Follow
Yoshimichi Nakatsuka
Yoshimichi Nakatsuka
Verified email at uci.edu
Title
Cited by
Cited by
Year
PDoT: private DNS-over-TLS with TEE support
Y Nakatsuka, A Paverd, G Tsudik
Digital Threats: Research and Practice 2 (1), 1-22, 2021
152021
Viceroy: Gdpr-/ccpa-compliant enforcement of verifiable accountless consumer requests
S Jordan, Y Nakatsuka, E Ozturk, A Paverd, G Tsudik
arXiv preprint arXiv:2105.06942, 2021
72021
{CACTI}: Captcha Avoidance via Client-side {TEE} Integration
Y Nakatsuka, E Ozturk, A Paverd, G Tsudik
30th USENIX Security Symposium (USENIX Security 21), 2561-2578, 2021
72021
FROG: A packet hop count based DDoS countermeasure in NDN
Y Nakatsuka, JL Wijekoon, H Nishi
2018 IEEE Symposium on Computers and Communications (ISCC), 00492-00497, 2018
72018
An Empirical Study & Evaluation of Modern {CAPTCHAs}
A Searles, Y Nakatsuka, E Ozturk, A Paverd, G Tsudik, A Enkoji
32nd USENIX Security Symposium (USENIX Security 23), 3081-3097, 2023
42023
Vronicle: verifiable provenance for videos from mobile devices
Y Liu, Y Nakatsuka, AA Sani, S Agarwal, G Tsudik
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
32022
Novel method to watermark anonymized data for data publishing
Y Nakamura, Y Nakatsuka, H Nishi
IEICE TRANSACTIONS on Information and Systems 100 (8), 1671-1679, 2017
32017
CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
Y Nakatsuka, E Ozturk, A Shamis, A Paverd, P Pietzuch
arXiv preprint arXiv:2205.15359, 2022
12022
Vronicle: A System for Producing Videos with Verifiable Provenance
Y Nakatsuka, AA Sani, S Agarwal, G Tsudik
arXiv preprint arXiv:2109.12712, 2021
12021
Puppy: A Publicly Verifiable Watermarking Protocol
D İşler, S Hwang, Y Nakatsuka, N Laoutaris, G Tsudik
arXiv preprint arXiv:2312.09125, 2023
2023
Scrappy: SeCure Rate Assuring Protocol with PrivacY
K Akama, Y Nakatsuka, M Sato, K Uehara
arXiv preprint arXiv:2312.00989, 2023
2023
Enhancing System Security and Privacy with Trusted Hardware Components
Y Nakatsuka
University of California, Irvine, 2023
2023
Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts
Y Nakatsuka, H Nishi
IEICE Technical Report; IEICE Tech. Rep. 116 (510), 327-332, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–13