Yuji Watanabe

Biography
- Born in Tokyo
- I received Ph.D in the Department of Engineering, University of Tokyo in 2001. (supervisor: Professor Hideki Imai)
- I joined IBM Tokyo Research in 2001.
- My research interests include security and privacy, peer-to-peer, RFID and traceability.
- Now I am working on Trusted Virtual Domain project.
Contact
- IBM Tokyo Research Laboratory
- 1623-14 Shimotsuruma, Yamato-shi, Kanagawa, 242-8502, Japan
- Tel: +81-46-215-4634 (1808-4634) /Fax: +81-46-273-7428
- E-mail: muew AT jp DOT ibm DOT com
Awards
- Best Paper Award, Information Processing Society of Japan, 2004
- Best Paper and Best Presentation Award, DPS-Workshop, October 2002.
Activity
- Part Time Lecturer, Tokyo Institute of Technology, 2006-
- Organizing Committee for The Second Workshop on Advances in Trusted Computing (WATC '06 Fall)
- Session Chair: SCIS2005, 2004, CSS2005, 2004, 2003
- Member of Steering Committee, Computer Security (CSEC), Information Processing Society of Japan, April 2004-
- Member of Editorial Committee, Information Processing Society of Japan, April 2007-
Refereed International Conferences
- Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh and Kazuko Oyanagi, "Dynamic Information Flow Control Architecture for Web Applications," to appear in 12th European Symposium On Research In Computer Security (ESORICS 2007), Dresden, Germany, LNCS, Springer, September, 2007.
- Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi and Michiharu Kudoh, "Chinese-Wall Process Confinement for Practical Distributed Coalitions," to appear in the 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007), ACM Press, June, 2007.
- Christine Robson, Yuji Watanabe and Masayuki Numao, "Parts Traceability for Manufacturers," The 2007 IEEE 23rd International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey, IEEE, April, 2007.
- Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina and Michiharu Kudoh, "Layering Negotiations for Flexible Attestation," in The First ACM Workshop on Scalable Trusted Computing (STC’06), ACM Press, November, 2006.
- Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo and Hiroshi Maruyama, "Bridging the Gap between Inter-Communication Boundary and Internal Trusted Components," the 11th European Symposium on Research in Computer Security(ESORICS 2006), LNCS, Springer, Semptember, 2006.
- Yuji Watanabe and Masayuki Numao, "Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing," the 8th European Symposium on Research in Computer Security(ESORICS2003), LNCS, 2003.
Paper
BibTeX
- Yuji Watanabe and Masayuki Numao, "Conditional Cryptographic Delegation for P2P Data Sharing," the 5th International Information Security Conference(ISC2002), LNCS, 2002.
Paper
BibTex
- Yuji Watanabe, Goichiro Hanaoka and Hideki Imai, "Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents," The Cryptographer's Track at RSA Conference(CT-RSA2001), LNCS, 2001.
Paper
BibTex
- Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka and Hideki Imai, "Efficient Asymmetric Self-Enforcement Scheme with Public Traceability," Public Key Cryptography(PKC2001), LNCS, 2001.
Paper
BibTex
- Yuji Watanabe and Hideki Imai, "Reducing the round complexity of a sealed-bid auction protocol with off-line TTP," the 7th ACM Conference on Computer and Communication Security (ACM-CCS2000), ACM, 2000.
Paper
BibTex
- Yuji Watanabe, Yuliang Zheng and Hideki Imai, "Software Copyright Protection In the Presence of Corrupted Providers" to appear International Symposium on Information Theory and Its Application(ISITA2000), 2000.
- Yuji Watanabe, Yuliang Zheng and Hideki Imai, "Traitor Traceable Signature Scheme," IEEE International Symposium on Information Theory (ISIT2000), IEEE, 2000.
- Yuji Watanabe, Hideki Imai, "Active Rebooting Method for Proactivized System : How to Enhance the Security against Latent Virus Attacks," International Information Security Workshop (ISW'99), LNCS, 1999.
Paper
BibTex
- Yuji Watanabe and Hideki Imai, "Shared Generation of Random Number with Timestamp : How to Cope with the Leakage of the CA's Secret," Public Key Cryptography (PKC'99), LNCS, 1999.
Paper
BibTex
- Yuji Watanabe and Hideki Imai, "Authenticator Renewing for Large-Scale Networks," The 1998 International Symposium on Information Theory and its Applications(ISITA'98), 1998.
- Yuji Watanabe and Hideki Imai, "Remainder Space Transformation," Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'97), 1997.
Journals
- Takeo Yoshizawa, Yuji Watanabe, and Masayuki Numao, "JDBC Monitor for Application Trasparent Policy Enforcement," Journal of IPSJ, August 2007 (to appear).
- Masayuki Numao, Yuji Watanabe, "Security and Privacy for Attribute-based Dynamic Community Creation," Journal of IPSJ, 2004.
- Masayuki Numao, Yuji Watanabe, "Security and Privacy for Attribute-based Dynamic Community Creation," Journal of IPSJ, 2004.
- Masayuki Numao, Yuji Watanabe, "Dynamic Group Key Construction for P2P Multicast," Journal of IPSJ, 2004.
- Yuji Watanabe, Masayuki Numao, "Fair Private List Matching Schemes," Journal of IPSJ, 2003.
- Yuji Watanabe, Masayuki Numao, "Access Control for Encrypted Data in P2P Data Sharing," IPSJ Journal, Journal of IPSJ, 2003.
- Yuji Watanabe, Hideki Imai, "Security Analysis on the Proactivized System against Latent Virus," Journal of IPSJ, vol.48, no.8. 2000