Enhancing ERP Systems’ Security: A Conceptual Model for Continuous User Authentication Using Multimodal Biometrics
Nadeen Hamza, Gamal Kassem and Nadeen Hamza
Balancing Cyber Security and Privacy: A Comparative Study of Data Protection Frameworks Across Jurisdictions
Yuki Kodaka, Hirokazu Hasegawa and Hiroki Takakura
Improving Quantum Circuits of Shor's Algorithm for Binary Elliptic Curves
Kaien Sho and Atsushi Takayasu
Connected to a Fake: Bidding-down 5G Confidentiality through Relaying
Jieon Oh, Chaeyeon You, Bonam Kim and Ilsun You
Hardening 5G UDR Authentication Data against Server Compromise Using SGX-Based Encrypted Storage
Adi Panca Saputra Iskandar, Changhyeon Woo and Ilsun You
A Trojan Detection Method for IoT Devices Using Binary Fuzzing and Behavioral Comparison with Benign Programs
Tsuyoshi Kaneshiro, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono and Toshihiro Yamauchi
A High-Speed Web Scanning Platform for Risk Assessment Backed by a Web Asset Database
Kosuke Watanabe and Taichi Saito
How Social Media Platforms Are Used for CTI: Needs, Practices, and Platform-Specific Differences
Shota Fujii, Goki Hanawa, Takayuki Sato and Nobutaka Kawaguchi
Isogeny-based threshold encryption using POKE proposed by Basso et al. at EUROCRYPT 2025
Toshiki Takatera, Hiroshi Onuki and Tsuyoshi Takagi
An SVP Solver of Enumeration-Sieve-Reduction Hybrid Lattice Algorithm
Kazutaka Toda and Yuntao Wang
Module-pqe: A Module-LWE based KEM Scheme
Takuya Moriwaki and Yuntao Wang
Efficient Identity-Based Inner Product Functional Encryption from LWE with Adaptive Security in Standard Model
Yuki Higuchi and Atsushi Takayasu
Efficiency Evaluation of CSIDH-Based Signatures with Edwards Curves and their Quadratic Twists
Yuki Iwata, Hiroki Minamide, Takeshi Nakai and Koutarou Suzuki
Efficient Algorithms for Solving Underdetermined MQ Problems
Hideki Asanuma, Kosuke Sakata and Tsuyoshi Takagi
Generalized Malicious Security for Private Set Intersection
Yugo Kasashima, Kota Sugimoto, Mitsugu Iwamoto and Yohei Watanabe
On the Public Verifiability of CCA-Secure Public-Key Encryption
Masaya Yoshimura, Kyoichi Asano, Keita Emura, Atsushi Takayasu and Yohei Watanabe
Pramod Kumar Maurya, Haradhan Ghosh and Satya Bagchi
Nadeen Hamza, Gamal Kassem and Nadeen Hamza
Yuki Kodaka, Hirokazu Hasegawa and Hiroki Takakura
Kaien Sho and Atsushi Takayasu
Jieon Oh, Chaeyeon You, Bonam Kim and Ilsun You
Adi Panca Saputra Iskandar, Changhyeon Woo and Ilsun You
Tsuyoshi Kaneshiro, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono and Toshihiro Yamauchi
Kosuke Watanabe and Taichi Saito
Shota Fujii, Goki Hanawa, Takayuki Sato and Nobutaka Kawaguchi
Toshiki Takatera, Hiroshi Onuki and Tsuyoshi Takagi
Kazutaka Toda and Yuntao Wang
Takuya Moriwaki and Yuntao Wang
Yuki Higuchi and Atsushi Takayasu
Yuki Iwata, Hiroki Minamide, Takeshi Nakai and Koutarou Suzuki
Hideki Asanuma, Kosuke Sakata and Tsuyoshi Takagi
Yugo Kasashima, Kota Sugimoto, Mitsugu Iwamoto and Yohei Watanabe
Masaya Yoshimura, Kyoichi Asano, Keita Emura, Atsushi Takayasu and Yohei Watanabe