Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoshiki Higashikado is active.

Publication


Featured researches published by Yoshiki Higashikado.


international conference on hybrid information technology | 2008

An Extension of the Sender Domain Authentication DKIM

Yoshiki Higashikado; Tetsuya Izu; Masahiko Takenaka; Takashi Yoshioka

The sender domain authentication protocol DKIM (domain keys identified mail) attracts much attention, in which the sender domain adds a signature header generated from headers and body of the original email, and the sender domain will be authenticated by a verification of the signature. However, a verification will be failed when headers are changed before it is reached to the receiver. This article proposes to combine DKIM and PIAT, the partial integrity assurance technology, so that the original sender domain authentication will be successful even when headers are changed by a mailing-list domain without generating a signature on the modified email.


Archive | 2004

Device, method and program for detecting unauthorized access

Masashi Mitomo; Yoshiki Higashikado; Fumie Takizawa; Satoru Torii; Osamu Koyano


Archive | 2005

Malicious access-detecting apparatus, malicious access-detecting method, malicious access-detecting program, and distributed denial-of-service attack-detecting apparatus

Masashi Mitomo; Yoshiki Higashikado; Fumie Takizawa; Satoru Torii; Osamu Koyano


Archive | 2006

Recording medium recording a network shutdown control program, and network shutdown device

Masahiro Komura; Kazumasa Omote; Yoshiki Higashikado; Masashi Mitomo; Bintatsu Noda; Satoru Torii


Archive | 2006

Recording medium recording worm detection parameter setting program, and worm detection parameter setting device

Masashi Mitomo; Yoshiki Higashikado; Masahiro Komura; Bintatsu Noda; Kazumasa Omote; Satoru Torii


Archive | 2007

Unauthorized access program monitoring method, unauthorized access program detecting apparatus, and unauthorized access program control apparatus

Yoshiki Higashikado; Satoru Torii


Archive | 2008

MALWARE DETECTING APPARATUS, MONITORING APPARATUS, MALWARE DETECTING PROGRAM, AND MALWARE DETECTING METHOD

Yoshiki Higashikado


Archive | 2006

Computer-readable recording medium having recorded worm determination program, worm determination method, and worm determination apparatus

Kazumasa Omote; Yoshiki Higashikado; Masahiro Komura; Bintatsu Noda; Masashi Mitomo; Satoru Torii


Archive | 2005

Illegal access preventing program, apparatus, and method

Yoshiki Higashikado; Takayoshi Kurita


Archive | 2006

Computer-readable recording medium storing worm detection program, worm detection method and worm detection device

Kazumasa Omote; Yoshiki Higashikado; Masahiro Komura; Bintatsu Noda; Masashi Mitomo; Satoru Torii

Collaboration


Dive into the Yoshiki Higashikado's collaboration.

Researchain Logo
Decentralizing Knowledge