128-144 - 2001
- [c7]Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems. Security Protocols Workshop 2001: 107-114 - 2000
- [c6]Satoru Tezuka, Ryôichi Sasaki, Masanori Kataoka:
Seamless Object Authentication in Different Security Policy Domains. HICSS 2000 - [c5]Shinsuke Honjo, Seiichi Susaki, Hiroshi Yoshiura, Hirokazu Aoshima, Satoru Tezuka, Ryôichi Sasaki, Tsukasa Saitoh, Hisashi Toyoshima:
Internet-Marks: the secure seal for WWW site authentication. ICPADS Workshops 2000: 393-398 - [c4]Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki:
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. Security Protocols Workshop 2000: 238-248
1990 – 1999
- 1999
- [c3]Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka:
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. Security Protocols Workshop 1999: 195-207 - 1998
- [c2]Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi:
Secure Fingerprinting Using Public-Key Cryptography (Position Paper). Security Protocols Workshop 1998: 83-89 - [c1]Ryôichi Sasaki:
Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion). Security Protocols Workshop 1998: 90-94 - 1991
- [j2]Tsutomu Nakamura, Nobuyuki Fujikura, Ryôichi Sasaki, Hiroshi Morita, Masat Hayashi, Satoru Nishino, Hiroaki Takahashi, Akio Matsuura:
Development and Performance Evaluation of Point to Multipoint Communication Control Scheme Via Satellite. Perform. Evaluation 12(3): 169-179 (1991) - 1990
- [j1]Yasuko Gotoh, Kazuo Takaragi, Ryôichi Sasaki:
A Method for Rapid RSA Key Generation. Syst. Comput. Jpn. 21(8): 11-20 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint