Rchr
J-GLOBAL ID:202401009906502880
Update date: Aug. 21, 2024
Takaragi Kazuo
タカラギ カズオ | Takaragi Kazuo
Affiliation and department:
Job title:
Chief Executive Officer
Research theme for competitive and other funds (1):
- 2013 - 2016 Study on biometrics database management and evaluation technology of multiple entities
Papers (20):
-
Kazuo Takaragi, Takashi Kubota, Sven Wohlgemuth, Katsuyuki Umezawa, Hiroki Koyanagi. Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2023. 106. 3. 325-332
-
Katsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi. Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis. CSR. 2023. 212-218
-
Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi. Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method. ARES 2022: The 17th International Conference on Availability, Reliability and Security(ARES). 2022. 154-7
-
Sven Wohlgemuth, Katsuyuki Umezawa, Yusuke Mishina, Kazuo Takaragi. Competitive Compliance with Blockchain. IEEE International Conference on Pervasive Computing and Communications Workshops. 2019. 967-972
-
Sven Wohlgemuth, Kazuo Takaragi. Privacy-Enhancing Trust Infrastructure for Process Mining. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2018. 101-A. 1. 149-156
more...
MISC (5):
-
小柳洋貴, 寳木和夫, 三科雄介, 梅澤克之, 梅澤克之. Threat analysis using the vulnerability database-Application of Attack Cases and Large-Scale Vulnerability DB Collation Methodology to Multiple Cases Using Topic Model Analysis-. 情報処理学会研究報告(Web). 2020. 2020. CSEC-90
-
小柳洋貴, 寳木和夫, 三科雄介, 梅澤克之, 梅澤克之. Threat Analysis Method using Vulnerability Database-Attack case and large-scale vulnerability DB matching by topic model analysis using LDA classifier and cosine similarity-. 情報処理学会研究報告(Web). 2020. 2020. CSEC-88
-
梅澤克之, 三科雄介, 寳木和夫, WOHLGEMUTH Sven. 脆弱性DBを用いた脅威分析手法へのトピックモデル解析ツールの活用. 電子情報通信学会大会講演論文集(CD-ROM). 2018. 2018
-
寳木和夫. 「暗号技術のソフト資源」-情報セキュリティユビキタスで情報社会標準化,著作権保護等-. 資源テクノロジー. 2008. 59. 308
-
寳木和夫, 西岡玄次. Hitachi’s Cryptographic Technologies Focusing on Public Key Cryptosystem HIME(R). 日立評論. 2006. 88. 7
Patents (1):
Books (2):
-
情報セキュリティ : 暗号・認証・マネジメント
近代科学社 2012 ISBN:9784764904170
-
ファイアウォール : インターネット関連技術について
昭晃堂 1998 ISBN:478562180X
Return to Previous Page