• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

SU CHUNHUA  蘇 春華

… Alternative Names

SU Chunhua  スー チュンホワ

Su Chunhua  SU Chunhua

Less
Researcher Number 40716966
Other IDs
  • ORCIDhttps://orcid.org/0000-0002-6461-9684
Affiliation (Current) 2025: 会津大学, コンピュータ理工学部, 上級准教授
Affiliation (based on the past Project Information) *help 2023: 会津大学, コンピュータ理工学部, 上級准教授
2019 – 2021: 会津大学, コンピュータ理工学部, 上級准教授
2017 – 2018: 会津大学, コンピュータ理工学部, 准教授
2016: 大阪大学, 工学研究科, 助教
2015: 北陸先端科学技術大学院大学, 情報科学研究科, 助教
Review Section/Research Field
Principal Investigator
Basic Section 60070:Information security-related / Information security
Except Principal Investigator
Basic Section 61030:Intelligent informatics-related / Basic Section 60070:Information security-related
Keywords
Principal Investigator
IoT機器 / 暗号技術 / プライバシ保護 / 物理層 / 連合学習 / データの信頼性 / 暗号鍵生成と管理 / 相互トラスペラント認証 / IoT機器の安全性管理 / ホワイトボックス軽量化実装 … More / ウエアラブル機器のセキュリティ / ウエアラブル機器認証 / 軽量化暗号 / IoTデータプライバシ保護 / IoTシステム / ウェアラブル機器 / AIセキュリティ / ウエアラブル機器セキュリティ / IoT機器セキュリティ / ウエアラブル機器 / 共通鍵暗号の解析 / Oblivious RAM / IoT機器向けの認証 / プライバシ保護技術 / 共通鍵暗号 / IoTデバイス認証 / IoT機器プライバシ / IoT生体認証 / 軽量化認証暗号 / IoT機器認証 / IoTセキュリティ … More
Except Principal Investigator
Privacy / Data Management / Encrypted Searching / Streaming Big Data / Encypted Searching / Security / Emergency Scenario / Big Data Analysis / ビットコイン / データベース / 仮想通過 / 暗号プロトコル / 認証 / セキュリティ / 暗号資産 / 暗号ハッシュ関数 / 耐量子暗号 / デジタル通貨 / プライバシー / 暗号仮想通貨 / 分散データベース / ハッシュ関数 / 匿名通信 / ブロックチェーン / プライバシー保護 / 分散計算 / 仮想通貨 / 暗号 Less
  • Research Projects

    (5 results)
  • Research Products

    (124 results)
  • Co-Researchers

    (6 People)
  •  Physical Layer-based Cryptographic Key Management and Data Reliability Assurance for Smart IoT EnvironmentsPrincipal Investigator

    • Principal Investigator
      SU Chunhua
    • Project Period (FY)
      2023 – 2025
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      The University of Aizu
  •  Safe and Secure Data Management and Analytics Platform for Real-time Information Service in Disaster Scenarios

    • Principal Investigator
      王 軍波
    • Project Period (FY)
      2019
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 61030:Intelligent informatics-related
    • Research Institution
      The University of Aizu
  •  Information Security Framework for Wearable DevicesPrincipal Investigator

    • Principal Investigator
      Su Chunhua
    • Project Period (FY)
      2018 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      The University of Aizu
  •  Systematic Evaluation on Security and Privacy of Crypto-Virtual Currency

    • Principal Investigator
      SAKURAI KOUICHI
    • Project Period (FY)
      2018 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Kyushu University
  •  Authentication and Privacy-preserving Technologies for IoT EnvironmentPrincipal Investigator

    • Principal Investigator
      Su Chunhua
    • Project Period (FY)
      2015 – 2017
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Information security
    • Research Institution
      The University of Aizu
      Osaka University
      Japan Advanced Institute of Science and Technology

All 2024 2023 2021 2020 2019 2018 2017 2016 2015

All Journal Article Presentation Book

  • [Book] BCC '19: Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts2019

    • Author(s)
      Satyanarayana V Lokam , Sushmita Ruj, Kouichi Sakurai
    • Total Pages
      25
    • Publisher
      ACM Special Interest Group on Security, Audit and Control
    • ISBN
      9781450367851
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Book] Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts2018

    • Author(s)
      Satya LOKAM, Sushmita RUJ, Kouichi SAKURAI
    • Total Pages
      63
    • Publisher
      ACM
    • ISBN
      9781450357586
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Book] Network and System Security - 10th International Conference, NSS 20162017

    • Author(s)
      Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
    • Total Pages
      540
    • Publisher
      Springer
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain2024

    • Author(s)
      Wang Bin、Yuan Xiaohan、Duan Li、Ma Hongliang、Wang Bin、Su Chunhua、Wang Wei
    • Journal Title

      IEEE Transactions on Computational Social Systems

      Volume: 11 Issue: 2 Pages: 1577-1588

    • DOI

      10.1109/tcss.2022.3228122

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles2024

    • Author(s)
      Lian Zhuotao、Zeng Qingkui、Wang Weizheng、Xu Dequan、Meng Weizhi、Su Chunhua
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 11 Issue: 4 Pages: 6722-6729

    • DOI

      10.1109/jiot.2023.3312348

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption2024

    • Author(s)
      He Buzhen、Feng Tao、Fang Junli、Liu Chunyan、Su Chunhua
    • Journal Title

      IEEE Transactions on Consumer Electronics

      Volume: 70 Issue: 1 Pages: 263-276

    • DOI

      10.1109/tce.2023.3323356

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics2024

    • Author(s)
      Zong Jianfeng、Wang Chen、Shen Jian、Su Chunhua、Wang Weizheng
    • Journal Title

      IEEE Transactions on Consumer Electronics

      Volume: 70 Issue: 1 Pages: 3994-4004

    • DOI

      10.1109/tce.2023.3279652

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVs2024

    • Author(s)
      Wang Weizheng、Han Zhaoyang、Gadekallu Thippa Reddy、Raza Saleem、Tanveer Jawad、Su Chunhua
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 11 Issue: 6 Pages: 9547-9557

    • DOI

      10.1109/jiot.2023.3324543

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] PCIDS: Permission and Credibility-Based Intrusion Detection System in IoT Gateways2024

    • Author(s)
      Zhang Chen、Lian Zhuotao、Huang Huakun、Su Chunhua
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 11 Issue: 1 Pages: 904-913

    • DOI

      10.1109/jiot.2023.3289206

    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing2024

    • Author(s)
      Yang Yaoqi、Zhang Bangning、Guo Daoxing、Xu Renhui、Su Chunhua、Wang Weizheng
    • Journal Title

      IEEE Transactions on Emerging Topics in Computing

      Volume: 12 Issue: 1 Pages: 281-292

    • DOI

      10.1109/tetc.2023.3268234

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving2024

    • Author(s)
      Wang Taiyu、Yang Qinglin、Zhu Kaiming、Wang Junbo、Su Chunhua、Sato Kento
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 19 Pages: 1015-1030

    • DOI

      10.1109/tifs.2023.3322328

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] A coordinates-based hierarchical computing framework towards spatial data processing2023

    • Author(s)
      Qiu Chen、Wang Haoda、Yang Qinglin、Su Chunhua、Huang Huawei
    • Journal Title

      Computer Communications

      Volume: 211 Pages: 83-92

    • DOI

      10.1016/j.comcom.2023.09.005

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Blockchain-Based Personalized Federated Learning for Internet of Medical Things2023

    • Author(s)
      Lian Zhuotao、Wang Weizheng、Han Zhaoyang、Su Chunhua
    • Journal Title

      IEEE Transactions on Sustainable Computing

      Volume: 8 Issue: 4 Pages: 694-702

    • DOI

      10.1109/tsusc.2023.3279111

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Special Issue Editorial “Blockchain-Enabled Technology for IoT Security, Privacy and Trust”2023

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Cha Shi-Cho
    • Journal Title

      Symmetry

      Volume: 15 Issue: 5 Pages: 1059-1059

    • DOI

      10.3390/sym15051059

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Smart contract token-based privacy-preserving access control system for industrial Internet of Things2023

    • Author(s)
      Wang Weizheng、Huang Huakun、Yin Zhimeng、Gadekallu Thippa Reddy、Alazab Mamoun、Su Chunhua
    • Journal Title

      Digital Communications and Networks

      Volume: 9 Issue: 2 Pages: 337-346

    • DOI

      10.1016/j.dcan.2022.10.005

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] A Trusted Reputation Management Scheme for Cross-Chain Transactions2023

    • Author(s)
      Chen Kuongho、Lee Lin-Fa、Chiu Wayne、Su Chunhua、Yeh Kuo-Hui、Chao Han-Chieh
    • Journal Title

      Sensors

      Volume: 23 Issue: 13 Pages: 6033-6033

    • DOI

      10.3390/s23136033

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Journal Article] Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum2021

    • Author(s)
      Zeng Siqi、Kaneko Kosuke、Ke Yan、Tan Haowen、Sakurai Kouichi
    • Journal Title

      Proc. Ninth International Symposium on Computing and Networking, CANDAR 2021 - Workshops,

      Volume: 1 Pages: 473-477

    • DOI

      10.1109/candarw53999.2021.00088

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment2021

    • Author(s)
      Zhao Lingjun、Huang Huakun、Su Chunhua、Ding Shuxue、Huang Huawei、Tan Zhiyuan、Li Zhenni
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 8 Issue: 5 Pages: 3211-3223

