Rchr
J-GLOBAL ID:202401009906502880   Update date: Aug. 21, 2024

Takaragi Kazuo

タカラギ カズオ | Takaragi Kazuo
Affiliation and department:
Job title: Chief Executive Officer
Research theme for competitive and other funds  (1):
  • 2013 - 2016 Study on biometrics database management and evaluation technology of multiple entities
Papers (20):
  • Kazuo Takaragi, Takashi Kubota, Sven Wohlgemuth, Katsuyuki Umezawa, Hiroki Koyanagi. Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2023. 106. 3. 325-332
  • Katsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi. Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis. CSR. 2023. 212-218
  • Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi. Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method. ARES 2022: The 17th International Conference on Availability, Reliability and Security(ARES). 2022. 154-7
  • Sven Wohlgemuth, Katsuyuki Umezawa, Yusuke Mishina, Kazuo Takaragi. Competitive Compliance with Blockchain. IEEE International Conference on Pervasive Computing and Communications Workshops. 2019. 967-972
  • Sven Wohlgemuth, Kazuo Takaragi. Privacy-Enhancing Trust Infrastructure for Process Mining. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2018. 101-A. 1. 149-156
more...
MISC (5):
  • 小柳洋貴, 寳木和夫, 三科雄介, 梅澤克之, 梅澤克之. Threat analysis using the vulnerability database-Application of Attack Cases and Large-Scale Vulnerability DB Collation Methodology to Multiple Cases Using Topic Model Analysis-. 情報処理学会研究報告(Web). 2020. 2020. CSEC-90
  • 小柳洋貴, 寳木和夫, 三科雄介, 梅澤克之, 梅澤克之. Threat Analysis Method using Vulnerability Database-Attack case and large-scale vulnerability DB matching by topic model analysis using LDA classifier and cosine similarity-. 情報処理学会研究報告(Web). 2020. 2020. CSEC-88
  • 梅澤克之, 三科雄介, 寳木和夫, WOHLGEMUTH Sven. 脆弱性DBを用いた脅威分析手法へのトピックモデル解析ツールの活用. 電子情報通信学会大会講演論文集(CD-ROM). 2018. 2018
  • 寳木和夫. 「暗号技術のソフト資源」-情報セキュリティユビキタスで情報社会標準化,著作権保護等-. 資源テクノロジー. 2008. 59. 308
  • 寳木和夫, 西岡玄次. Hitachi’s Cryptographic Technologies Focusing on Public Key Cryptosystem HIME(R). 日立評論. 2006. 88. 7
Patents (1):
Books (2):
  • 情報セキュリティ : 暗号・認証・マネジメント
    近代科学社 2012 ISBN:9784764904170
  • ファイアウォール : インターネット関連技術について
    昭晃堂 1998 ISBN:478562180X
※ Researcher’s information displayed in J-GLOBAL is based on the information registered in researchmap. For details, see here.

Return to Previous Page