Paper
-
N. Babaguchi, I. Echizen, J. Yamagishi, N. Nitta, Y. Nakashima, K. Nakamura, K. Kono, F. Fang, S. Myojin, Z. Kuang, H.H. Nguyen, and N. T. Tieu, "Preventing Fake Information Generation Against Media Clone Attacks," IEICE Transactions on Information and Systems, vol. E104-D, no. 1, pp. 2-11, 2021. (Invited Paper) (Win IEICE-ISS Excellent Paper Award)
-
I. Echizen, N. Babaguchi, J. Yamagishi, N. Nitta, Y. Nakashima, K. Nakamura, K. Kono, F. Fang, S. Myojin, Z. Kuang, H.H. Nguyen, and N. T. Tieu, "Generation and Detection of Media Clones," IEICE Transactions on Information and Systems, vol. E104-D, no. 1, pp. 12-23, 2021. (Invited Paper) (Win IEICE-ISS Excellent Paper Award)
-
K. Kono, "Toward Realization of Anonymous Services on the Internet," Safety Science Review 2010, no. 1, pp. 13-26, 2011. (in Japanese)
-
K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Anonymous Communication System Based on Multiple Loopbacks," Journal of Information Assurance and Security, 8 pages, online published 2011.
-
K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Theoretical Analysis of the Performance of Anonymous Communication System 3-Mode Net," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E93-A, no. 7, pp. 1338-1345, 2010.
-
K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "A Consideration on the Numbers of Relay Nodes and Encryption Required for Anonymous Communication System 3-Mode Net," Journal of Information Assurance and Security, 8 pages , online published, 2010.
-
K. Kono, Y. Ito, A. Aoyama, H. Kamoda, and N. Babaguchi, "Matrix-Based Algorithm for Integrating Inheritance Relations of Access Rights for Policy Generation," Journal of Information Processing, Vol. 17, pp. 318-327, December 2009.
International Conference
-
K. Kono and N. Babaguchi, "Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method," Proc. of 30th International Symposium on Information Theory and Its Applications (ISITA 2020), to be published in 2020.
-
K. Kono, T. Yoshida, S. Ohshiro, and N. Babaguchi, "Passive Video Forgery Detection Considering Spatio-Temporal Consistency," Proc. of 14th International Conference on Information Assurance and Security (IAS 2018), 10 pages, Porto, Portugal, December 2018.
-
S. Karita, K. Nakamura, K. Kono, Y. Ito, and N. Babaguchi, "Owner Authentication for Mobile Devices Using Motion Gestures Based on Multi-Owner Template Update," Proc. of 2015 Workshop on User Authentication for Emerging Interfaces (UAEI), in conjunction with IEEE International Conference on Multimedia and Expo (ICME2015), 6 pages, Torino, Italy, July 2015.
-
K. Nakamura, K. Kono, Y. Ito, N. Babaguchi, "Tablet Owner Authentication Based on Behavioral Characteristics of Multi-Touch Actions," Proc. of International Conference on Pattern Recognition(ICPR 2012), 4 pages, Japan, November 2012.
-
K. Kono, Y. Ito, and N. Babaguchi, Anonymous Communication System Using Probabilistic Choice of Actions and Multiple Loopbacks," Proc. 6th IEEE International Conference on Information Assurance and Security (IAS 2010), USA, pp. 210-215, 2010.
-
K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Security Analysis of Anonymous Communication System 3-Mode Net Against Collaborating Nodes," Proc. 2009 Asia-Pacific Signal and Information Processing Association Annual Summit Conference (APSIPA ASC 2009), pp. 105-110, Japan, October 2009.
-
K. Kono, S. Nakano, Y. Ito, and N. Babaguchi, "Performance Analysis of Anonymous Communication System 3-Mode Net," Proc. 5th IEEE International Conference on Information Assurance and Security (IAS 2009), pp. 593-596, China, August 2009. (Win Best Paper Award)
Thesis
-
A Study on Policy Integration and Anonymous Communication for Protecting Personal Information
(Osaka University, 2010)
Publication in Japanese and English