Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yasuko Fukuzawa is active.

Publication


Featured researches published by Yasuko Fukuzawa.


international conference on human-computer interaction | 2015

Survey on Risk Management Based on Information Security Psychology

Yasuko Fukuzawa; Masaki Samejima; Hiroshi Ujita

In developing Cyber Physical Systems, such as smart grid and smart cities, risk management technologies play an important role to provide safe and secure services. In this paper, focusing on changes of recent threats represented by Social engineering, a survey shows that the information security psychology is valuable for the risk management of the Cyber Physical Systems. Through surveying, we outline the risk management framework for Cyber Physical Systems.


australasian conference on information security and privacy | 2014

Incrementally Executable Signcryptions

Dan Yamamoto; Hisayoshi Sato; Yasuko Fukuzawa

We present the concept of incrementally executable signcryptions, which is a generalization of traditional on-line/off-line signcryption and facilitates optimizing the sender’s off-line computation. With an incrementally executable signcryption scheme, the sender can activate signcryption process incrementally by its given sequential input: the sender’s key pair, a recipient’s public key, and a plaintext message to be sent to the recipient. Furthermore, we present an efficient generic construction of incrementally executable signcryption scheme. In our construction, the signing process can be done before being given the recipient’s public key as well as the message to be sent. This feature enables us to accelerate the subsequent processes. Moreover, our construction achieves the strongest security notions without relying on random oracles. In addition, it requires a weak assumption for the underlying signature scheme, i.e., the underlying signature scheme is sufficient to be unforgeable under generic chosen message attack. Furthermore, it supports the parallel un-signcryption feature, which allows receivers to perform two potentially expensive computations, i.e., the verification of off-line signature and the key-decapsulation, in parallel.


Archive | 2003

Heterogeneous computer system, heterogeneous input/output system and data back-up method for the systems

Yasuko Fukuzawa; Akira Yamamoto; Toshio Nakano


Archive | 1990

Secret information service system and method

Kazuo Takaragi; Ryoichi Sasaki; Tsutomu Nakamura; Minoru Koizumi; Yasuko Fukuzawa; Kenji Kataoka


Archive | 2000

Information processing equipment and IC card

Masaru Ohki; Yasuko Fukuzawa; Susumu Okuhara; Masahiro Kaminaga


Archive | 1998

Communications system/method from host having variable-length format to variable-length format first I/O subsystem or fixed-length format second I/O subsystem using table for subsystem determination

Yasuko Fukuzawa; Akira Yamamoto; Toshio Nakano


Archive | 2001

Database integration management method and apparatus and processing program, medium therefor

Chikashi Okamoto; Kazuo Takaragi; Yasuko Fukuzawa; Hideki Tokuyama; Mitsuo Usami


Archive | 1999

Processing apparatus, program, or system of secret information

Kunihiko Miyazaki; Kazuo Takaragi; Yasuko Fukuzawa


Archive | 2005

Common key sharing method and wireless communication terminal in ad hoc network

Yasuko Fukuzawa; Shuichi Ishida; Eriko Ando; Susumu Matsui


Archive | 2001

Identification code management method and management system

Chikashi Okamoto; Kazuo Takaragi; Yasuko Fukuzawa

Collaboration


Dive into the Yasuko Fukuzawa's collaboration.

Researchain Logo
Decentralizing Knowledge