    • DOI

      10.1109/jiot.2020.3019732

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning2021

    • Author(s)
      Fang Liming、Yun Xinyu、Yin Changchun、Ding Weiping、Zhou Lu、Liu Zhe、Su Chunhua
    • Journal Title

      IEEE Transactions on Fuzzy Systems

      Volume: 29 Issue: 4 Pages: 742-756

    • DOI

      10.1109/tfuzz.2020.2965872

    • Data Source
      KAKENHI-PROJECT-19J15225, KAKENHI-PROJECT-18K11298
  • [Journal Article] You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks2020

    • Author(s)
      Zhou Lu、Su Chunhua、Chiu Wayne、Yeh Kuo-Hui
    • Journal Title

      IEEE Transactions on Emerging Topics in Computing

      Volume: 8 Issue: 2 Pages: 303-312

    • DOI

      10.1109/tetc.2017.2759306

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT2020

    • Author(s)
      Mamun Mohammad、Miyaji Atsuko、Luv Rongxing、Su Chunhua
    • Journal Title

      Peer-to-Peer Networking and Applications

      Volume: 14 Issue: 2 Pages: 708-721

    • DOI

      10.1007/s12083-020-01007-z

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-23K21669
  • [Journal Article] Leakage-resilient biometric-based remote user authentication with fuzzy extractors2020

    • Author(s)
      Tian Yangguang、Li Yingjiu、Sengupta Binanda、Li Nan、Su Chunhua
    • Journal Title

      Theoretical Computer Science

      Volume: 814 Pages: 223-233

    • DOI

      10.1016/j.tcs.2020.02.001

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes2020

    • Author(s)
      Lu Zhou, Chunpeng Ge, and Chunhua Su
    • Journal Title

      Science China Information Sciences volume

      Volume: 63 Issue: 3

    • DOI

      10.1007/s11432-019-9922-x

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine2020

    • Author(s)
      Fang Liming、Yin Changchun、Zhou Lu、Li Yang、Su Chunhua、Xia Jinyue
    • Journal Title

      Information Sciences

      Volume: 507 Pages: 143-160

    • DOI

      10.1016/j.ins.2019.08.020

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Am I eclipsed? A smart detector of eclipse attacks for Ethereum2020

    • Author(s)
      Xu Guangquan、Guo Bingjiang、Su Chunhua、Zheng Xi、Liang Kaitai、Wong Duncan S.、Wang Hao
    • Journal Title

      Computers & Security

      Volume: 88 Pages: 101604-101604

    • DOI

      10.1016/j.cose.2019.101604

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things2020

    • Author(s)
      Xiong Hu、Wu Yan、Su Chunhua、Yeh Kuo-hui
    • Journal Title

      Journal of Information Security and Applications

      Volume: 53 Pages: 102507-102507

    • DOI

      10.1016/j.jisa.2020.102507

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Special issue on security and privacy of blockchain technologies2020

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Deng Robert H.、Yung Moti、Kutylowski Miroslaw
    • Journal Title

      International Journal of Information Security

      Volume: 19 Issue: 3 Pages: 243-244

    • DOI

      10.1007/s10207-020-00496-6

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] A MQTT-API-compatible IoT security-enhanced platform2020

    • Author(s)
      Chien Hung Yu、Chen Yi Jui、Qiu Guo Hao、Liao Jian Fu、Hung Ruo Wei、Lin Pei Chih、Kou Xi An、Chiang Mao Lun、Su Chunhua
    • Journal Title

      International Journal of Sensor Networks

      Volume: 32 Issue: 1 Pages: 54-54

    • DOI

      10.1504/ijsnet.2020.104463

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks2020

    • Author(s)
      Zhou Lu、Ge Chunpeng、Hu Simin、Su Chunhua
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 7 Issue: 5 Pages: 3948-3957

    • DOI

      10.1109/jiot.2019.2959094

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts2020

    • Author(s)
      Wang Wei、Song Jingjing、Xu Guangquan、Li Yidong、Wang Hao、Su Chunhua
    • Journal Title

      IEEE Transactions on Network Science and Engineering (Early Access )

      Volume: x Issue: 2 Pages: 1-1

    • DOI

      10.1109/tnse.2020.2968505

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs2020

    • Author(s)
      Xu Guangquan、Li Xiaotong、Jiao Litao、Wang Weizhe、Liu Ao、Su Chunhua、Zheng Xi、Liu Shaoying、Cheng Xiaochun
    • Journal Title

      IEEE Communications Magazine

      Volume: 58 Issue: 7 Pages: 35-41

    • DOI

      10.1109/mcom.001.2000118

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Design and application of a personal credit information sharing platform based on consortium blockchain2020

