default search action
Kazumasa Omote
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Hironori Uchibori, Katsunari Yoshioka, Kazumasa Omote:
Honeypot Method to Lure Attackers Without Holding Crypto-Assets. IEEE Access 12: 16059-16071 (2024) - [j34]Kazumasa Omote, Yoko Inoue, Yoshihide Terada, Naohiro Shichijo, Toshiyuki Shirai:
A Scientometrics Analysis of Cybersecurity Using e-CSTI. IEEE Access 12: 40350-40367 (2024) - [j33]Hiromi Yamashiro, Kazumasa Omote, Akira Imakura, Tetsuya Sakurai:
Toward the Application of Differential Privacy to Data Collaboration. IEEE Access 12: 63292-63301 (2024) - [j32]Kota Chin, Keita Emura, Shingo Sato, Kazumasa Omote:
A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage. IEICE Trans. Inf. Syst. 107(5): 615-624 (2024) - [j31]Masataka Kakinouchi, Kazumasa Omote:
Reducing Security Fatigue in Visually Impaired University Students through Problem Posing. J. Inf. Process. 32: 618-627 (2024) - [j30]Takayuki Sasaki, Jia Wang, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:
EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities. J. Inf. Process. 32: 789-800 (2024) - [j29]Taisei Takahashi, Yan Zhihao, Kazumasa Omote:
Emergency Medical Access Control System Based on Public Blockchain. J. Medical Syst. 48(1): 90 (2024) - 2023
- [j28]Zhanwen Chen, Kazumasa Omote:
Preventing SNS Impersonation: A Blockchain-Based Approach. IEICE Trans. Inf. Syst. 106(9): 1354-1363 (2023) - [c90]Kenta Hagiwara, Kazumasa Omote:
VMI System with Smart Contracts for Demand Forecasting. AsiaJCIS 2023: 1-8 - [c89]Liang Liu, Qiao Wang, Stephen John Turnbull, Kazumasa Omote:
The Validator's Dilemma in PoW Blockchain: An Evolutionary Game Perspective. Blockchain 2023: 17-24 - [c88]Liang Liu, Kazumasa Omote:
Efficient Authentication System Based On Blockchain Using eID card. Blockchain 2023: 166-171 - [c87]Kazumasa Omote:
Is the Blockchain Useful for Sharing Sensitive Data? GCCE 2023: 490-492 - [c86]Kazumasa Omote, Tatsuhiro Fukuda:
A Secure Contact Tracing Method Using Smart Contracts with Considering Privacy. ICBC 2023: 89-103 - [c85]Keigo Kimura, Mitsuyoshi Imamura, Kazumasa Omote:
Cross-Referencing Scheme to Ensure NFT and Platform Linkage Unaffected by Forking. ICBC 2023: 1-4 - [c84]Zhanwen Chen, Kazumasa Omote:
Toward Achieving Anonymous Non-Fungible Tokens in Trustless Environment. ICBTA 2023: 35-41 - [c83]Kazumasa Omote:
Does Private Blockchain Make Sense? ICCE 2023: 1-3 - [c82]Kazumasa Omote:
Towards Decentralized Autonomous Digital Signatures Using Smart Contracts. ICOIN 2023: 230-235 - [c81]Qisheng Chen, Kazumasa Omote:
Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs Detection. SEC 2023: 350-360 - [i6]Kota Chin, Keita Emura, Kazumasa Omote:
An Anonymous yet Accountable Contract Wallet System using Account Abstraction. CoRR abs/2309.03480 (2023) - 2022
- [j27]Shinya Haga, Kazumasa Omote:
Blockchain-Based Autonomous Notarization System Using National eID Card. IEEE Access 10: 87477-87489 (2022) - [j26]Mitsuyoshi Imamura, Kazumasa Omote:
Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin. IEEE Access 10: 98683-98699 (2022) - [j25]Zhanwen Chen, Kazumasa Omote:
Toward Achieving Anonymous NFT Trading. IEEE Access 10: 130166-130176 (2022) - [j24]Wanjia Zheng, Kazumasa Omote:
A study on robustness of malware detection model. Ann. des Télécommunications 77(9-10): 663-675 (2022) - [c80]Kotono Iwata, Kazumasa Omote:
Automatic Monitoring System for Security Using IoT Devices and Smart Contracts. AINA (1) 2022: 205-216 - [c79]Masataka Kakinouchi, Kazumasa Omote:
Information Security Fatigue in Visually Impaired University Students. AINA (3) 2022: 448-458 - [c78]Zhanwen Chen, Kazumasa Omote:
Building a Blockchain-Based Social Network Identification System. AINA (2) 2022: 468-479 - [c77]Ryuji Ueno, Kazumasa Omote:
Toward a Blockchain Healthcare Information Exchange. AINA (2) 2022: 492-502 - [c76]Kota Chin, Keita Emura, Kazumasa Omote, Shingo Sato:
A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage. Blockchain 2022: 398-405 - [c75]Shingo Fujimoto, Kazumasa Omote:
Proposal of a smart contract-based security token management system. Blockchain 2022: 419-426 - [c74]Hiromi Yamashiro, Kazumasa Omote, Akira Imakura, Tetsuya Sakurai:
A study of the privacy perspective on principal component analysis via a realistic attack model. CIS 2022: 376-380 - [c73]Motoya Ishimaki, Kazumasa Omote:
Ethereum Contract Honeypot Risk Analysis. FCS 2022: 226-240 - [c72]Kazumasa Omote:
Does Blockchain Qualify as Secret-free Immutable Storage? GCCE 2022: 300-301 - [c71]Keigo Kimura, Mitsuyoshi Imamura, Kazumasa Omote:
A Distributed Authenticity Verification Scheme Using Deep Learning for NFT Market. ICBTA 2022: 40-49 - [c70]Kazumasa Omote:
A Simple and Flexible Global ID System for Authentication in Blockchain. ICC 2022: 4739-4744 - [c69]Jia Wang, Takayuki Sasaki, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:
Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities. CSP 2022: 71-79 - [c68]Qisheng Chen, Kazumasa Omote:
A Three-Step Framework for Detecting Malicious URLs. ISNCC 2022: 1-6 - [c67]Shinya Haga, Taisei Takahashi, Kazumasa Omote:
Multi Pair Swap-Based Weather Derivative DeFi. QRS Companion 2022: 62-69 - [c66]Wanjia Zheng, Kazumasa Omote:
Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures. TrustCom 2022: 1235-1242 - [i5]Kota Chin, Keita Emura, Kazumasa Omote, Shingo Sato:
A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage. CoRR abs/2207.10823 (2022) - 2021
- [j23]Teppei Sato, Keita Emura, Tomoki Fujitani, Kazumasa Omote:
An Anonymous Trust-Marking Scheme on Blockchain Systems. IEEE Access 9: 108772-108781 (2021) - [j22]Shinya Haga, Kazumasa Omote:
IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet. Secur. Commun. Networks 2021: 8937448:1-8937448:10 (2021) - [j21]Tran Phuong Thao, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Ayumu Kubota, Shinsaku Kiyomoto, Kazumasa Omote:
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data. IEEE Trans. Big Data 7(4): 703-716 (2021) - [c65]Mitsuyoshi Imamura, Kazumasa Omote:
Empirical Study of Software Adoption Process in the Bitcoin Network. AINA (1) 2021: 233-244 - [c64]Mitsuyoshi Imamura, Kazumasa Omote:
Investigation and Analysis of Features in Decentralized Network Management of Minor Cryptocurrencies. AINA (1) 2021: 245-258 - [c63]Wataru Taguchi, Kazumasa Omote:
Risk Analysis for Worthless Crypto Asset Networks. AINA (2) 2021: 592-602 - [c62]Zhaoheng Chen, Kazumasa Omote:
A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine Learning. AsiaJCIS 2021: 45-50 - [c61]Tomoki Fujitani, Keita Emura, Kazumasa Omote:
A Privacy-Preserving Enforced Bill Collection System using Smart Contracts. AsiaJCIS 2021: 51-60 - [c60]Kota Chin, Kazumasa Omote:
Analysis of Attack Activities for Honeypots Installation in Ethereum Network. Blockchain 2021: 440-447 - [c59]Keigo Kimura, Kazumasa Omote:
Risk Analysis for Abusing Blockchain Poisoning. BRAINS 2021: 45-46 - [c58]Tatsuhiro Fukuda, Kazumasa Omote:
Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives. DSC 2021: 1-8 - [c57]Teppei Sato, Keita Emura, Tomoki Fujitani, Kazumasa Omote:
An Anonymous Trust-Marking Scheme on Blockchain Systems. IEEE ICBC 2021: 1-3 - [c56]Wanjia Zheng, Kazumasa Omote:
Robust Detection Model for Portable Execution Malware. ICC 2021: 1-6 - [c55]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption Using Intel SGX. ProvSec 2021: 215-240 - [c54]Kazuki Hara, Takeshi Takahashi, Motoya Ishimaki, Kazumasa Omote:
Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum. QRS Companion 2021: 652-659 - [c53]Mitsuyoshi Imamura, Kazumasa Omote:
Toward Achieving Unanimity for Implicit Closings in a Trustless System. QSHINE 2021: 75-93 - [i4]Akira Imakura, Anna Bogdanova, Takaya Yamazoe, Kazumasa Omote, Tetsuya Sakurai:
Accuracy and Privacy Evaluations of Collaborative Data Analysis. CoRR abs/2101.11144 (2021) - 2020
- [c52]Kazumasa Omote, Asuka Suzuki, Teppei Sato:
A New Method of Assigning Trust to User Addresses in Bitcoin. BCCA 2020: 38-43 - [c51]Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots. Blockchain 2020: 1-8 - [c50]Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network. IEEE ICBC 2020: 1-3 - [c49]Kazumasa Omote:
A Decentralized Secure Email System based on Conventional RSA Signature. ISITA 2020: 494-498 - [c48]Takaya Yamazoe, Kazumasa Omote:
Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives. NSS 2020: 94-111 - [i3]Teppei Sato, Keita Emura, Tomoki Fujitani, Kazumasa Omote:
An Anonymous Trust-Marking Scheme on Blockchain Systems. CoRR abs/2010.00206 (2020) - [i2]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption using Intel SGX. IACR Cryptol. ePrint Arch. 2020: 1221 (2020)
