Name:

真野健





職位:

主任研究員

研究分野:

項書き換え系,プロセス代数,数理的技法,セキュリティ.

経歴:

1987.3 名古屋大学工学部応用物理学科卒業
1989.3 同工学研究科情報工学修士課程終了
1989.4 NTT 基礎研究所配属
1991.7 NTT コミュニケーション科学研究所
1999.1 NTT コミュニケーション科学基礎研究所

所属学会:

電子情報通信学会会員

情報処理学会学会会員

日本ソフトウェア科学会会員

情報ネットワーク法学会会員

論文リスト:

  1. 真野健, 小川瑞史 (NTT 基礎研究所):
    Chew の定理の新しい証明, RIMS workshop on theory of rewriting systems and its applications, 京都大学数解研講究録 918, pp. 160-177 (1996).
  2. Horita, E. and Mano, K.:
    Nepi: a network prgramming language based on the pi-calculus, Proc. of the 1st International Conference on Coodination Models, Languages and Application (Coodination'96), LNCS 1061, pp. 424-427 (1996).
  3. 堀田英一,真野健:
    A metric semantics for the pi-calculus extended with external events, Proc. of RIMS Workshop in Computing: Concurrency Theory and Appllcations, 京都大学数解研講究録 996. (1996).
  4. 堀田英一,真野健:
    Self-interpretation in an extension of CCS with parametric channels, Proc. of Joint Sympisium on Parallel Processing 1996 (JSPP'96), pp. 203-210 (1996).
  5. Horita, E. and Mano, K.:
    Self-interpretation in an extension of CCS with parametric channels, Proc. of the 12th Conference on the Mathematical Foundations of Programming Semantics (MFPS XII) (1996).
  6. Mano, K. and Ogawa, M. (NTT Basic Research Labs.):
    Unique normal form property of higher-order rewriting systems, Proc. of the 5th International Conference on Algebraic and Logic Programming (ALP'96), LNCS 1139, pp. 269-283 (1996).
  7. 真野健,小川瑞史 (NTT 基礎研究所):
    高階書き換え系の単一正規形性, 電気情報通信学会論文誌 D-I, Vol. J80-D-I, pp. 258-268 (1997).
  8. Horita, E. (NTT Software Labs.) and Mano, K.:
    Nepi^2: a two-level calculus for network programming based on the pi-calculus, Proc. of the 3rd Asian Computing Science Conference (ASIAN'97), LNCS 1345, pp. 377-378 (1997).
  9. Kawabe, Y. and Mano, K.:
    The Nepi2 programming System: A pi-Calculus Based Approach to Agent-Based Programming, the first Goddard Workshop on Formal Approaches to Agent Based Programming (FAABS '00), pp. 90-102, LNAI 1871 (2000).
  10. T. Araragi, P. Attie, I. Keidar, K. Kogure, V. Luchangco, N. Lynch, and K. Mano:
    On Formal Modeling of Agent Computations, the first Goddard Workshop on Formal Approaches to Agent Based Programming (FAABS '00), pp. 48-62, LNAI 1871 (2000).
  11. K. Mano and Y. Kawabe:
    Nepi: Syntax, Semantics and Implementation, World Multiconference on Systemics, Cybernetics and Informatics 2001 (SCI 2001), Volume XIV, (2001).
  12. Y. Kawabe and K. Mano:
    Executing Coded pi-Calculus Processes, the second International Conference on Software Engineering, Networking & Parallel/Distributed Computing (SNPD '01) (2001).
  13. Mano, K. and Ogawa, M. (NTT Basic Research Labs.):
    Unique normal form property of compatible term rewriting systems - A new proof of Chew's theorem -, Theoretical Computer Science, Vol.258 (2001).
  14. 河辺義信,真野健,堀田英一,小暮潔:
    π計算の名前制限の名前生成による実装の正しさ,信学論 Volume J85-DI, No. 3 (2002).
  15. 河辺義信,真野健:
    Nepiネットワークプログラミングシステムの形式的検証,コンピュータソフトウェア Vol. 20, pp. 46-57 (2003).
  16. K. Mano and Y. Kawabe:
    The Nepi network programming system: a programming environment for distributed systems, 3rd IEEE international symposium on network computing and application (IEEE NCA04), pp. 287-292 (2004).
  17. Y. Kawabe, K. Mano:
    Verifying trace equevalence of a shared-memory-style communication system, Trans. IEICE,Vol. 36, No. 2, pp. 78-91 (2005).
  18. A. Mizuno, K. Mano, Y. Kawabe, H. Kuwabara, S. Yuen, K. Agusa:
    Name-passing style GUI programming in a pi-calculus-based network language Nepi, The 6th AMAST workshop on Real-Time Systems (ARTS 2004), ENTCS, Vol. 139, No. 1, pp. 145-168 (2005).
  19. Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada:
    ackward simulations for anonymity, 6th International IFIP WG 1.7 Workshop on Issues in the Theory of Security (WITS '06), pp. 206-220 (2006).
  20. 川本裕輔,真野健,櫻田英樹,萩谷昌己:
    関数部分知識と匿名性検証,日本応用数理学会論文誌,Vol. 17, No.4, pp. 559-576 (2007).
  21. Y. Kawabe, K. Mano, H. Sakurada and Y. Tsukada:
    Theorem-proving anonymity of infinite state systems", Information Processing Letters, Vol. 101, No. 1, pages 46-51 (2007).
  22. Ken Mano, Yoshinobu Kawabe, Hideki Sakurada and Yasuyuki Tsukada:
    Role interchange for anonymity and privacy of voting, Journal of Logic and Computation, Vol. 20, No. 6, pp. 1251-1288 (2010).
  23. 真野健:
    プライバシ侵害に係る定義の検討における数理的表現方法の利用 −同定可能性の問題を中心として−, 情報ネットワークローレビュー, Vol. 9, No. 2, pp. 54-66 (2010).
  24. Yasuyuki Tsukada, Ken Mano, Hideki Sakurada and Yoshinobu Kawabe:
    Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach, Transactions on Data Privacy, Vol. 3, Issue 3, pp. 177-198 (2010).
  25. 河辺義信, 真野健, 櫻田英樹, 塚田恭章:
    電子投票プロトコルに対する無証拠性の定理証明, 情報処理学会論文誌, Vol. 52, No. 9, pp. 2549-2561 (2011).
  26. 竹内泉, 真野健:
    確率様相論理による秘匿性の証明, 応用数理学会論文誌, Vol. 22, No. 1, pp. 23-45 (2012).
  27. Yasuyuki Tsukada, Ken Mano, Hideki Sakurada and Yoshinobu Kawabe:
    Anonymity privacy, onymity, and identity: A modal logic approach, The 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), pp. 42-51, (2009).
  28. Yasuyuki Tsukada, Ken Mano, Hideki Sakurada and Yoshinobu Kawabe:
    An epistemic approach to compositional reasoning about anonymity and privacy, The 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), pp. 239-248 (2013).
  29. Ken Mano, Kazuhiro Minami and Hiroshi Maruyama:
    Protecting location privacy with K-confusing paths based on dynamic pseudonyms, The 5th IEEE International Workshop on Security and Social Networking (SESOC 2013), pp. 285-290 (2013).
  30. Ken Mano, Kazuhiro Minami and Hiroshi Maruyama:
    Privacy-preserving publishing of pseudonym-based trajectory location data set, The 2nd International Workshop on Security of Mobile Applications (IWSMA 2013) , to appear (2013).