    • Author(s)
      Zhang Jing、Tan Rong、Su Chunhua、Si Wen
    • Journal Title

      Journal of Information Security and Applications

      Volume: 55 Pages: 102659-102659

    • DOI

      10.1016/j.jisa.2020.102659

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Lightweight IoT-based authentication scheme in cloud computing circumstance2019

    • Author(s)
      Zhou Lu、Li Xiong、Yeh Kuo-Hui、Su Chunhua、Chiu Wayne
    • Journal Title

      Future Generation Computer Systems

      Volume: 91 Pages: 244-251

    • DOI

      10.1016/j.future.2018.08.038

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-19J15225
  • [Journal Article] Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring2019

    • Author(s)
      Huang Huakun、Han Zhaoyang、Ding Shuxue、Su Chunhua、Zhao Lingjun
    • Journal Title

      Symmetry

      Volume: 11 Issue: 5 Pages: 637-637

    • DOI

      10.3390/sym11050637

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust2019

    • Author(s)
      Anada Hiroaki、Yasuda Takanori、Kawamoto Junpei、Weng Jian、Sakurai Kouichi
    • Journal Title

      Journal of Information Security and Applications

      Volume: 45 Pages: 10-19

    • DOI

      10.1016/j.jisa.2018.12.006

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] AI-Driven Cyber Security Analytics and Privacy Protection2019

    • Author(s)
      Chen Jiageng、Su Chunhua、Yan Zheng
    • Journal Title

      Security and Communication Networks

      Volume: 2019 Pages: 1-2

    • DOI

      10.1155/2019/1859143

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Secure and Efficient ${K}$ Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem2019

    • Author(s)
      Guo Cheng、Zhuang Ruhan、Su Chunhua、Liu Charles Zhechao、Choo Kim-Kwang Raymond
    • Journal Title

      IEEE Internet of Things Journal

      Volume: 6 Issue: 6 Pages: 9868-9879

    • DOI

      10.1109/jiot.2019.2932775

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-19K12122
  • [Journal Article] Security analysis and new models on the intelligent symmetric key encryption2019

    • Author(s)
      Zhou Lu、Chen Jiageng、Zhang Yidan、Su Chunhua、Anthony James Marino
    • Journal Title

      Computers & Security

      Volume: 80 Pages: 14-24

    • DOI

      10.1016/j.cose.2018.07.018

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Game theoretic security of quantum bit commitment2019

    • Author(s)
      Zhou Lu、Sun Xin、Su Chunhua、Liu Zhe、Raymond Choo Kim-Kwang
    • Journal Title

      Information Sciences

      Volume: 479 Pages: 503-514

    • DOI

      10.1016/j.ins.2018.03.046

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device2019

    • Author(s)
      Zhou Lu、Su Chunhua、Hu Zhi、Lee Sokjoon、Seo Hwajeong
    • Journal Title

      ACM Transactions on Embedded Computing Systems

      Volume: 18 Issue: 3 Pages: 1-13

    • DOI

      10.1145/3236010

    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-19J15225
  • [Journal Article] New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario2019

    • Author(s)
      Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu
    • Journal Title

      KSII Transactions on Internet and Information Systems

      Volume: 13 Issue: 9 Pages: 4727-4741

    • DOI

      10.3837/tiis.2019.09.022

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Reliable Decentralized Oracle with Mechanisms for Verification and Disputation2019

    • Author(s)
      Ma Limao、Kaneko Kosuke、Sharma Subodh、Sakurai Kouichi
    • Journal Title

      CANDAR Workshops 2019

      Volume: xxx Pages: 346-352

    • DOI

      10.1109/candarw.2019.00067

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Simulation of Secure Volunteer Computing by Using Blockchain2019

    • Author(s)
      Shota Johjima、Kosuke Kaneko、Sharma Subodh、Kouichi Sakurai
    • Journal Title

      AINA 2019, Advances in Intelligent Systems and Computing

      Volume: 926 Pages: 883-894

    • DOI

      10.1007/978-3-030-15032-7_74

    • ISBN
      9783030150310, 9783030150327
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things2019

    • Author(s)
      Zhou Lu、Su Chunhua、Yeh Kuo-Hui
    • Journal Title

      ACM Transactions on Embedded Computing Systems

      Volume: 18 Issue: 3 Pages: 1-10

    • DOI

      10.1145/3301306

    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-19J15225
  • [Journal Article] Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work2019

    • Author(s)
      Anada Hiroaki、Matsushima Tomohiro、Su Chunhua、Meng Weizhi、Kawamoto Junpei、Bag Samiran、Sakurai Kouichi
    • Journal Title

      Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Lecture Notes in Computer Science

      Volume: 11449 Pages: 101-114

    • DOI

      10.1007/978-3-030-14234-6_6

    • ISBN
      9783030142339, 9783030142346
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Intrusion Detection based on Device-Free Localization in the Era of IoT2019

