default search action
Kensaku Asahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c17]Masaya Yoshikawa, Yusuke Nozaki, Kensaku Asahi:
Vulnerability Evaluation Accelerator for Lightweight Ciphers. BigDataSecurity/HPSC/IDS 2016: 377-381 - [c16]Masaya Yoshikawa, Yusuke Nozaki, Kensaku Asahi:
Multiple Rounds Aware Power Analysis Attack for a Lightweight Cipher SIMECK. BigDataService 2016: 252-256 - 2015
- [j1]Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:
Secure in-vehicle Systems using Authentication. Int. J. Networked Distributed Comput. 3(3): 159-166 (2015) - [c15]Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:
Secure in-vehicle systems against Trojan attacks. ICIS 2015: 29-33 - [c14]Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa:
Statistical fault analysis for a lightweight block cipher TWINE. GCCE 2015: 477-478 - [c13]Hajime Adachi, Hidekazu Suzuki, Kensaku Asahi, Yukimasa Matsumoto, Akira Watanabe:
Estimation of bus traveling section using wireless sensor network. ICMU 2015: 120-125 - [c12]Tomoichi Takahashi, Kensaku Asahi, Hidekazu Suzuki, Mikiko Kawasumi, Yoshitaka Kameya:
A Cloud Education Environment to Support Self-Learning at Home - Analysis of Self-Learning Styles from Log Data. IIAI-AAI 2015: 437-440 - [c11]Yusuke Nozaki, Toshiya Asai, Kensaku Asahi, Masaya Yoshikawa:
Power analysis for clock fluctuation LSI. SNPD 2015: 167-170 - [c10]Masaya Yoshikawa, Yusuke Nozaki, Toshiya Asai, Kensaku Asahi:
Frequency Domain Aware Power Analysis Attack against Random Clock LSI for Secure Automotive Embedded Systems. VTC Fall 2015: 1-5 - 2014
- [c9]Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa:
PUF ID generation method for modeling attacks. GCCE 2014: 393-394 - [c8]Kohei Nohara, Kensaku Asahi, Masaya Yoshikawa:
Study of threat for automotive embedded system by Trojan virus. GCCE 2014: 405-406 - [c7]Yuta Mikamo, Kensaku Asahi, Hidekazu Suzuki, Akira Watanabe:
Proposal for an ad-hoc routing protocol considering traffic conditions and evaluation of UDP using a redundant route. ICMU 2014: 72-73 - [c6]Kazuma Tsuda, Hidekazu Suzuki, Kensaku Asahi, Akira Watanabe:
Proposal for a seamless connection method for remotely located Bluetooth devices. ICMU 2014: 78-79 - [c5]Yukihiro Kanamaru, Hidekazu Suzuki, Kensaku Asahi, Akira Watanabe:
Proposal for a wireless sensor network visualization system using location estimation technology. ICMU 2014: 111-116 - [c4]Tomohiro Ito, Kensaku Asahi, Hidekazu Suzuki, Akira Watanabe:
Researches and evaluation of Strong Busy Tone that improves the performance of ad-hoc networks. ICMU 2014: 182-187 - [c3]S. Kiryu, Kensaku Asahi, Masaya Yoshikawa:
Vulnerability evaluation of multiplexing PUF for SVM attacks. ICSEng 2014: 205-210 - [c2]Masaya Yoshikawa, Hikaru Goto, Kensaku Asahi:
Error value driven fault analysis attack. SNPD 2014: 1-4 - 2011
- [c1]Kensaku Asahi, Hideki Banno, Osami Yamamoto, Akira Ogawa, Keiichi Yamada:
Development and evaluation of a scheme for detecting multiple approaching vehicles through acoustic sensing. Intelligent Vehicles Symposium 2011: 119-123
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint