
Kazumasa Omote
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
[c51]Tatsuhiro Fukuda, Kazumasa Omote:
Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives. DSC 2021: 1-8
[i4]Akira Imakura, Anna Bogdanova, Takaya Yamazoe, Kazumasa Omote, Tetsuya Sakurai:
Accuracy and Privacy Evaluations of Collaborative Data Analysis. CoRR abs/2101.11144 (2021)- 2020
[c50]Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots. Blockchain 2020: 1-8
[c49]Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network. IEEE ICBC 2020: 1-3
[c48]Takaya Yamazoe, Kazumasa Omote:
Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives. NSS 2020: 94-111
[i3]Teppei Sato, Keita Emura, Tomoki Fujitani, Kazumasa Omote:
An Anonymous Trust-Marking Scheme on Blockchain Systems. CoRR abs/2010.00206 (2020)
[i2]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption using Intel SGX. IACR Cryptol. ePrint Arch. 2020: 1221 (2020)
2010 – 2019
- 2019
[j17]Keita Emura
, Goichiro Hanaoka
, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara
, Kazumasa Omote, Yusuke Sakai
:
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. Secur. Commun. Networks 2019: 4872403:1-4872403:36 (2019)
[c47]Mitsuyoshi Imamura, Kazumasa Omote:
Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain. NSS 2019: 504-519
[c46]Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota:
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack. SEC 2019: 3-18
[c45]Satomi Kaneko, Akira Yamada, Yukiko Sawaya, Tran Phuong Thao, Ayumu Kubota, Kazumasa Omote:
Detecting Malicious Websites by Query Templates. SECITC 2019: 65-77
[c44]Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Threat Analysis of Poisoning Attack Against Ethereum Blockchain. WISTP 2019: 139-154- 2018
[c43]Masatsugu Oya, Kazumasa Omote:
Early Detection of Remote Access Trojan by Software Network Behavior. Inscrypt 2018: 658-671
[c42]Mitsuyoshi Imamura, Kazumasa Omote:
Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor. WISA 2018: 117-128- 2017
[j16]Naoto Kawaguchi, Kazumasa Omote:
Malware Function Estimation Using API in Initial Behavior. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 167-175 (2017)
[c41]Genki Osada, Kazumasa Omote, Takashi Nishide:
Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder. ESORICS (2) 2017: 344-361- 2016
[j15]Dan Jiang, Kazumasa Omote:
A RAT Detection Method Based on Network Behavior of the Communication's Early Stage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 145-153 (2016)
[j14]Kazumasa Omote, Tran Thao Phuong:
D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability. IEICE Trans. Inf. Syst. 99-D(4): 816-829 (2016)
[j13]Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi
:
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation. IEEE Trans. Emerg. Top. Comput. 4(1): 88-101 (2016)
[c40]Tran Phuong Thao, Kazumasa Omote:
ELAR: extremely lightweight auditing and repairing for cloud security. ACSAC 2016: 40-51
[c39]Daichi Adachi, Kazumasa Omote:
A Host-Based Detection Method of Remote Access Trojan in the Early Stage. ISPEC 2016: 110-121
[c38]Yosuke Ishikuro, Kazumasa Omote:
Privacy-Preserving Profile Matching Protocol Considering Conditions. NSS 2016: 171-183- 2015
[j12]Atsuko Miyaji, Kazumasa Omote:
Self-healing wireless sensor networks. Concurr. Comput. Pract. Exp. 27(10): 2547-2568 (2015)
[j11]Kazumasa Omote, Tran Thao Phuong:
ND-POR: A POR Based on Network Coding and Dispersal Coding. IEICE Trans. Inf. Syst. 98-D(8): 1465-1476 (2015)
[j10]Kazumasa Omote, Tran Phuong Thao:
MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability. Int. J. Distributed Sens. Networks 11: 586720:1-586720:14 (2015)
[j9]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. Secur. Commun. Networks 8(8): 1547-1560 (2015)
[c37]Dan Jiang, Kazumasa Omote:
An Approach to Detect Remote Access Trojan in the Early Stage of Communication. AINA 2015: 706-713
[c36]Naoto Kawaguchi, Kazumasa Omote:
Malware Function Classification Using APIs in Initial Behavior. AsiaJCIS 2015: 138-144
[c35]Takashi Adachi, Kazumasa Omote:
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode. AsiaJCIS 2015: 145-151
[c34]Kazumasa Omote, Tran Thao Phuong:
SW-SSS: Slepian-Wolf Coding-Based Secret Sharing Scheme. CISIS-ICEUTE 2015: 347-365
[c33]Kazumasa Omote, Tran Thao Phuong:
DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability. COCOON 2015: 713-730
[c32]Kazumasa Omote, Tran Phuong Thao:
POR-2P: Network Coding-Based POR for Data Provision-Payment System. CRiSIS 2015: 188-206- 2014
[j8]Keita Emura
, Atsuko Miyaji, Kazumasa Omote:
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users. J. Appl. Math. 2014: 983040:1-983040:14 (2014)
[c31]Kazumasa Omote, Tran Thao Phuong:
A New Efficient and Secure POR Scheme Based on Network Coding. AINA 2014: 98-105- 2013
[j7]Yusuke Sakai, Keita Emura, Goichiro Hanaoka
, Yutaka Kawai, Kazumasa Omote:
Methods for Restricting Message Space in Public-Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1156-1168 (2013)
[c30]Atsuko Miyaji, Kazumasa Omote:
How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs. AINA 2013: 205-212
[c29]Atsuko Miyaji, Kazumasa Omote:
Self-healing Schemes Suitable for Various WSNs. IDCS 2013: 92-105
[i1]Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security. IACR Cryptol. ePrint Arch. 2013: 321 (2013)- 2012
[c28]Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs. AINA Workshops 2012: 552-557
[c27]Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc:
Improvement of multi-user searchable encrypted data scheme. ICITST 2012: 396-401
[c26]Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote:
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. ISPEC 2012: 245-258
[c25]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazumasa Omote:
Group Signatures with Message-Dependent Opening. Pairing 2012: 270-294- 2011
[j6]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Timed-Release Proxy Re-Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(8): 1682-1695 (2011)
[j5]Atsuko Miyaji, Kazumasa Omote:
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes. IEICE Trans. Inf. Syst. 94-D(10): 1955-1965 (2011)
[c24]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. ICISC 2011: 186-203
[c23]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. ISC 2011: 102-118
[c22]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote:
Towards Restricting Plaintext Space in Public Key Encryption. IWSEC 2011: 193-209
[c21]Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote:
POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks. SSS 2011: 253-267- 2010
[j4]Kazumasa Omote, Kazuhiko Kato:
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards. IEICE Trans. Inf. Syst. 93-D(5): 1080-1086 (2010)
[j3]Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi:
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Int. J. Appl. Cryptogr. 2(1): 46-59 (2010)
[j2]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure. J. Inf. Process. 18: 77-87 (2010)
[c20]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. EuroPKI 2010: 77-92
[c19]Hisashige Ito, Atsuko Miyaji, Kazumasa Omote:
RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks. GLOBECOM 2010: 1-5
[c18]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. ProvSec 2010: 184-198
[c17]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication. ProvSec 2010: 200-213
[c16]Atsuko Miyaji, Kazumasa Omote:
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks. WISA 2010: 135-149
2000 – 2009
- 2009
[j1]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics. J. Inf. Process. 17: 216-231 (2009)
[c15]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. ARES 2009: 487-492
[c14]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. ARES 2009: 769-773
[c13]Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi:
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. ISPEC 2009: 13-23
[c12]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Two-Step Execution Mechanism for Thin Secure Hypervisors. SECURWARE 2009: 129-135
[c11]Takahiro Shinagawa
, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai
, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130
[c10]Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Selectable k-Times Relaxed Anonymous Authentication Scheme. WISA 2009: 281-295- 2008
[c9]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. APSCC 2008: 1225-1230
[c8]Kazumasa Omote, Atsuko Miyaji, Kazuhiko Kato:
Simple Certificateless Signature with Smart Cards. EUC (2) 2008: 431-436
[c7]Kazumasa Omote, Kazuhiko Kato:
Protection and Recovery of Disk Encryption Key Using Smart Cards. ITNG 2008: 106-111- 2007
[c6]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. ICETE (Selected Papers) 2007: 125-138
[c5]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. SECRYPT 2007: 16-24- 2002
[c4]Kazumasa Omote, Atsuko Miyaji:
A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. Financial Cryptography 2002: 57-71- 2001
[c3]Kazumasa Omote, Atsuko Miyaji:
A Practical English Auction with One-Time Registration. ACISP 2001: 221-234- 2000
[c2]Kazumasa Omote, Atsuko Miyaji:
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. ISW 2000: 108-120
1990 – 1999
- 1999
[c1]Kazumasa Omote, Eiji Okamoto:
User Identification System Based on Biometrics for Keystroke. ICICS 1999: 216-229
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from
on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-18 23:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
MS Academic
CiteSeerX
ORCID