    • Author(s)
      Lingjun Zhao, Chunhua Su, Huakun Huang, Shuxue Ding*, Zhaoyang Han, Xiang Li
    • Journal Title

      Symmetry

      Volume: 630 Issue: 5 Pages: 1-11

    • DOI

      10.3390/sym11050630

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16K00335, KAKENHI-PROJECT-18K11298
  • [Journal Article] A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing2019

    • Author(s)
      Ge Chunpeng、Zhou Lu、Xia Jinyue、Szalachowski Pawel、Su Chunhua
    • Journal Title

      IEEE Access

      Volume: 7 Pages: 137266-137278

    • DOI

      10.1109/access.2019.2942651

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Y-DWMS: A Digital Watermark Management System Based on Smart Contracts2019

    • Author(s)
      Zhao Bo、Fang Liming、Zhang Hanyi、Ge Chunpeng、Meng Weizhi、Liu Liang、Su Chunhua
    • Journal Title

      Sensors

      Volume: 19 Issue: 14 Pages: 3091-3091

    • DOI

      10.3390/s19143091

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-18H03240
  • [Journal Article] Automatic fine-grained access control in SCADA by machine learning2019

    • Author(s)
      Zhou Lu、Su Chunhua、Li Zhen、Liu Zhe、Hancke Gerhard P.
    • Journal Title

      Future Generation Computer Systems

      Volume: 93 Pages: 548-559

    • DOI

      10.1016/j.future.2018.04.043

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Polynomial-based modifiable blockchain structure for removing fraud transactions2019

    • Author(s)
      Cheng Lichen、Liu Jiqiang、Su Chunhua、Liang Kaitai、Xu Guangquan、Wang Wei
    • Journal Title

      Future Generation Computer Systems

      Volume: 99 Pages: 154-163

    • DOI

      10.1016/j.future.2019.04.028

    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries2019

    • Author(s)
      Bagus Santoso、Chunhua Su
    • Journal Title

      Journal of Universal Computer Science

      Volume: 25 Pages: 294-308

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] OTP-IoT: An ownership transfer protocol for the Internet of Things2018

    • Author(s)
      Mamun Mohammad Saiful Islam、Su Chunhua、Yang Anjia、Miyaji Atsuko、Ghorbani Ali
    • Journal Title

      Journal of Information Security and Applications

      Volume: 43 Pages: 73-82

    • DOI

      10.1016/j.jisa.2018.10.009

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-15K00183
  • [Journal Article] Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints2018

    • Author(s)
      Zhou Lu、Yeh Kuo-Hui、Hancke Gerhard、Liu Zhe、Su Chunhua
    • Journal Title

      IEEE Signal Processing Magazine

      Volume: 35 Issue: 5 Pages: 76-87

    • DOI

      10.1109/msp.2018.2846297

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Authentication with What You See and Remember in the Internet of Things2018

    • Author(s)
      Chiu Wayne、Su Chunhua、Fan Chuan-Yen、Chen Chien-Ming、Yeh Kuo-Hui
    • Journal Title

      Symmetry

      Volume: 10 Issue: 11 Pages: 537-537

    • DOI

      10.3390/sym10110537

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository2018

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Hou Jia-Li、Chiu Wayne、Chen Chien-Ming
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 59394-59404

    • DOI

      10.1109/access.2018.2874021

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Special Issue on Advanced Persistent Threat2018

    • Author(s)
      Chen Jiageng、Su Chunhua、Yeh Kuo-Hui、Yung Moti
    • Journal Title

      Future Generation Computer Systems

      Volume: 79 Pages: 243-246

    • DOI

      10.1016/j.future.2017.11.005

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics2018

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Chiu Wayne、Zhou Lu
    • Journal Title

      IEEE Communications Magazine

      Volume: 56 Issue: 2 Pages: 150-157

    • DOI

      10.1109/mcom.2018.1700339

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems2018

    • Author(s)
      Li Wenjuan、Meng Weizhi、Su Chunhua、Kwok Lam For
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 6530-6539

    • DOI

      10.1109/access.2018.2794685

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Towards practical white-box lightweight block cipher implementations for IoTs2018

    • Author(s)
      Zhou Lu、Su Chunhua、Wen Yamin、Li Weijie、Gong Zheng
    • Journal Title

      Future Generation Computer Systems

      Volume: 86 Pages: 507-514

    • DOI

      10.1016/j.future.2018.04.011

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices2018

    • Author(s)
      Cha Shi-Cho、Chuang Ming-Shiung、Yeh Kuo-Hui、Huang Zi-Jia、Su Chunhua
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 20779-20787

    • DOI

      10.1109/access.2018.2820716

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-18K11298
  • [Journal Article] Stag hunt and trust emergence in social networks2018

    • Author(s)
      Zhou Lu、Su Chunhua、Sun Xin、Zhao Xishun、Choo Kim-Kwang Raymond
    • Journal Title

      Future Generation Computer Systems

      Volume: 88 Pages: 168-172

    • DOI

      10.1016/j.future.2018.05.053

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Journal Article] Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data2018

    • Author(s)
      Meng Weizhi、Li Wenjuan、Su Chunhua、Zhou Jianying、Lu Rongxing
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 7234-7243

    • DOI

      10.1109/access.2017.2772294

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems2018

    • Author(s)
      Nishida Yuki、Kaneko Kosuke、Sharma Subodh、Sakurai Kouichi
    • Journal Title

      Sixth International Symposium on Computing and Networking, CANDAR Workshops 2018,

      Volume: 1 Pages: 524-528

    • DOI

      10.1109/candarw.2018.00102

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      International Journal of Foundations of Computer Science

      Volume: 28 Issue: 06 Pages: 661-682

    • DOI

      10.1142/s0129054117400123

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices2017

    • Author(s)
      Gordon Steven、Huang Xinyi、Miyaji Atsuko、Su Chunhua、Sumongkayothin Karin、Wipusitwarakun Komwut
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 12 Issue: 12 Pages: 3024-3038

    • DOI

      10.1109/tifs.2017.2730584

    • NAID

      120006469242

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] A simple authentication encryption scheme2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: 29 Issue: 16 Pages: 16-16

    • DOI

      10.1002/cpe.4058

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Special issue on Secure Computation on Encrypted Data2017

    • Author(s)
      Chen Jiageng、He Debiao、Su Chunhua、Xia Zhe
    • Journal Title

      Journal of Information Security and Applications

      Volume: 34 Pages: 205-206

    • DOI

      10.1016/j.jisa.2017.05.010

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Variable message encryption through blockcipher compression function2017

    • Author(s)
      Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: Volume 29, Issue 7 Issue: 7 Pages: 1-16

    • DOI

      10.1002/cpe.3956

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Formal Analysis on RFID Authentication Protocols against De-synchronization Attack2017

    • Author(s)
      Kuo-Hui Yeh, Nai-Wei Lo, Ren-Zong Kuo, Chunhua SU, Hsuan-Yu Chen,
    • Journal Title

      Journal of Internet Technology,

      Volume: Vol. 18, No.4

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things2017

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Choo Kim-Kwang Raymond、Chiu Wayne
    • Journal Title

      Sensors

      Volume: 17 Issue: 5 Pages: 1001-1001

    • DOI

      10.3390/s17051001

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks2017

    • Author(s)
      Chen Jiageng、Teh Jesen、Liu Zhe、Su Chunhua、Samsudin Azman、Xiang Yang
    • Journal Title

      IEEE Transactions on Computers

      Volume: 66 Issue: 10 Pages: 1763-1777

    • DOI

      10.1109/tc.2017.2699190

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] A Matrix Based ORAM: Design, Implementation and Experimental Analysis2016

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E99.D Issue: 8 Pages: 2044-2055

    • DOI

      10.1587/transinf.2015INP0012

    • NAID

      130005254057

    • ISSN
      0916-8532, 1745-1361
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Universally Composable RFID Mutual Authentication2015

    • Author(s)
      Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, and Xinyi Huang
    • Journal Title

      IEEE Transactions on Dependable and Secure Computing

      Volume: 99 Pages: 1-1

    • DOI

      10.1109/tdsc.2015.2434376

    • Peer Reviewed / Acknowledgement Compliant / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Journal Article] Improved Handover Authentication and Key Pre-distribution for Wireless Mesh Networks2015

    • Author(s)
      Xu Yang, Xinyi Huang, Jinguang Han and Chunhua Su
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: 99 Issue: 10 Pages: 11-11

    • DOI

      10.1002/cpe.3544

    • Peer Reviewed / Acknowledgement Compliant / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning2023

    • Author(s)
      Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su
    • Organizer
      Information Security Practice and Experience - 18th International Conference, ISPEC 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning2023

    • Author(s)
      Zhuotao Lian, Chen Zhang, Kaixi Nan, Chunhua Su
    • Organizer
      Network and System Security - 17th International Conference, NSS 2023
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] Instant and Secure Channel Key Extraction Scheme Among Wireless Devices2023

    • Author(s)
      Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang
    • Organizer
      Global Communications Conference 2023 (GLOBECOM 2023)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage2023

    • Author(s)
      Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su
    • Organizer
      20th Annual International Conference on Privacy, Security and Trust, PST 2023
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios2023

    • Author(s)
      Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang
    • Organizer
      Information and Communications Security - 25th International Conference, ICICS 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] Privacy-stealing Approach in Distributed IoMT Systems2023

    • Author(s)
      Haoda Wang, Lingjun Zhao, Chen Qiu, Zhuotao Lian, Chunhua Su
    • Organizer
      16th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, MCSoC 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] BrokerFi: A DeFi dApp Built upon Broker-based Blockchain2023

    • Author(s)
      Jian Zheng, Qinde Chen, Chunhua Su, Huawei Huang
    • Organizer
      29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality2023

    • Author(s)
      Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou
    • Organizer
      20th Annual International Conference on Privacy, Security and Trust, PST 2023
    • Data Source
      KAKENHI-PROJECT-23K11103
  • [Presentation] Systematic Research on Technology and Challenges of Lightning Network2021

    • Author(s)
      Zhixin Zhao, Lu Zhou, Chunhua Su
    • Organizer
      IEEE Conference on Dependable and Secure Computing, DSC 2021
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin2020

    • Author(s)
      Weizheng Wang, Chunhua Su
    • Organizer
      ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid2020

    • Author(s)
      Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su
    • Organizer
      19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Deep Reinforcement Learning for Optimal Resource Allocation in Blockchain-based IoV Secure Systems2020

    • Author(s)
      Hongzhi Xiao, Chen Qiu, Qinglin Yang, Huakun Huang, Junbo Wang, Chunhua Su
    • Organizer
      16th International Conference on Mobility, Sensing and Networking, MSN 2020
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack2020

    • Author(s)
      Shenqing Wang, Jiang Wang, Chunhua Su, Xinshu Ma
    • Organizer
      26th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2020
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] How to Model the Bribery Attack: A Practical Quantification Method in Blockchain2020

    • Author(s)
      Hanyi Sun, Na Ruan, Chunhua Su
    • Organizer
      25th European Symposium on Research in Computer Security, ESORICS 2020
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] A Fault-Tolerant and Flexible Privacy-Preserving Multisubset Data Aggregation in Smart Grid2019

    • Author(s)
      Hung-Yu Chien, Chunhua Su
    • Organizer
      International Conference on Computational Science & Intelligence and Applied Informatics (CSII 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Secure and Efficient MQTT Group Communication Design2019

    • Author(s)
      Hung-Yu Chien, Xi-An Kou, Mao-Lun Chiang, Chunhua Su
    • Organizer
      International Conference on Computational Science & Intelligence and Applied Informatics (CSII 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds2019

    • Author(s)
      Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su
    • Organizer
      4th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Device-Free Localization via Sparse Coding with Log-Regularizer2019

    • Author(s)
      Zhaoyang Han, Chunhua Su, Shuxue Ding, Huakun Huang, Lingjun Zhao
    • Organizer
      10th International Conference on Awareness Science and Technology (iCAST 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks2019

    • Author(s)
      Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, Chunhua Su
    • Organizer
      24th European Symposium on Research in Computer Security (ESORICS 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.2019

    • Author(s)
      Bagus Santoso, Yasutada Oohama, Chunhua Su
    • Organizer
      13th International Conference on Network and System Security (NSS 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones2019

    • Author(s)
      Hao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo
    • Organizer
      15th International Conference on Information Security and Cryptology (Inscrypt2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] An Efficient Vulnerability Detection Model for Ethereum Smart Contracts2019

    • Author(s)
      Jingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang
    • Organizer
      13th International Conference on Network and System Security (NSS 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Hierarchical MQTT with Edge Computation2019

    • Author(s)
      Hung-Yu Chien, Guo-Hao Qiu, Ruo-Wei Hung, An-Tong Shih, Chunhua Su
    • Organizer
      10th International Conference on Awareness Science and Technology (iCAST 2019)
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features2018

    • Author(s)
      Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su, Dandan Xu
    • Organizer
      Conference on Information Security and Cryptology 2019
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] CPMap: Design of Click-Points Map-Based Graphical Password Authentication2018

    • Author(s)
      Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han
    • Organizer
      IFIP TC11: Security and Protection in Information Processing Systems 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work2018

    • Author(s)
      Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai
    • Organizer
      Conference on Information Security and Cryptology 2019
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298
  • [Presentation] A simple construction of encryption for a tiny domain message2017

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Organizer
      51st Annual Conference on Information Sciences and Systems, CISS 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Evaluating the Impact of Juice Filming Charging Attack in Practical Environments2017

    • Author(s)
      Weizhi Meng, Lee Wang Hao, Zhe Liu, Chunhua Su, Yan Li:
    • Organizer
      nformation Security and Cryptology - ICISC 2017 - 20th International Conference
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models2017

    • Author(s)
      Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
    • Organizer
      Information Security Practice and Experience - 13th International Conference, ISPEC 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study2017

    • Author(s)
      Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li
    • Organizer
      Network and System Security - 11th International Conference, NSS 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.2017

    • Author(s)
      Ye Li, Kaitai Liang, Chunhua Su, Wei Wu
    • Organizer
      Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2.2017

    • Author(s)
      Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su
    • Organizer
      The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.2017

    • Author(s)
      Bagus Santoso, Chunhua Su
    • Organizer
      Provable Security - 11th International Conference, ProvSec 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Cryptography-based Solutions for security and privacy in eHealth environment2017

    • Author(s)
      Chunhua Su
    • Organizer
      The 2nd International Conference on Information Technology (InCIT 2017)
    • Invited
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework2016

    • Author(s)
      Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang
    • Organizer
      Australasian Conference on Information Security and Privacy ACISP 2016
    • Place of Presentation
      Melbourne, VIC, Australia
    • Year and Date
      2016-07-04
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] : Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.2016

    • Author(s)
      Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia
    • Organizer
      International Conference on Information Security Practice and Experience ISPEC 2016
    • Place of Presentation
      Zhangjiajie, China
    • Year and Date
      2016-11-16
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] An Efficient Construction of a Compression Function for Cryptographic Hash2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Organizer
      International Conference on Availability, Reliability, and Security, CD-ARES 2016
    • Place of Presentation
      Salzburg, Austria
    • Year and Date
      2016-08-31
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data2016

    • Author(s)
      Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu
    • Organizer
      ASIA CCS '16, the 11th ACM on Asia Conference on Computer and Communications Security
    • Place of Presentation
      Xian, China
    • Year and Date
      2016-05-30
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space2016

    • Author(s)
      Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun
    • Organizer
      International Conference on Applications and Techniques in Information Security ATIS 2016
    • Place of Presentation
      Cairns, QLD, Australia
    • Year and Date
      2016-10-26
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] A Blockcipher Based Authentication Encryption2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Organizer
      International Conference on Availability, Reliability, and Security, CD-ARES 2016
    • Place of Presentation
      Salzburg, Austria
    • Year and Date
      2016-08-31
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Secure and Mutual Traceable Distributing Scheme for Big Data2016

    • Author(s)
      Kaitai Liang, Atsuko Miyaji, Chunhua Su
    • Organizer
      SCIS2016 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本県熊本市)
    • Year and Date
      2016-01-19
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Secure and Traceable Framework for Data Circulation2016

    • Author(s)
      Kaitai LiangAtsuko Miyaji, Chunhua Su
    • Organizer
      Australasian Conference on Information Security and Privacy ACISP 2016
    • Place of Presentation
      Melbourne, VIC, Australia
    • Year and Date
      2016-07-04
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] :Security and experimental performance analysis of a matrix ORAM2016

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothi
    • Organizer
      2016 IEEE International Conference on Communications (ICC)
    • Place of Presentation
      Kuala Lumpur, Malaysia
    • Year and Date
      2016-05-22
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Analysis of Path ORAM toward Practical2015

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin.
    • Organizer
      UtilizationThe 18th International Conference on Network-Based Information Systems (NBiS 2015)
    • Place of Presentation
      Taipei (Taiwan)
    • Year and Date
      2015-09-02
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Improved Differential Characteristic Searching Methods2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh.
    • Organizer
      2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
    • Place of Presentation
      New York City (USA)
    • Year and Date
      2015-11-03
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Experimental Analysis of Path ORAM in Practical Implementation2015

    • Author(s)
      Karin Sumongkayothin, Atsuko Miyaji, Chunhua Su, Steve Gordon
    • Organizer
      情報セキュリティ研究会
    • Place of Presentation
      名古屋市中小企業振興会館 (愛知県名古屋)
    • Year and Date
      2015-07-02
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su
    • Organizer
      The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
    • Place of Presentation
      Helsinki (Finland)
    • Year and Date
      2015-08-20
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] Accurate Estimation of the Full Differential Distribution for General Feistel Structures2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
    • Place of Presentation
      Beijing (China)
    • Year and Date
      2015-11-01
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] A New Statistical Approach for Integral Attack2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao
    • Organizer
      The 9th International Conference on Network and System Security (NSS 2015)
    • Place of Presentation
      New York City( USA)
    • Year and Date
      2015-11-03
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • [Presentation] M-ORAM: A Matrix ORAM with logN bandwidth cost2015

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin
    • Organizer
      The 16th International Workshop on Information Security Applications (WISA 2015)
    • Place of Presentation
      Jeju (Korea)
    • Year and Date
      2015-08-25
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005
  • 1.  SAKURAI KOUICHI (60264066)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 8 results
  • 2.  穴田 啓晃 (40727202)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 3.  馮 尭楷 (60363389)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 4.  王 軍波 (40646882)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  DING Shuxue
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 6.  ZHOU LU
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 2 results

URL: 

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi