Publication

Refereed publications

Introduction of researcher

Name
Masakatsu NISHIGAKI
Doctoral degrees
1995, Ph.D, Shizuoka University
Affiliation
Graduate School of Science and Technology, Shizuoka University
Position
Professor
Address
3-5-1 Johoku, Naka, Hamamatsu, 4328011, Japan
Telephone / Fax
+81-53-478-1467 / +81-53-478-1499
E-mail
nisigaki[at]inf.shizuoka.ac.jp

Research fields

Humanics Security, User Authentication, Biometrics, Malware Detection, Applied Security, Media Security, and so on

Outline of current research

Humanics System Security: Suppose that a online shop is selling contents through the Internet. The seller can protect the data from an eavesdropper, by encrypting the contents. However, if a purchaser, who has the decrypt key, is malicious, the purchaser can make copies of the data and distribute them illegally. This kind of problem can apply almost everywhere, not only to copyright protection. In many cases, we know that a single security technique alone is not perfect. If we want to make a “system” perfect, we have to use many techniques simultaneously, just like the right technique in the right place. In other words, system security is achieved by managing a variety of security techniques properly.
In addition to this, I believe that we have to give more attention to human being. Because, all the system is for people and the system is operated by people. Moreover, the criminal who attacks a system is (a small number of) people. So, the system security without consideration of human characteristics is pointless. The security has to be optimized through Technical, Management and Human Characteristics.
That is, Security is Humanics. And that is why I am studying how to enhance system security by making use of human’s psychological, cognitive, and social characteristics.

Entertainment Information Security: It is very important to realize both security and usability. As everybody knows, however, security and usability is trade-off. The usability of a system is usually getting worse as user needs more tightened security to the system, and vice versa. Therefore, we need to change our way of thinking.
My way of thinking is “to give users what they want”. For instance, if you don’t like to get up early, but you will do get up early on the morning of fishing. Thus people will do some troublesome task if he/she loves to do the task. So, if we could make users love to punch passwords, the users would not complain about password authentication. 🙂
I believe that Entertainment can be one of good means that can make people love to security techniques. And that is why I am studying how to overcome the trade-off between security and usability by introducing of entertainment into information security.

Education

  • Mar., 1990: B.E., Shizuoka University
  • Mar., 1992; M.E., Shizuoka University
  • Mar., 1995; Ph.D, Shizuoka University

Career

  • Apr., 1995 – Mar., 1996: Research Fellow of the Japan Society for the Promotion of Science (PD)
  • Apr., 1996 – Mar., 1999: Research Associate, Faculty of Informatics, Shizuoka University
  • Apr., 1999 – Sep., 2001: Assistant Professor, Faculty of Informatics, Shizuoka University
  • Oct., 2001 – Mar., 2006: Associate Professor, Faculty of Informatics, Shizuoka University
  • Apr., 2006 – Sep., 2010: Associate Professor, Graduate School of Science and Technology, Shizuoka University
  • Oct., 2010 – Current: Professor, Graduate School of Science and Technology, Shizuoka University

Awards

  • Concept Paper Award: Shiori Arimura, Shinya Kobayashi, Junya Kani, Akira Shiba, Masakatsu Nishigaki: i/k-Contact: a context-aware user authentication using physical social trust, IPSJ Computer Security Symposium 2013 (2013.10). (in Japanese)
  • Best Conversant Award: IPSJ Multimedia, Distributed, Cooperative and Mobile Symposium 2010 (2010.7).
  • Best Demonstration Paper Award: Masaki Fujikawa, Masakatsu Nishigaki, Masasumi Yoshizawa, Kenji Furusawa, Yasuo Kato: Proposal of uniform dressing/undressing detection system using intra-body communication technology: To prevent a crime abusing uniforms, IFIP WG 11.11 International Conference on Trust Management 2010 (2010.6).
  • Best Paper Award: Takumi Yamamoto, J.D.Tygar, Masakatsu Nishigaki: CAPTCHA Using Strangeness in Machine Translation, IEEE International Conference on Advanced Information Networking and Applications 2010 (2010.4).
  • Achievement in society activity: Information Processing Society of Japan (2010.3).
  • Best Paper Award: Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki: Traceback against Bot-infected PCs and C&C Servers, IPSJ Multimedia, Distributed, Cooperative and Mobile Symposium 2008 (2008.7). (in Japanese)

Academic activities

Academic memberships and boards

  • Member, IEEE (The Institute of Electrical and Electronics Engineers)
  • Member, IPSJ (The Information Processing Society of Japan)
  • Member, IEICE (The Institute of Electronics, Information and Communication Engineers)
  • Member, JSSM (Japan Society of Security Management)
  • Advisor, IPSJ Special Interest Group on Computer Security (2015.4-)
  • Chief Examiner, IPSJ Special Interest Group on Computer Security (2013.4-2015.3)
  • Secretary member, IPSJ Special Interest Group on Computer Security (2008.4-2013.3)
  • Secretary member, IPSJ Special Interest Group on Security Psychology and Trust (2008.4-2015.3)
  • Chairman, IEICE Technical Committee on Biometrics (2015.4-)
  • Vice-chairman, IEICE Technical Committee on Biometrics (2014.4-2015.3)
  • Vice-chairman, IEICE Technical Committee on Biometric System Security (2008.4-2014.3)
  • Secretary member, IEICE Technical Committee on Biometric System Security(2006.4-2008.3)
  • Director, JSSM (Japan Society of Security Management) (2012.4-)

Editorial positions and boards

  • IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Japanese Edition), Special issue on Biometrics , Editor-in-Chief (2014.1-2014.12)
  • IPSJ Journal, Special issue of “Computer Security Technology coexisting with human”, Guest editor (2010.10-2011.9)
  • IPSJ seminar 2007 “Information Security 2.0”, No.5 “Biometrics”, Coordinator (2007.11)
  • International Journal of Information Security, Springer, Editor (2007.4-)
  • Information Technology Research and Standardization Center, Survey Research on Biometric Performance Testing and Reporting, WG2 editor (2007.4-2008.3)
  • IPSJ Journal (Journal of Information Processing), Associate editor (2001.4-2005.3)

General chair and Program chair

  • 9th International Workshop on Security (IWSEC 2014), General co-chair
  • 8th International Workshop on Security (IWSEC 2013), General co-chair
  • 3rd IEICE Symposium on Biometrics, Recognition and Authentication (SBRA 2013) (Domestic symposium in Japan), General chair
  • The 6th International Workshop on Security (IWSEC 2011), Program co-chair
  • The 6th Workshop on Secure Network Protocols 2010 (NPSec 2010), Program co-chair
  • The 4th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010), Program co-chair
  • IPSJ Computer Security Symposium 2009 (CSS 2009) (Domestic symposium in Japan), Program co-chair

Invited session chair

  • International Conference on Information Technology & Applications 2002,Track chair

Organizing committee member

  • The 2nd International Workshop on Security (IWSEC 2007)
  • The 1st International Workshop on Security (IWSEC 2006)
  • The 20th IFIP International Information Security Conference (SEC 2005)

Program committee member

  • The 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011)
  • The 26th IEEE International Conference on Advanced Information Networking and Applications (AINA 2011)
  • The 5th International Workshop on Security (IWSEC 2010)
  • The 13th International Conference on Network-Based Information Systems (NBiS 2010)
  • International Workshop on Advances in Information Security 2010 (WAIS 2010)
  • International Workshop on Trustworthy Computing 2010
  • The 4th International Workshop on Security (IWSEC 2009)
  • The 12th International Conference on Network-Based Information Systems (NBiS 2009)
  • International Workshop on Advances in Information Security 2009 (WAIS 2009)
  • The 3rd International Workshop on Security (IWSEC 2008)
  • The 23rd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008)
  • IFIP International Conference on Formal Techniques for Networked and Distributed Systems 2008
  • IFIP Conference on e-Business, e-Services, and e-Society 2008
  • International Workshop on Advances in Information Security 2008 (WAIS 2008)
  • The 2nd International Workshop on Security (IWSEC 2007)
  • The 1st International Workshop on Security (IWSEC 2006)
  • The 20th IFIP International Information Security Conference (SEC 2005)

Refereed publications, published books

Ph.D. thesis

  1. LSI Circuit Simulation Techniques Based on Dynamic and hierarchical partitioning, Graduate School of Electronic Science and Technology, Shizuoka University (1995.3).

Refereed journal papers

  1. Fumiyuki Takahashi, Masakatsu Nishigaki: Technology Intelligence-based New Product Development -Fostering Technological Innovation with Competitive Advantage-, Innovation and Supply Chain Management, vol.7, no.4, pp.150-156 (2013.12).
  2. Junya Kani, Tokuichiro Suzuki, Akihiro Uehara, Takumi Yamamoto, Masakatsu Nishigaki: Four-panel cartoon CAPTCHA, Information Processing Society of Japan Journal, vol.54, no.9, pp.2232-2243 (2013.9). (in Japanese)
  3. Masakatsu Nishigaki, Eisei Honbu, Yuta Yoneyama, Kenta Takahashi: A Distributed Software Protection Using Direct Communication on Portable Game Machines, Information Processing Society of Japan Journal, vol.54, no.9, pp.2188-2196 (2013.9). (in Japanese)
  4. Hideaki Kawabata, Takamasa Isohara, Keisuike Takemori, Ayumu Kubota, Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki: Fine-grained Access Control Framework in Android, Information Processing Society of Japan Journal, vol.54, no.8, pp.2090-2102 (2013.8). (in Japanese)
  5. Fumiyuki Takahashi, Teruhisa Ichikawa, Hiroshi Mineno, Masakatsu Nishigaki, Yoshio Sugasawa: Intelligence Organization and Action in the Technology Development Activities of Japanese Enterprises, Intelligence Management, vol.4, no.1, pp.27-45 (2013.8). (in Japanese)
  6. Osamu Yuuki, Kunitsugu Yamada, Tadanori Mizuno, Hiroshi Mineno, Masakatsu Nishigaki: Pocket Agent Devices for Personal Wireless Communications, International Journal of Informatics Society, vol.5, no.1, pp.29-48 (2013.4).
  7. Masaki Fujikawa and Masakatsu Nishigaki: Proposal of the Detection System for Safety Equipment-Wearing Using IBC, International Journal of Information and Electronics Engineering, vol.3, no.5, pp.476-480 (2013.4).
  8. Hiroshi Kuriyama, Naoki Yusa, Hisashi Sawada, Tadanori Mizuno, Hiroshi Mineno, Masakatsu Nishigaki: Researches on Mutually Complementary Network for PLC/RF Mixed Environment, vol.J96-D, no.3, pp.577-586 (2013.3). (in Japanese)
  9. Masakatsu Nishigaki, Yoshimasa Watanabe, Masahiro Oda, Yuta Yoneyama, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi: Template-protecting Biometric Authentication Using Oblivious Evaluation of Feature Value Function with Fuzzy Polynomial, Information Processing Society of Japan Journal, vol.53, no.9, pp.2254-2266 (2012.9). (in Japanese)
  10. Masakatsu Nishigaki, Fumie Abe, Takumi Yamamoto, Masaki Fujikawa, Yasuo Kato: A Study on Data Input to Electronic Triage Tag: Use of Intra-body Communication and Voice Input/output, Information Processing Society of Japan Journal, vol.53, no.9, pp.2182-2193 (2012.9). (in Japanese)
  11. Hiromu Hijikata, Fumihiko Magata, Masakatsu Nishigaki, Yoshimi Teshigawara, Ryoichi Sasaki: Application of Multiple Risk Communicator for Consensus of Personal Information Leakage Measures Considering Digital Forensics, Security Management, vol.26, no.1, pp.3-14 (2012.5). (in Japanese)
  12. Osamu Yuuki, Kunihiro Yamada, Tadanori Mizuno, Hiroshi Mineno, Masakatsu Nishigaki:Wireless Telecommunication by Using Pocket Agent Device in Blind Zones of Electric Wave, IPSJ Transaction on Consumer Device & System, vol.2, no.1, pp.1-9 (2012.3). (in Japanese)
  13. Fumiyuki Takahashi, Teruhisa Ichikawa, Hiroshi Mineno, Masakatsu Nishigaki, Yoshio Sugasawa:A study of Technical Information Sources and Proposal on effective usage of Sources for Enterprise, Intelligence Management, vol.3, no.1, pp.3-13 (2011.9). (in Japanese)
  14. Takehisa Kato, Yumiko Nakazawa, Takeo Isarida, Fumiyasu Yamada, Takumi Yamamoto, Masakatsu Nishigaki: A Study on Correlation between User Disposition and Security Consciousness with Respect to User Authentication, Information Processing Society of Japan Journal, vol.52, no.9, pp.2537-2548 (2011.9). (in Japanese)
  15. Masaki Fujikawa, Hiroyuki Aoki, Masakatsu Nishigaki: Study of a Safety System with Garment-wearing Detecting Mechanism Using Intra-body Communication Technology, Information Processing Society of Japan Journal, vol.52, no.9, pp.2586-2595 (2011.9). (in Japanese)
  16. Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake: Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists, Information Processing Society of Japan Journal, vol.52, no.4, pp.1706-1716 (2011.4).
  17. Hirosato Tsuji, Takeshi Yoneda, Tadanori Mizuno, Masakatsu Nishigaki: Renewal of Pre-shared Key for Secure Communication of Multiple Mobile Terminals through Broadcast Data Distribution Systems, International Journal of Informatics Society, vol.2, no.3, pp.100-107 (2010.12).
  18. Masakatsu Nishigaki, Yuma Usui, Takumi Yamamoto, Fumihiko Magata, Yoshimi Teshigawara, Ryoichi Sasaki: A Case Study of a Security Measure Selection Scheme with Consideration of Potential Lawsuit, Information Processing Society of Japan Journal, vol.52, no.3, pp.1173-1184 (2011.3). (in Japanese)
  19. Takahiro Sakai, Keisuke Takemori, Ruo Ando, Masakatsu Nishigaki: A Bot Detection Based on the Repetitiveness of Intrusion, Information Processing Society of Japan Journal, Vol.51, No.9, pp.1591-1599(2010.9). (in Japanese)
  20. Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki: Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication, Soft Computing – A Fusion of Foundations, Methodologies and Applications, Vol.14, No.5, pp.529-536, Springer-Verlag (2010.3).
