Name:
真野健
職位:
主任研究員
研究分野:
項書き換え系,プロセス代数,数理的技法,セキュリティ.
経歴:
1987.3 名古屋大学工学部応用物理学科卒業
1989.3 同工学研究科情報工学修士課程終了
1989.4 NTT 基礎研究所配属
1991.7 NTT コミュニケーション科学研究所
1999.1 NTT コミュニケーション科学基礎研究所
所属学会:
電子情報通信学会会員
情報処理学会学会会員
日本ソフトウェア科学会会員
情報ネットワーク法学会会員
論文リスト:
- 真野健, 小川瑞史 (NTT 基礎研究所):
Chew の定理の新しい証明, RIMS workshop on theory of rewriting
systems and its applications, 京都大学数解研講究録 918, pp.
160-177 (1996).
- Horita, E. and Mano, K.:
Nepi: a network prgramming language based on the pi-calculus,
Proc. of the 1st International Conference on Coodination
Models, Languages and Application (Coodination'96), LNCS 1061,
pp. 424-427 (1996).
- 堀田英一,真野健:
A metric semantics for the pi-calculus extended with external
events, Proc. of RIMS Workshop in Computing: Concurrency Theory
and Appllcations, 京都大学数解研講究録 996. (1996).
- 堀田英一,真野健:
Self-interpretation in an extension of CCS with parametric channels,
Proc. of Joint Sympisium on Parallel Processing 1996 (JSPP'96),
pp. 203-210 (1996).
- Horita, E. and Mano, K.:
Self-interpretation in an extension of CCS with parametric channels,
Proc. of the 12th Conference on the Mathematical Foundations of
Programming Semantics (MFPS XII) (1996).
- Mano, K. and Ogawa, M. (NTT Basic Research Labs.):
Unique normal form property of higher-order rewriting systems,
Proc. of the 5th International Conference on Algebraic and Logic
Programming (ALP'96), LNCS 1139, pp. 269-283 (1996).
- 真野健,小川瑞史 (NTT 基礎研究所):
高階書き換え系の単一正規形性, 電気情報通信学会論文誌 D-I, Vol.
J80-D-I, pp. 258-268 (1997).
- Horita, E. (NTT Software Labs.) and Mano, K.:
Nepi^2: a two-level calculus for network programming based
on the pi-calculus, Proc. of the 3rd Asian Computing Science
Conference (ASIAN'97), LNCS 1345, pp. 377-378 (1997).
- Kawabe, Y. and Mano, K.:
The Nepi2 programming System: A pi-Calculus Based Approach to
Agent-Based Programming, the first Goddard Workshop on Formal
Approaches to Agent Based Programming (FAABS '00), pp. 90-102,
LNAI 1871 (2000).
- T. Araragi, P. Attie, I. Keidar, K. Kogure, V. Luchangco, N. Lynch, and K. Mano:
On Formal Modeling of Agent Computations, the first Goddard
Workshop on Formal Approaches to Agent Based Programming
(FAABS '00), pp. 48-62, LNAI 1871 (2000).
- K. Mano and Y. Kawabe:
Nepi: Syntax, Semantics and Implementation, World
Multiconference on Systemics, Cybernetics and Informatics 2001
(SCI 2001), Volume XIV, (2001).
- Y. Kawabe and K. Mano:
Executing Coded pi-Calculus Processes, the second
International Conference on Software Engineering, Networking &
Parallel/Distributed Computing (SNPD '01) (2001).
- Mano, K. and Ogawa, M. (NTT Basic Research Labs.):
Unique normal form property of compatible term rewriting systems
- A new proof of Chew's theorem -, Theoretical Computer Science,
Vol.258 (2001).
- 河辺義信,真野健,堀田英一,小暮潔:
π計算の名前制限の名前生成による実装の正しさ,信学論 Volume J85-DI,
No. 3 (2002).
- 河辺義信,真野健:
Nepiネットワークプログラミングシステムの形式的検証,コンピュータソフトウェア
Vol. 20, pp. 46-57 (2003).
- K. Mano and Y. Kawabe:
The Nepi network programming system: a programming environment
for distributed systems, 3rd IEEE international symposium on
network computing and application (IEEE NCA04), pp. 287-292
(2004).
- Y. Kawabe, K. Mano:
Verifying trace equevalence of a shared-memory-style communication system,
Trans. IEICE,Vol. 36, No. 2, pp. 78-91 (2005).
- A. Mizuno, K. Mano, Y. Kawabe, H. Kuwabara, S. Yuen, K. Agusa:
Name-passing style GUI programming in a pi-calculus-based network language Nepi,
The 6th AMAST workshop on Real-Time Systems (ARTS 2004), ENTCS, Vol. 139, No. 1, pp. 145-168 (2005).
- Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada:
ackward simulations for anonymity,
6th International IFIP WG 1.7 Workshop on Issues in the Theory of Security (WITS '06), pp. 206-220 (2006).
- 川本裕輔,真野健,櫻田英樹,萩谷昌己:
関数部分知識と匿名性検証,日本応用数理学会論文誌,Vol. 17, No.4, pp.
559-576 (2007).
- Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada:
Theorem-proving anonymity of infinite state systems", Information
Processing Letters, Vol. 101, No. 1, pages 46-51 (2007).
- Ken Mano, Yoshinobu Kawabe, Hideki Sakurada and Yasuyuki Tsukada:
Role interchange for anonymity and privacy of voting,
Journal of Logic and Computation, Vol. 20, No. 6, pp. 1251-1288 (2010).
- 真野健:
プライバシ侵害に係る定義の検討における数理的表現方法の利用 −同定可能性の問題を中心として−,
情報ネットワークローレビュー, Vol. 9, No. 2, pp. 54-66 (2010).
- Yasuyuki Tsukada, Ken Mano, Hideki Sakurada and Yoshinobu Kawabe:
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach,
Transactions on Data Privacy, Vol. 3, Issue 3, pp. 177-198 (2010).
- 河辺義信, 真野健, 櫻田英樹, 塚田恭章:
電子投票プロトコルに対する無証拠性の定理証明,
情報処理学会論文誌, Vol. 52, No. 9, pp. 2549-2561 (2011).
- 竹内泉, 真野健:
確率様相論理による秘匿性の証明,
応用数理学会論文誌, Vol. 22, No. 1, pp. 23-45 (2012).
- Yasuyuki Tsukada, Ken Mano, Hideki Sakurada and Yoshinobu Kawabe:
Anonymity privacy, onymity, and identity: A modal logic approach,
The 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), pp. 42-51, (2009).
- Yasuyuki Tsukada, Ken Mano, Hideki Sakurada and Yoshinobu Kawabe:
An epistemic approach to compositional reasoning about anonymity and privacy,
The 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), pp. 239-248 (2013).
- Ken Mano, Kazuhiro Minami and Hiroshi Maruyama:
Protecting location privacy with K-confusing paths based on dynamic pseudonyms,
The 5th IEEE International Workshop on Security and Social Networking (SESOC 2013), pp. 285-290 (2013).
- Ken Mano, Kazuhiro Minami and Hiroshi Maruyama:
Privacy-preserving publishing of pseudonym-based trajectory location data set,
The 2nd International Workshop on Security of Mobile Applications (IWSMA 2013) , to appear (2013).