Follow
Yuuki Takano
Yuuki Takano
Osaka University
Verified email at wide.ad.jp - Homepage
Title
Cited by
Cited by
Year
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking
Y Takano, S Ohta, T Takahashi, R Ando, T Inoue
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
222014
A measurement study of open resolvers and DNS server version
Y Takano, R Ando, T Takahashi, S Uda, T Inoue
Internet Conference 2013, 23--32, 2013
202013
Alfons: A mimetic network environment construction system
S Yasuda, R Miura, S Ohta, Y Takano, T Miyachi
Testbeds and Research Infrastructures for the Development of Networks and …, 2017
172017
NETorium: high-fidelity scalable wireless network emulator
K Akashi, T Inoue, S Yasuda, Y Takano, Y Shinoda
Proceedings of the 12th Asian Internet Engineering Conference, 25-32, 2016
152016
SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware
Y Takano, R Miura, S Yasuda, K Akashi, T Inoue
29th Large Installation System Administration Conference (LISA15), 25-36, 2015
132015
Multipath key exchange on p2p networks
Y Takano, N Isozaki, Y Shinoda
First International Conference on Availability, Reliability and Security …, 2006
122006
Evaluation of the Security of RC6 against the χ 2-Attack
A Miyaji, Y Takano
IEICE transactions on fundamentals of electronics, communications and …, 2007
82007
PRSafe: Primitive Recursive Function based Domain Specific Language using LLVM
SV Mahadevan, Y Takano, A Miyaji
2021 International Conference on Electronics, Information, and Communication …, 2021
42021
Unraveling large scale geographical distribution of vulnerable DNS servers using asynchronous I/O mechanism
R Ando, Y Takano, S Uda
Proceedings of The 2nd International Symposium on Grey-Hat Hacking, 116-129, 2013
42013
On the Success Probability of χ 2-attack on RC6
A Miyaji, Y Takano
Information Security and Privacy: 10th Australasian Conference, ACISP 2005 …, 2005
42005
Success Probability in χ 2-Attacks
T Matsunaka, A Miyaji, Y Takano
Applied Cryptography and Network Security: Second International Conference …, 2004
42004
A practical parallel computation in a scalable multiparty private set intersection
S Mishima, K Nakasho, Y Takano, A Miyaji
2021 Ninth International Symposium on Computing and Networking Workshops …, 2021
32021
Gintate: Scalable and extensible deep packet inspection system for encrypted network traffic: Session resumption in transport layer security communication considered harmful to dpi
R Miura, Y Takano, S Miwa, T Inoue
Proceedings of the 8th International Symposium on Information and …, 2017
32017
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme
T Takahashi, J Kannisto, J Harju, A Kanaoka, Y Takano, S Matsuo
2014 IEEE World Congress on Services, 121-128, 2014
32014
On the success probability of X2-attack on RC6
A MIAJI, Y Takano
Lecture notes in computer science, 61-74, 2005
32005
Faris: Fast and memory-efficient url filter by domain specific machine
Y Takano, R Miura
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-7, 2016
22016
The Ecology of DNS Open Resolvers
Y Takano, R Ando, S Uda, T Takahashi, T Inoue
IEICE Transaction B 97 (10), 873-889, 2014
2*2014
An analysis on the mismatch between supply and demand of vacant houses market in rural area.
T Takahashi, K Sano, Y Takano
22014
Design and implementation of session types-based tcp and unix domain socket
X Liu, Y Takano, A Miyaji
2022 7th International Conference on Information and Network Technologies …, 2022
12022
Byakko: automatic whitelist generation based on occurrence distribution of features of network traffic
N Kanaya, Y Tsuda, Y Takano, D Inoue
2019 IEEE International Conference on Big Data (Big Data), 3190-3199, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20