Rie Shigetomi

Learn More
—This paper presents a novel security architecture for in-vehicle communication. The ratio of electronics to vehicle equipment is steadily increasing. And novel vehicles will also have connectibility to public networks to provide many kinds of services. Therefore, they are expected to suffer from a wide variety of threats and the electronic control units(More)
— In an overview paper called State of the Art: Embedding Security in Vehicles, Wolf et al. give a general state-of-the-art overview of IT security in vehicles and describe core security technologies and relevant security mechanisms. In this paper we show that a formal analysis of many of the related properties is possible. This indicates that many expected(More)
Anonymity is a highly desired feature in Internet transactions. On the other hand, unconditional anonymity may contain some traps. For instance, it may cause irresponsible, or even criminal, use of the Internet. Thus, it would be desirable to have revocable anonymity in our internet applications. In this work, we suggest an anonymous authentication scheme(More)
—Explosive progress in networking and outsourcing storage increases the use of information retrieval technologies, in massive datasets. Nowadays, there are varieties of storage-providers through the internet, such as e-mail accounts and public database, which are convenient to store and exchange electronic files and medias. Typically, the storage-provider(More)
Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organization costs have been drastically reduced. However, in P2P systems, it is difficult for game creators to prevent cheats by malicious players, due to the lack of trusted servers. In order to(More)