  21. Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki: An improvement of user authentication using schema of visual memory: exploitation of “schema of story”, Security Management, vol.23,no.3,pp.41-47 (2009.12). (in Japanese)
  22. Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki: An Enhanced User Authentication System Using Schema of Visual Memory Achieved by Unclear Image, Security Management, vol.23,no.3,pp.17-29 (2009.12). (in Japanese)
  23. Masanori Hara, Takumi Nagaya, Takumi Yamamoto, Akira Yamada, Masakatsu Nishigaki: A Study of Relationship between Spam Blogs and Affiliate Marketing, Information Processing Society of Japan Journal, vol.50,no.12,pp.3206-3210 (2009.12). (in Japanese)
  24. Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama Masakatsu Nishigaki: Host-based Traceback against Bot and C&C Server, Information Processing Society of Japan Journal, vol.50,no.9,pp.2360-2370 (2009.9). (in Japanese)
  25. Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki: IP Traceback Using DNS Logs against Bots, Information Processing Society of Japan Journal,vol.50,no.9,pp.2163-2172 (2009.9).
  26. Hirosato Tsuji, Takeshi Yoneda, Tadanori Mizuno, Masakatsu Nishigaki: Realization of Secure Real-time Communication for Worldwide Mobile Environment by Frequent Key Renewal Method through Broadcast Data Distribution Systems, Information Processing Society of Japan Journal, vol.50,no.9,pp.2103-2117 (2009.9). (in Japanese)
  27. Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki: Proposal of a Cue & Response Based User Authentication Using Unclear Image, Information Processing Society of Japan Journal, vol.50,no.9,pp.2062-2076 (2009.9). (in Japanese)
  28. Masaki Fujikawa, Masakatsu Nishigaki, Masasumi Yoshizawa, Kenji Furusawa, Shigeo Tsujii: Development of the detection system for uniform dressing/undressing using intra-body communication technology: to prevent a crime abusing office uniforms, Security Management, vol.23,No.1,pp.39-47 (2009.4). (in Japanese)
  29. Masakatsu Nishigaki, Takumi Nagaya, Masanori Hara: An Improvement of Content-based Phishing Detection Using Web of Trust, Information Processing Society of Japan Journal, vol.49,no.9,pp.3104-3111 (2008.9). (in Japanese)
  30. Masakatsu Nishigaki, Daisuke Arai: A user authentication based on human reflexes using blind spot and saccade response, International Journal of Biometrics, Vol.1, No.2, pp.173-190 (2008.8).
  31. Masakatsu Nishigaki, Takashi Miyaki, Kazuya Shioda, Hideki Yoshida, Masaharu Ozawa: Character Display Scheme against Illegal Photocopy by Camera Using Rapid Images Succession, Information Processing Society of Japan Journal, vol.49,no.1,pp.414-426 (2008.1). (in Japanese)
  32. Masaki Fujikawa, Hiroyuki Aoki, Masakatsu Nishigaki, Masasumi Yoshizawa, Shigeo Fujii: Proposal for an Office Security System that is capable of Detecting Unauthorized Persons Wearing Office Uniforms : To protect offices from sly criminals, Security Management, vol.21,No.2,pp.41-51 (2007.09). (in Japanese)
  33. Takaaki Matsumoto, Koichi Suzuki, Tomohiro Takami, Tatsuya Baba, Shusuke Maeda, Tadanori Mizuno, Masakatsu Nishigaki: An Unknown-worm Detection Based on Capturing Self-initiated READ Behavior, Information Processing Society of Japan Journal, vol.48,no.9,pp.3174-3182 (2007.9). (in Japanese)
  34. Takaaki Matsumoto, Tomohiro Takami, Koichi Suzuki, Tatsuya Baba, Shusuke Maeda, Tadanori Mizuno, Masakatsu Nishigaki: A Keylogger Detection Using Dynamic API Inspection, Information Processing Society of Japan Journal, vol.48,no.9,pp.3137-3147 (2007.9). (in Japanese)
  35. Masakatsu Nishigaki, Yuji Ozawa: A User Authentication Using Blind Spot and Papillary Light Reflex, Information Processing Society of Japan Journal, vol.48,no.9,pp.3039-3050 (2007.9). (in Japanese)
  36. Yoichi Shibata, Takashi Miyaki, Tadanori Mizuno, Masakatsu Nishigaki: Key Generation from Multiple Biometric Features Using Statistical A/D Conversion with Error Correction, Information Processing Society of Japan Journal, vol.48,no.9,pp.3027-3038 (2007.9). (in Japanese)
  37. Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki: ZeroBio – Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol, Information Processing Society of Japan Journal, vol.48,no.7,pp.2307-2318 (2007.7). (in Japanese)
  38. Masakatsu Nishigaki, Makoto Koike: A User Authentication Based on Personal History -A User Authentication System Using E-mail History-, Journal of Systemics, Cybernetics and Informatics, vol.5, no.2, pp.18-23 (2007.5).
  39. Masakatsu Nishigaki, Daisuke Arai: A User Authentication Using Human Reflex, Information Processing Society of Japan Journal, vol.47,no.8,pp.2582-2592 (2006.8). (in Japanese)
  40. Takaaki Matsumoto, Tomoyuki Sugimura, Koichi Suzuki, Shusuke Maeda, Tatsuya Baba, Tadanori Mizuno, Masakatsu Nishigaki: An Unknown-worm Spread Prevention Based on the Correlation between the Transmission and Reception Data, Information Processing Society of Japan Journal, vol.47,no.6,pp.1941-1953 (2006.6). (in Japanese)
  41. Masakatsu Nishigaki, Makoto Koike: A User Authentication Based On Personal History : A User Authentication System Using E-mail History, Information Processing Society of Japan Journal, vol.47,no.3,pp.945-956 (2006.3). (in Japanese)
  42. Kazuya Shioda, Hideki Yoshida, Masakazu Soga, Akio Takubo, Keikichi Hayashibe, Itsukazu Nakamura, Tadanori Mizuno, Masakatsu Nishigaki: Digital Image Content Protection Using Human Visual Performance Characteristics, Information Processing Society of Japan Journal, vol.46,no.8,pp.2078-2097 (2005.8). (in Japanese)
  43. Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Masakatsu Nishigaki: A User Authentication System Using Schema of Visual Memory, Information Processing Society of Japan Journal, vol.46,no.8,pp.1997-2013 (2005.8). (in Japanese)
  44. Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Itsukazu Nakamura, Masakazu Soga, Masakatsu Nishigaki: Mechanism-based PKI : A Real-time Key Generation from Fingerprints, Information Processing Society of Japan Journal, Vol.45,No.8,pp.1833-1844 (2004.8). (in Japanese)
  45. Itsukazu Nakamura, Toshiyuki Hyodo, Masakazu Soga, Tadanori Mizuno, Masakatsu Nishigaki: A Practical Approach for Security Measure Selection Problem and Its Availability, Information Processing Society of Japan Journal, Vol.45,No.8,pp.2022-2033 (2004.8). (in Japanese)
  46. Masakatsu Nishigaki, Masato Nakano, Masakazu Soga: A Fault-Tolerant Combinational Circuit with Fault Diagnosis Capability – To Mask and Detect the Loss of Any One Connection between Gate Circuits, System and Computers in Japan, Vol.34, No.11, pp.67-80 (2003.10).
  47. Atsushi Harada, Masakatsu Nishigaki, Masakazu Soga, Akio Takubo, Itsukazu Nakamura: A Write-once Data Management System, Information Processing Society of Japan Journal, Vol.44,No.8,pp.2093-2105 (2003.8). (in Japanese)
  48. Toshimitsu Inomata, Susumu Itagaki, Masakazu Soga, Masakatsu Nishigaki: A Method of Tamper-proof Using Digital Signature and Patrol, and Its Application to the WWW, Information Processing Society of Japan Journal, Vol.44,No.8,pp.2072-2084 (2003.8). (in Japanese)
  49. Tetsuya Matsushita, Masakatsu Nishigaki, Masakazu Soga, Akio Takubo, Itsukazu Nakamura: A Bounty Hunting-based Copyright Protection System for Website Content, Information Processing Society of Japan Journal, Vol.44,No.8,pp.1970-1982 (2003.8). (in Japanese)
  50. Masakatsu Nishigaki, Naoki Nakamura, Masakazu Soga, Akio Takubo, Itsukazu Nakamura: Minimum Online Applications for Copy Protection of Binary Programs, Information Processing Society of Japan Journal, Vol.44,No.3,pp.953-969 (2003.3). (in Japanese)
  51. Masakatsu Nishigaki, Takuya Kozawa, Masakazu Soga, Akio Takubo: A Copy Protection of Image Data by Dynamic Decryption, Information Processing Society of Japan Journal, Vol.42,No.8,pp.1983-1991 (2001.8). (in Japanese)
  52. Masakatsu Nishigaki, Makoto Nakano, Masakazu Soga,: A Fault Tolerant Combinational Circuit with Fault Diagnosis Capability -To Mask and Detect the Loss of Any One Connection between Gate Circuits-, Trans. The Institute of Electronics, Information and Communication Engineers, D-I,Vol.J84-D-I, No.7, pp.1045-1058 (2001.7). (in Japanese)
  53. Masakatsu Nishigaki, Masakazu Soga, Tohru Ikuma, Akio Takubo: Copy Protection of Binary Programs by Data Scratching and Dynamic Restoration, Trans. The Institute of Electronics, Information and Communication Engineers, Vol.J83-A, No.11, pp.1288-1299 (2000.11). (in Japanese)
  54. Masakatsu Nishigaki, Teruyasu Tsuzuki, Masakazu Soga: A Learning Algorithm Considering the Tolerances of the Worst-Case Fault of Neural Networks, Trans. The Institute of Electronics, Information and Communication Engineers, D-I, vol.J-83-D-I, No.1, pp.203-214 (2000.1). (in Japanese)
  55. Masaki Ishida, Koichi Hayashi, Masakatsu Nishigaki, Hideki Asai: Relaxation-Based Algorithms for Bipolar Circuit Analysis, Trans. The Institute of Electronics, Information and Communication Engineers, E77-A, 6, pp.1023-1027 (1994.6).
  56. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Mixed Mode Circuit Simulation Using Dynamic Network Separation and Selective Trace, Trans. The Institute of Electronics, Information and Communication Engineers, E77-A, 3, pp.454-460 (1994.3).
  57. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Mixed Mode Circuit Simulation Using Dynamic Partitioning, Trans. The Institute of Electronics, Information and Communication Engineers, E76-A, 3, pp.292-298 (1993.3).
  58. Koichi Hayashi, Mitsuru Komatsu, Masakatsu Nishigaki, Hideki Asai: Bipolar Transistor Circuit Analysis by Waveform Relaxation Method with Consideration of the Operation Point, Trans. The Institute of Electronics, Information and Communication Engineers, E75-A, 7, pp.914-916 (1992.7).
  59. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Hierarchical Decomposition and Latency for Circuit Simulation by Direct Method, Trans. The Institute of Electronics, Information and Communication Engineers, E75-A, 3, pp.347-351 (1992.3).
  60. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Availability of Hierarchical Node Tearing for MOS Circuits, Trans. The Institute of Electronics, Information and Communication Engineers, vol. J74-A,No.8. pp. 1176-1179 (1991.8). (in Japanese)
  61. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Hierarchical Decomposition for Circuit Simulation by Direct Method, Trans. The Institute of Electronics, Information and Communication Engineers, E73, 12, pp.1948-1956 (1990.12).

Refereed conference papers

  1. Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Akira Shiba, Masakatsu Nishigaki: i/k-Contact: a context-aware user authentication using physical social trust, Proceedings of 2014 International Conference on Privacy, Security and Trust, pp.407-413 (2014.7).
  2. Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki: An Image-based CAPTCHA Using Sophisticated Mental Rotation, Proceedings of 2014 International Conference on Human-Computer Interaction (Springer LNCS 8533), pp.57-68 (2014.6).
  3. Noriyuki Komine, Masakatsu Nishigaki, Kunihiro Yamada, Tadanori Mizuno: A Design Method of Optimal H2 Integral Servo Problem, Proceedings of 2013 International Workshop on Informatics, pp.143-150 (2013.9).
  4. Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki: A proposal for the Deterrence of Information Leakage using Anti-virus Software, Proceedings of 2013 International Conference on Network-Based Information Systems, PP.90-96 (2013.9).
  5. Junya Kani, Masakatsu Nishigaki: Gamified CAPTCHA, Proceedings of 2013 International Conference on Human-Computer Interaction (Springer LNCS 8030), pp.39-48 (2013.7).
  6. Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki: SanAdBox: Sandboxing Third Party Advertising Libraries in A Mobile Application, Proceedings of 2013 IEEE International Conference on Communications (Communication and Information Systems Security Symposium), pp.2150-2154 (2013.6).
  7. Noriyuki Komine, Masakatsu Nishigaki, Tadanori Mizuno, Kunihiro Yamada: A Design of Derivative State Constrained H2 Integral Servo Controller for Suppressing under Damping of Oscillatory System, Proceedings of 2012 Asia Simulation Conference, pp.151-162 (2012.10).
  8. Fumiyuki Takahashi, Teruhisa Ichikawa, Hiroshi Mineno, Masakatsu Nishigaki: Intelligence management for decision support in new product development and technological innovation, Proceedings of 2012 Asian Conference of Management Science and Applications, pp.244-250 (2012.9).
  9. Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Masakatsu Nishigaki: A proposal to realize the provision of secure Android applications -ADMS: an application development and management system-, Proceedings of 2012 International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.677-682 (2012.7).
  10. Fumiyuki Takahashi, Teruhisa Ichikawa, Hiroshi Mineno and Masakatsu Nishigaki: Collaboration over competition: A study on business strategy from an environmental management viewpoint, Proceedings of 2011 Asian Conference of Management Science & Applications, pp.75-81 (2011.12).
  11. Takehisa Kato, Kohei Nasaka, Takumi Yamamoto, Masakatsu Nishigaki: A Study on a Practical Measure against Billing Frauds, Proceedings of International Conference on Network-Based Information Systems 2011, pp.667-672 (2011.9).
  12. Kohei Nasaka, Tomohiro Takami, Takumi Yamamoto, Masakatsu Nishigaki: A Keystroke Logger Detection Using Keyboard-Input-Related API Monitoring, Proceedings of International Conference on Network-Based Information Systems 2011, pp.651-656 (2011.9).
  13. Masaki Fujikawa, Masakatsu Nishigaki: A Study of Prevention for Social Engineering Attacks using Real/Fake Organization’s Uniforms: Application of Radio and Intra-Body Communication Technologies, Proceedings of 2011 International Conference on Availability, Reliability and Security, pp.597-602 (2011.8).
  14. Takumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki: A Proposal of Four-panel cartoon CAPTCHA, Proceedings of IEEE International Conference on Advanced Information Networking and Applications 2011, pp.159-166 (2011.3).
  15. Masaki Fujikawa, Masakatsu Nishigaki: Proposal of the Detection System for Safety Equipment-Wearing using IBC – Application of IBC (Intra-Body Communication) Technology, Proceedings of 2010 International Conference on Computer and Electrical Engineering, vol.3, pp.154-158 (2010.11).
  16. Takumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki: A Proposal of Four-panel cartoon CAPTCHA: The Concept, Proceedings of 2010 International Workshop on Trustworthy Computing, pp.575-577 (2010.9).
  17. Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara, Ryoichi Sasaki, Masakatsu Nishigaki: A Security Measure Selection Scheme with Consideration of Potential Lawsuits, Proceedings of 2010 International Conference on Security & Management, CD-ROM (2010.7)
  18. Masaki Fujikawa, Kenji Furusawa, Hiroyuki Aoki, Masakatsu Nishigaki, Masasumi Yoshizawa: Study of Garment-Wearing Detecting System using Intra-Body Communication Technology, Proceedings of 2010 International Conference on Wireless Networks, CD-ROM (2010.7)
  19. Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki: A User Authentication System Using Schema of Visual Memory, Poster and Demonstration Paper Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management, pp.5-8 (2010.6)
  20. Masaki Fujikawa, Masakatsu Nishigaki, Masasumi Yoshizawa, Kenji Furusawa, Yasuo Kato: Proposal of uniform dressing/undressing detection system using intra-body communication technology: To prevent a crime abusing uniforms, Poster and Demonstration Paper Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management, pp. 37-40 (2010.6)
  21. Takumi Yamamoto, J.D.Tygar, Masakatsu Nishigaki: CAPTCHA Using Strangeness in Machine Translation, Proceedings of IEEE International Conference on Advanced Information Networking and Applications 2010, pp.430-437 (2010.4)
  22. Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki: A proposal of efficient remote biometric authentication protocol, Proceedings of International Workshop on Security 2009, LNCS 5824, Springer, pp.212-227 (2009.10)
  23. Masaki Fujikawa, Masakatsu Nishigaki, Masasumi Yoshizawa, Kenji Furusawa, Shigeo Tsujii: Design and evaluation of the detection system for uniform dressing/undressing using human body-based data transmission technology: To prevent a crime abusing office uniforms, Proceedings of International Conference on Safety and Security Engineering 2009, pp.207-216 (2009.7)
  24. Hirosato Tsuji, Takeshi Yoneda, Tadanori Mizuno and Masakatsu Nishigaki: Renewal of pre-shared key for secure communication of multiple mobile terminals through broadcast data distribution systems, Proceedings of 2009 International Workshop on Informatics, CD-ROM (2009.9).
  25. Takumi Yamamoto, Yuko Kojima, Masakatsu Nishigaki: A shoulder-surfing-resistant image-based authentication system with temporal indirect image selection, Proceedings of 2009 International Conference on Security and Management, pp.188-194 (2009.7).
  26. Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki: Advantages of user authentication using unclear images: automatic generation of decoy images, Proceedings of IEEE International Conference on Advanced Information Networking and Applications 2009, pp.668-674 (2009.5).
  27. Masakatsu Nishigaki, Takumi Yamamoto: Making Use of Human Visual Capability to Improve Information Security, Proceedings of International Workshop on Advances in Information Security 2009, CD-ROM, pp.990-994 (2009.3).
  28. Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki: Host-based traceback; Tracking bot and C&C server, Proceedings of International Conference on Ubiquitous Information Management and Communication 2009, pp.400-405 (2009.1).
  29. Keisuke Takemori, Masakatsu Nishigaki, Tomohiro Takami, Yutaka Miyake: Detection of Bot Infected PCs Using Destination-based IP and Domain White lists during a Non-operating Term, Proceedings of Global Telecommunications Conference 2008, pp.1-6 (2008.12).
  30. Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki: Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication, Proceedings of 5th International Conference on 2008 Modeling Decisions for Artificial Intelligence, LNAI 5285, Springer-Verlag, pp.3-14 (2008.10).
  31. Keisuke Takemori, Masahiko fujinaga, Toshiya Sayama, Masakatsu Nishigaki: IP Traceback Using DNS Logs against Bots, Proceedings of IEEE International Symposium on Computer Science and Its Applications 2008, pp.84-89 (2008.10).
  32. Masakatsu Nishigaki, Yoich Shibata: Physical Access Control with Biometric Keys, Proceedings of 2008 International Conference on Security and Management, pp.213-219 (2008.5).
  33. Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki: An Improvement of User Authentication Using Schema of Visual Memory: Exploitation of “Schema of Story”, IEEE International Conference on Advanced Information Networking and Applications 2008, CD-ROM, pp.40-47 (2008.3).
  34. Masakatsu Nishigaki, Das Anjan Kumar, Hirokazu Maruoka, Thoshifumi Sugiura: Real time detection of criminal activities by monitoring suspicious employee behavior, Proceedings of International Conference on Digital Forensics 2008 (Short Papers), pp.83-94 (2008.1).
  35. Masaki Fujikawa, Hiroyuki Aoki, Masakatsu Nishigaki, Masasumi Yoshizawa, Shigeo Tsujii: Design of Office Security System that is capable of Detecting Unauthorized Persons Wearing Office Uniforms, 2007 International Conference on Safety and Security Systems in Europe, CD-ROM (2007.10).
  36. Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki: A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value, Proceedings of 2007 International Conference on Security and Management, pp.45-51 (2007.6).
  37. Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki: Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue, Proceedings of 2007 International Conference on Security and Management, pp.58-64 (2007.6).
  38. Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Makakatsu Nishigaki: ZeroBio – Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol, Proceedings of 2007 International Conference on Availability, Reliability and Security, pp.1155-1159 (2007.4).
  39. Masakatsu Nishigaki, Makoto Koike: A User Authentication Based on Personal History -A User Authentication System Using E-mail History-, Proceedings of 2006 World Multiconference on Systemics, Cybernetics and Informatics, vol.2, pp.305-310 (2006.7).
  40. Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki: Mechanism-Based PKI – A Real-Time Key Generation from Fingerprints, Proceedings of 2006 International Conference on Security and Management, pp.468-474 (2006.5).
  41. Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Masakatsu Nishigaki: A User Authentication System Using Schema of Visual Memory, Proceedings of the Second International Workshop on Biologically Inspired Approaches to Advanced Information Technology, Lecture Notes in Computer Science, vol.3853, pp.338-345, Springer (2006.1).
  42. Masakatsu Nishigaki, Tetsuya Matsushita, Masakazu Soga, Itsukazu Nakamura and Tadanori Mizuno: A Bounty Hunting-Based Copyright Protection System for Website Content: The Concept, Proceedings of the 7th World Multiconference on Systemics, Cybernetics and Informatics, Vol.XI, pp.350-355 (2003.7).
  43. Atsushi Harada, Masakatsu Nishigaki, Masakazu Soga, Akio Takubo and Itsukazu Nakamura: A Write-Once Data Management System, Proceedings of 2002 International Conference on Information Technology and Applications, 116-21, CD-ROM (2002.11).
  44. Keiichi Kuroda, Masakatsu Nishigaki, Masakazu Soga, Akio Takubo and Itsukazu Nakamura: A Digital Watermark using Public-key Cryptography for Open Algorithm, Proceedings of 2002 International Conference on Information Technology and Applications, 131-21, CD-ROM (2002.11).
  45. Kazuya Shioda, Masakatsu Nishigaki, Masakazu Soga, Akio Takubo and Itsukazu Nakamura: Digital Image Content Protection Based on Tainted Data Distribution, Proceedings of 2002 International Conference on Information Technology and Applications, 172-21, CD-ROM (2002.11).
  46. Masakatsu Nishigaki, Teruyasu Tsuzuki, Masakazu Soga, Tadanori Mizuno: A Fault Tolerant Learning Algorithm Considering the Worst-Case Fault of Neural Networks, Proc. 2000 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp.1045-1050 (2000.11).
  47. Masakatsu Nishigaki, Masakazu Soga: A Neural Network with Incremental Learning Capability and Global Convergence Property, Proc. 1997 International Symposium on Nonlinear Theory and Its Applications, pp.719-722 (1997.11).
  48. Masakatsu Nishigaki, Fumiaki Sato, Tadanori Mizuno, Masakazu Soga: Hardware Implementation of Protocols by Using Neural Networks Representing Finite State Machines, Proc. 1996 IEEE International Workshop on Intelligent Signal Processing and Communication Systems, pp.466-470 (1996.11).
  49. Singo Fujimori, Masakatsu Nishigaki, Hideki Asai: Multi-level Simulation of Analog/Digital Mixed Circuits with Behavioral Models, Proc. 1995 International Symposium on Nonlinear Theory and Its Applications, pp.881-884 (1995.12).
  50. Masakatsu Nishigaki: Universal Digital Sequential Circuit Using Programmable Wavelet Array and Its Application, Proc. 1995 International Symposium on Nonlinear Theory and Its Applications, pp.1041-1044 (1995.12).
  51. Masakatsu Nishigaki: Universal Digital Sequential Circuit Using Programmable Wavelet Array, Proc. 1995 Austraria and New Zealand Conference on Intelligent Information Systems, pp.41-46 (1995.11).
  52. Singo Fujimori, Masakatsu Nishigaki, Hideki Asai: AHDL-Oriented Circuit Simulator for Analog/Digital Mixed Circuits, Proc. 1995 Joint Technical Conference on Circuits/Systems, Computers and Communications, pp.607-610 (1995.6).
  53. Masaki Ishida, Koichi Hayashi, Masakatsu Nishigaki, Hideki Asai: Iterated Timing Analysis with Dynamic Partitioning Technique for Bipolar Transistor Circuits, Proc. 1994 IEEE International Symposium on Circuits and Systems, pp.411-414 (1994.5).
  54. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Mixed Mode Circuit Simulator SPLIT2.1 Using Dynamic Network Separation and Selective Trace, Proc. 1994 IEEE International Symposium on Circuits and Systems, pp.9-12 (1994.5).
  55. Masaki Ishida, Koichi Hayashi, Masakatsu Nishigaki, Hideki Asai: Relaxation-Based Algorithms with Dynamic Partitioning Technique for Bipolar Circuit Analysis, Proc. 1993 Int. Symposium on Nonlinear Theory and Its Applications, pp.659-662 (1993.12).
  56. Masaki Ishida, Koichi Hayashi, Masakatsu Nishigaki, Hideki Asai: Relaxation-Based Algorithms for Bipolar Circuit Analysis, Proc. 1993 Joint Technical Conference on Circuits/Systems, Computers and Communications, pp.566-569 (1993.6).
  57. Koichi Hayashi, Mitsuru Komatsu, Masakatsu Nishigaki, Hideki Asai: Waveform Relaxation Method with the Dynamic Partitioning Technique for Bipolar Transistor Circuits, Proc. 35th Midwest Symposium on Circuits and Systems, pp.400-403 (1992.8)
  58. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Mixed Mode Circuit Simulator SPLIT2 Using Dynamic Network Separation and Latency, Proc. 35th Midwest Symposium on Circuits and Systems, pp.1369-1372 (1992.8).
  59. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai: Hierarchical Decomposition System and Its Availability for Network Solution, Proc. 1991 IEEE International Symposium on Circuits and Systems, pp.884-887 (1991.6).

Other publications

Invited papers and presentations

  1. Masakatsu Nishigaki: Security and Trust, IFIP WG 11.11 International Conference on Trust Management 2014 (2014.7).
  2. Masakatsu Nishigaki, Wakaha Ogata, Hiroaki Kikuchi: ZeroBio – Development of Asymmetric Remote Biometric Authentication, Asian Biometric Consortium Conference and Exhibition 2010 (2010.12)
  3. Masakatsu Nishigaki:Eyeball reflexes: Security and Biometrics that cannot be spoofed,Intersec trade fair and conference 2009 (2009.1)
  4. Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki: A study on biometric key generation from fingerprints, Asian Biometric Forum 2006 (2006.10)
  5. Masakatsu Nishigaki: Overarching System Security : Information Security Optimization through Technical, Management and User Characteristics Coordination, The 2nd US-Japan Experts Workshop on Critical Information Infrastracture Protection (2005.6).