2010 – 2019
- 2019
- [j20]Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai:
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. Secur. Commun. Networks 2019: 4872403:1-4872403:36 (2019) - [c47]Mitsuyoshi Imamura, Kazumasa Omote:
Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain. NSS 2019: 504-519 - [c46]Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota:
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack. SEC 2019: 3-18 - [c45]Satomi Kaneko, Akira Yamada, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote:
Detecting Malicious Websites by Query Templates. SECITC 2019: 65-77 - [c44]Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Threat Analysis of Poisoning Attack Against Ethereum Blockchain. WISTP 2019: 139-154 - 2018
- [c43]Masatsugu Oya, Kazumasa Omote:
Early Detection of Remote Access Trojan by Software Network Behavior. Inscrypt 2018: 658-671 - [c42]Mitsuyoshi Imamura, Kazumasa Omote:
Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor. WISA 2018: 117-128 - 2017
- [j19]Naoto Kawaguchi, Kazumasa Omote:
Malware Function Estimation Using API in Initial Behavior. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 167-175 (2017) - [c41]Genki Osada, Kazumasa Omote, Takashi Nishide:
Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder. ESORICS (2) 2017: 344-361 - 2016
- [j18]Dan Jiang, Kazumasa Omote:
A RAT Detection Method Based on Network Behavior of the Communication's Early Stage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 145-153 (2016) - [j17]Kazumasa Omote, Tran Thao Phuong:
D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability. IEICE Trans. Inf. Syst. 99-D(4): 816-829 (2016) - [j16]Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi:
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation. IEEE Trans. Emerg. Top. Comput. 4(1): 88-101 (2016) - [c40]Tran Phuong Thao, Kazumasa Omote:
ELAR: extremely lightweight auditing and repairing for cloud security. ACSAC 2016: 40-51 - [c39]Daichi Adachi, Kazumasa Omote:
A Host-Based Detection Method of Remote Access Trojan in the Early Stage. ISPEC 2016: 110-121 - [c38]Yosuke Ishikuro, Kazumasa Omote:
Privacy-Preserving Profile Matching Protocol Considering Conditions. NSS 2016: 171-183 - 2015
- [j15]Atsuko Miyaji, Kazumasa Omote:
Self-healing wireless sensor networks. Concurr. Comput. Pract. Exp. 27(10): 2547-2568 (2015) - [j14]Kazumasa Omote, Tran Thao Phuong:
ND-POR: A POR Based on Network Coding and Dispersal Coding. IEICE Trans. Inf. Syst. 98-D(8): 1465-1476 (2015) - [j13]Kazumasa Omote, Tran Phuong Thao:
MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability. Int. J. Distributed Sens. Networks 11: 586720:1-586720:14 (2015) - [j12]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. Secur. Commun. Networks 8(8): 1547-1560 (2015) - [c37]Dan Jiang, Kazumasa Omote:
An Approach to Detect Remote Access Trojan in the Early Stage of Communication. AINA 2015: 706-713 - [c36]Naoto Kawaguchi, Kazumasa Omote:
Malware Function Classification Using APIs in Initial Behavior. AsiaJCIS 2015: 138-144 - [c35]Takashi Adachi, Kazumasa Omote:
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode. AsiaJCIS 2015: 145-151 - [c34]Kazumasa Omote, Tran Thao Phuong:
SW-SSS: Slepian-Wolf Coding-Based Secret Sharing Scheme. CISIS-ICEUTE 2015: 347-365 - [c33]Kazumasa Omote, Tran Thao Phuong:
DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability. COCOON 2015: 713-730 - [c32]Kazumasa Omote, Tran Phuong Thao:
POR-2P: Network Coding-Based POR for Data Provision-Payment System. CRiSIS 2015: 188-206 - 2014
- [j11]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users. J. Appl. Math. 2014: 983040:1-983040:14 (2014) - [c31]Kazumasa Omote, Tran Thao Phuong:
A New Efficient and Secure POR Scheme Based on Network Coding. AINA 2014: 98-105 - 2013
- [j10]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote:
Methods for Restricting Message Space in Public-Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1156-1168 (2013) - [c30]Atsuko Miyaji, Kazumasa Omote:
How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs. AINA 2013: 205-212 - [c29]Atsuko Miyaji, Kazumasa Omote:
Self-healing Schemes Suitable for Various WSNs. IDCS 2013: 92-105 - [i1]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security. IACR Cryptol. ePrint Arch. 2013: 321 (2013) - 2012
- [c28]Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs. AINA Workshops 2012: 552-557 - [c27]Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc:
Improvement of multi-user searchable encrypted data scheme. ICITST 2012: 396-401 - [c26]Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote:
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. ISPEC 2012: 245-258 - [c25]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazumasa Omote:
Group Signatures with Message-Dependent Opening. Pairing 2012: 270-294 - 2011
- [j9]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Timed-Release Proxy Re-Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(8): 1682-1695 (2011) - [j8]Atsuko Miyaji, Kazumasa Omote:
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes. IEICE Trans. Inf. Syst. 94-D(10): 1955-1965 (2011) - [c24]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. ICISC 2011: 186-203 - [c23]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. ISC 2011: 102-118 - [c22]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote:
Towards Restricting Plaintext Space in Public Key Encryption. IWSEC 2011: 193-209 - [c21]Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote:
POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks. SSS 2011: 253-267 - 2010
- [j7]Kazumasa Omote, Kazuhiko Kato:
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards. IEICE Trans. Inf. Syst. 93-D(5): 1080-1086 (2010) - [j6]Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi:
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Int. J. Appl. Cryptogr. 2(1): 46-59 (2010) - [j5]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure. Inf. Media Technol. 5(2): 765-775 (2010) - [j4]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure. J. Inf. Process. 18: 77-87 (2010) - [c20]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. EuroPKI 2010: 77-92 - [c19]Hisashige Ito, Atsuko Miyaji, Kazumasa Omote:
RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c18]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. ProvSec 2010: 184-198 - [c17]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication. ProvSec 2010: 200-213 - [c16]Atsuko Miyaji, Kazumasa Omote:
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks. WISA 2010: 135-149
2000 – 2009
- 2009
- [j3]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics. Inf. Media Technol. 4(4): 1060-1075 (2009) - [j2]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics. J. Inf. Process. 17: 216-231 (2009) - [c15]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. ARES 2009: 487-492 - [c14]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. ARES 2009: 769-773 - [c13]Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi:
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. ISPEC 2009: 13-23 - [c12]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Two-Step Execution Mechanism for Thin Secure Hypervisors. SECURWARE 2009: 129-135 - [c11]Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - [c10]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Selectable k-Times Relaxed Anonymous Authentication Scheme. WISA 2009: 281-295 - 2008
- [c9]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. APSCC 2008: 1225-1230 - [c8]Kazumasa Omote, Atsuko Miyaji, Kazuhiko Kato:
Simple Certificateless Signature with Smart Cards. EUC (2) 2008: 431-436 - [c7]Kazumasa Omote, Kazuhiko Kato:
Protection and Recovery of Disk Encryption Key Using Smart Cards. ITNG 2008: 106-111 - 2007
- [c6]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. ICETE (Selected Papers) 2007: 125-138 - [c5]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. SECRYPT 2007: 16-24 - 2002
- [j1]Kazumasa Omote, Atsuko Miyaji:
A Practical English Auction with Simple Revocation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1054-1061 (2002) - [c4]Kazumasa Omote, Atsuko Miyaji:
A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. Financial Cryptography 2002: 57-71 - 2001
- [c3]Kazumasa Omote, Atsuko Miyaji:
A Practical English Auction with One-Time Registration. ACISP 2001: 221-234 - 2000
- [c2]Kazumasa Omote, Atsuko Miyaji:
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. ISW 2000: 108-120
1990 – 1999
- 1999
- [c1]Kazumasa Omote, Eiji Okamoto:
User Identification System Based on Biometrics for Keystroke. ICICS 1999: 216-229
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint