default search action
Jun Kurihara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Itaru Kurihara, Jun Kurihara, Toshiaki Tanaka:
A New Security Measure in Secret Sharing Schemes and Secure Network Coding. IEEE Access 12: 69163-69171 (2024) - [c18]Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai:
Extension of Resource Authorization Method with SSI in Edge Computing. AINA (6) 2024: 385-394 - 2023
- [j11]Jun Kurihara, Toshiaki Tanaka, Takeshi Kubo:
μODNS: A distributed approach to DNS anonymization with collusion resistance. Comput. Networks 237: 110078 (2023) - [c17]Ryu Watanabe, Ayumu Kubota, Jun Kurihara:
Application of Generalized Deduplication Techniques in Edge Computing Environments. AINA (3) 2023: 585-596 - 2022
- [c16]Ryu Watanabe, Ayumu Kubota, Jun Kurihara:
Resource Authorization Methods for Edge Computing. AINA (1) 2022: 167-179 - 2021
- [j10]Yuji Koike, Takuya Hayashi, Jun Kurihara, Takanori Isobe:
Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 182-189 (2021) - [j9]Jun Kurihara, Toru Nakamura, Ryu Watanabe:
Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1271-1283 (2021) - [i4]Jun Kurihara, Takeshi Kubo:
Mutualized oblivious DNS (μODNS): Hiding a tree in the wild forest. CoRR abs/2104.13785 (2021)
2010 – 2019
- 2019
- [j8]Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami:
Two-Level Named Packet Forwarding for Enhancing the Performance of Virtualized ICN Router. IEICE Trans. Commun. 102-B(9): 1813-1821 (2019) - 2018
- [c15]Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara:
In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control. LCN 2018: 303-306 - 2017
- [c14]Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara:
IPRES: in-device proxy re-encryption service for secure ICN. ICN 2017: 176-177 - 2016
- [j7]Jun Kurihara, Kenji Yokota, Atsushi Tagami:
List Interest: Simply Packing Interests Dramatically Reduces Router Workload in Content-Centric Networking. IEICE Trans. Commun. 99-B(12): 2520-2531 (2016) - [c13]Jun Kurihara, Kenji Yokota, Atsushi Tagami:
A Consumer-Driven Access Control Approach to Censorship Circumvention in Content-Centric Networking. ICN 2016: 186-194 - [c12]Kenji Yokota, Kohei Sugiyama, Jun Kurihara, Atsushi Tagami:
RTT-Based Caching Policies to Improve User-Centric Performance in CCN. AINA 2016: 124-131 - [c11]Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami:
Towards the NFVI-Assisted ICN: Integrating ICN Forwarding into the Virtualization Infrastructure. GLOBECOM 2016: 1-6 - 2015
- [j6]Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding. IEEE Trans. Inf. Theory 61(7): 3912-3936 (2015) - [c10]Jun Kurihara, Kenji Yokota, Kazuaki Ueda, Atsushi Tagami:
List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0. MASS 2015: 500-505 - [c9]Kazuaki Ueda, Kenji Yokota, Jun Kurihara, Atsushi Tagami:
A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking. MASS 2015: 531-536 - [c8]Jun Kurihara, Ersin Uzun, Christopher A. Wood:
An encryption-based access control framework for content-centric networking. Networking 2015: 1-9 - 2013
- [i3]Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu:
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding. CoRR abs/1301.5482 (2013) - 2012
- [j5]Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto:
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(11): 2067-2075 (2012) - [c7]Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto:
New parameters of linear codes expressing security performance of universal secure network coding. Allerton Conference 2012: 533-540 - [c6]Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto:
Explicit construction of universal strongly secure network coding via MRD codes. ISIT 2012: 1483-1487 - [i2]Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto:
New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding. CoRR abs/1207.1936 (2012) - 2011
- [j4]Jun Kurihara, Tomohiko Uyematsu:
A Novel Realization of Threshold Schemes over Binary Field Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1375-1380 (2011) - [c5]Jun Kurihara, Tomohiko Uyematsu:
Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight. Allerton 2011: 951-957 - 2010
- [c4]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Stream Cipher-Based Hash Function and Its Security. ICETE (Selected Papers) 2010: 188-202 - [c3]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343
2000 – 2009
- 2009
- [j3]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1808-1821 (2009) - [c2]Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara:
The rakaposhi Stream Cipher. ICICS 2009: 32-46 - 2008
- [j2]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 127-138 (2008) - [j1]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2365-2378 (2008) - [c1]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ISC 2008: 455-470 - [i1]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. IACR Cryptol. ePrint Arch. 2008: 409 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint