


Остановите войну!
for scientists:
Eiji Okamoto
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j68]Kaga Tomoki, Mamoru Okumura, Eiji Okamoto, Tetsuya Yamamoto:
Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear Modulation. IEICE Trans. Commun. 105-B(5): 638-647 (2022) - 2021
- [j67]Naoki Ishikawa
, Jehad M. Hamamreh
, Eiji Okamoto
, Chao Xu
, Lixia Xiao
:
Artificially Time-Varying Differential MIMO for Achieving Practical Physical Layer Security. IEEE Open J. Commun. Soc. 2: 2180-2194 (2021) - [c148]Mamoru Okumura, Kaga Tomoki, Eiji Okamoto, Tetsuya Yamamoto:
Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security. CCNC 2021: 1-2 - 2020
- [c147]Hayato Ishikawa, Eiji Okamoto, Hiraku Okada, Satoshi Makido:
Performance improvement of V2I uplink transmission on far vehicles using frequency scheduling-based cooperative V2V relay transmission. CCNC 2020: 1-6 - [c146]Yoshihiro Masuda, Eiji Okamoto, Tetsuya Yamamoto:
Low Complexity Decoding of Downlink Chaos NOMA Scheme with Physical Layer Security. CCNC 2020: 1-6 - [c145]Yusaku Shiomitsu, Eiji Okamoto, Manabu Mikami, Hitoshi Yoshino:
Poster: Performance analysis of early HARQ retransmission scheme in highway environments. VNC 2020: 1-2
2010 – 2019
- 2019
- [j66]Eiji Okamoto, Manabu Mikami, Hitoshi Yoshino:
Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels. IEICE Trans. Commun. 102-B(8): 1458-1466 (2019) - [c144]Hayato Ishikawa, Eiji Okamoto, Shouhei Okamoto, Hiraku Okada, Satoshi Makido:
Performance Analysis of Uplink V2I Cooperative Transmission Scheme in Practical Road Environments. ICOIN 2019: 98-102 - [c143]Ryo Hasegawa, Eiji Okamoto, Hiroyuki Tsuji, Amane Miura:
Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters. ICOIN 2019: 103-107 - [c142]Yoshihiro Masuda, Eiji Okamoto, Keita Ito, Tetsuya Yamamoto:
An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation. ICOIN 2019: 136-140 - [c141]Keita Ito, Yoshihiro Masuda, Eiji Okamoto:
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding. ICOIN 2019: 262-267 - [c140]Yusaku Shiomitsu, Eiji Okamoto, Manabu Mikami, Hitoshi Yoshino:
Poster: Effective frame configuration of 5G URLLC using open-loop HARQ for autonomous driving. VNC 2019: 1-2 - 2018
- [j65]Naoto Horiike, Eiji Okamoto
, Tetsuya Yamamoto:
A downlink non-orthogonal multiple access scheme having physical layer security. EURASIP J. Wirel. Commun. Netw. 2018: 205 (2018) - [j64]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto:
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption. J. Internet Serv. Inf. Secur. 8(4): 37-56 (2018) - [c139]Kengo Sasaki, Eiji Okamoto:
A Study on Indoor Dimming Method Utilizing Outside Light for Power Saving. APSIPA 2018: 1847-1852 - [c138]Naoto Horiike, Hiroki Kitagawa, Eiji Okamoto
, Tetsuya Yamamoto:
Chaos MIMO-based downlink non-orthogonal multiple access scheme with physical layer security. CCNC 2018: 1-7 - [c137]Eiji Okamoto, Naoto Horiike, Tetsuya Yamamoto:
Large-Scale Grant-Free Sparse Chaos Code Multiple Access Scheme for 5G IoT. VTC Fall 2018: 1-5 - [i32]Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto:
A k-out-of-n Ring Signature with Flexible Participation for Signers. IACR Cryptol. ePrint Arch. 2018: 728 (2018) - 2017
- [j63]Kazumasa Shinagawa, Takaaki Mizuki
, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Card-Based Protocols Using Regular Polygon Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1900-1909 (2017) - [j62]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2991-3006 (2017) - [j61]Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate:
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures. Int. J. Appl. Cryptogr. 3(4): 394-406 (2017) - [j60]Hiroki Kitagawa, Eiji Okamoto
:
Performance improvement of non-orthogonal multiple access scheme using code division multiplexing. Int. J. Distributed Sens. Networks 13(11) (2017) - [j59]Nuray At, Jean-Luc Beuchat
, Eiji Okamoto, Ismail San
, Teppei Yamazaki:
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl. J. Parallel Distributed Comput. 106: 106-120 (2017) - [c136]Naoto Horiike, Eiji Okamoto
, Tetsuya Yamamoto:
Performance improvement of multi-user chaos MIMO transmission scheme using dirty paper coding. APCC 2017: 1-6 - [c135]Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide, Eiji Okamoto:
One-time Programs with Cloud Storage and Its Application to Electronic Money. APKC@AsiaCCS 2017: 25-30 - [c134]Naoto Horiike, Eiji Okamoto
, Tetsuya Yamamoto:
Performance improvement of chaos MIMO transmission scheme by LDPC code concatenation using symbol MAP detection and STBC. ICOIN 2017: 200-205 - [c133]Hiroki Kitagawa, Eiji Okamoto
:
Performance improvement of non-orthogonal multiple access scheme using code division multiplexing. ICOIN 2017: 327-331 - [c132]Tomohiro Akiyoshi, Eiji Okamoto
, Hiroyuki Tsuji, Amane Miura:
Performance improvement of satellite/terrestrial integrated mobile communication system using unmanned aerial vehicle cooperative communications. ICOIN 2017: 417-422 - [c131]Eiji Okamoto
, Hiraku Okada, Yoshinao Ishii
, Satoshi Makido:
Performance Improvement of Low-Latency V2I Uplink Using Superposed Cooperative V2V Transmission. VTC Fall 2017: 1-5 - [c130]Eiji Okamoto
, Naoto Horiike, Tetsuya Yamamoto:
Sparse chaos code multiple access scheme achieving larger capacity and physical layer security. WPMC 2017: 604-610 - 2016
- [j58]Kazumasa Shinagawa, Takaaki Mizuki
, Jacob C. N. Schuldt, Koji Nuida
, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Secure Computation Protocols Using Polarizing Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1122-1131 (2016) - [j57]Hidekazu Murata, Eiji Okamoto, Manabu Mikami, Akihiro Okazaki, Satoshi Suyama, Takamichi Inoue, Jun Mashino, Tetsuya Yamamoto, Makoto Taromaru:
Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan. IEICE Trans. Commun. 99-B(8): 1638-1647 (2016) - [j56]Eiji Okamoto, Hiroyuki Tsuji:
Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites. IEICE Trans. Commun. 99-B(10): 2146-2155 (2016) - [j55]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions. J. Inf. Process. 24(2): 275-291 (2016) - [j54]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability. J. Inf. Process. 24(5): 764-771 (2016) - [c129]Kazumasa Shinagawa, Koji Nuida
, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Size-Hiding Computation for Multiple Parties. ASIACRYPT (2) 2016: 937-966 - [c128]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim:
Revocable Decentralized Multi-Authority Functional Encryption. INDOCRYPT 2016: 248-265 - [c127]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Committed AND protocol using three cards with more handy shuffle. ISITA 2016: 700-702 - [c126]Eiji Okamoto, Keisuke Kunitomo, Hidenori Akita, Takuma Kyo:
A Cooperative V2I Uplink Transmission Scheme Utilizing V2V Network Coding. VTC Spring 2016: 1-5 - [e8]Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu:
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9543, Springer 2016, ISBN 978-3-319-29813-9 [contents] - 2015
- [j53]Eiji Okamoto, Yuma Inaba:
A Chaos MIMO Transmission Scheme Using Turbo Principle for Secure Channel-Coded Transmission. IEICE Trans. Commun. 98-B(8): 1482-1491 (2015) - [j52]Manato Horiba, Eiji Okamoto, Toshiko Shinohara, Katsuhiko Matsumura:
An Accurate Indoor-Localization Scheme with NLOS Detection and Elimination Exploiting Stochastic Characteristics. IEICE Trans. Commun. 98-B(9): 1758-1767 (2015) - [j51]Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. J. Inf. Process. 23(5): 613-622 (2015) - [c125]Hidekazu Murata, Eiji Okamoto, Manabu Mikami, Akihiro Okazaki, Satoshi Suyama, Takamichi Inoue, Jun Mashino, Tetsuya Yamamoto, Makoto Taromaru:
R&D activities for 5G in IEICE technical committee on radio communication systems. APCC 2015: 250-256 - [c124]Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation. AsiaJCIS 2015: 77-84 - [c123]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. AsiaJCIS 2015: 112-123 - [c122]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. ICITCS 2015: 1-4 - [c121]Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of a Pairing Function for Public Key Cryptosystems. ICITCS 2015: 1-5 - [c120]Manato Horiba, Eiji Okamoto, Toshiko Shinohara, Katsuhiko Matsumura:
An improved NLOS detection scheme using stochastic characteristics for indoor localization. ICOIN 2015: 478-482 - [c119]Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. INTRUST 2015: 32-48 - [c118]Kazumasa Shinagawa, Takaaki Mizuki
, Jacob C. N. Schuldt, Koji Nuida
, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. IWSEC 2015: 281-297 - [c117]Kazumasa Shinagawa, Takaaki Mizuki
, Jacob C. N. Schuldt, Koji Nuida
, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. ProvSec 2015: 127-146 - [c116]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. SECRYPT 2015: 39-52 - [c115]Eiji Okamoto:
An Improved Proportional Fair Scheduling in Downlink Non-Orthogonal Multiple Access System. VTC Fall 2015: 1-5 - 2014
- [j50]Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya
, Shigenori Uchiyama:
Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 300-302 (2014) - [j49]Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto:
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles. J. Inf. Process. 22(2): 366-375 (2014) - [j48]Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Transparent Probabilistic Packet Marking. J. Inf. Process. 22(4): 609-616 (2014) - [j47]Yang Liu, Naoki Kanayama, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama, Eiji Okamoto:
Computing fixed argument pairings with the elliptic net algorithm. JSIAM Lett. 6: 69-72 (2014) - [j46]Simon Kramer
, Rajeev Goré, Eiji Okamoto:
Computer-aided decision-making with trust relations and trust domains (cryptographic applications). J. Log. Comput. 24(1): 19-54 (2014) - [j45]Nuray At, Jean-Luc Beuchat
, Eiji Okamoto, Ismail San
, Teppei Yamazaki:
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(2): 485-498 (2014) - [c114]Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. AsiaJCIS 2014: 31-38 - [c113]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
A CDH-based ordered multisignature scheme in the standard model with better efficiency. ISITA 2014: 236-240 - [c112]Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
A Short Fail-Stop Signature Scheme from Factoring. ProvSec 2014: 309-316 - [c111]Sanami Nakagawa, Keita Emura
, Goichiro Hanaoka
, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
:
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. TrustCom 2014: 565-574 - 2013
- [j44]Yuta Koshimizu, Eiji Okamoto:
An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding. IEICE Trans. Commun. 96-B(8): 2119-2130 (2013) - [j43]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. J. Inf. Process. 21(4): 632-639 (2013) - [j42]Xun Yi, Eiji Okamoto:
Practical Internet voting system. J. Netw. Comput. Appl. 36(1): 378-387 (2013) - [c110]Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
A Device for Transparent Probabilistic Packet Marking. COMPSAC Workshops 2013: 242-247 - [c109]Yoshinori Mitamura, Tetsuya Yano, Eiji Okamoto:
A magnetic fluid seal for rotary blood pumps: Image and computational analyses of behaviors of magnetic fluids. EMBC 2013: 663-666 - [c108]Eiji Okamoto, Sakiko Kikuchi, Yoshinori Mitamura:
Evaluation of titanium mesh electrode using for transcutaneous intrabody communication by tissue-electrode impedance. EMBC 2013: 667-670 - [c107]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. ISC 2013: 367-377 - [c106]Akihisa Tanaka, Eiji Okamoto, Hiroyuki Tsuji, Yoshiyuki Fujino:
Interference-aware weighting scheme for satellite/terrestrial integrated mobile communication system. IWCMC 2013: 1803-1808 - [c105]Yusuke Niwa, Akira Kanaoka, Eiji Okamoto:
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure. NBiS 2013: 105-112 - [c104]Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, Eiji Okamoto:
Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three. Pairing 2013: 97-112 - [i31]Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA. IACR Cryptol. ePrint Arch. 2013: 113 (2013) - 2012
- [j41]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 70-88 (2012) - [j40]Naoki Ogura, Shigenori Uchiyama, Naoki Kanayama, Eiji Okamoto:
A Note on the Pairing Computation Using Normalized Miller Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 196-203 (2012) - [j39]Yoshitoshi Yamashita, Eiji Okamoto, Yasunori Iwanami, Yozo Shoji, Morio Toyoshima, Yoshihisa Takayama:
A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective Coding Scheme. IEICE Trans. Commun. 95-B(1): 254-262 (2012) - [j38]Eiji Okamoto:
A Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security. IEICE Trans. Commun. 95-B(4): 1384-1392 (2012) - [j37]Kazutaka Fukuda, Eiji Okamoto:
Performance Improvement of IMR-Based NLOS Detection in Indoor Ultra Wide-Band TOA Localization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1658-1666 (2012) - [j36]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54 (2012) - [j35]Sk. Md. Mizanur Rahman
, M. Anwar Hossain
, Hussein T. Mouftah, Abdulmotaleb El-Saddik, Eiji Okamoto:
Chaos-cryptography based privacy preservation technique for video surveillance. Multim. Syst. 18(2): 145-155 (2012) - [j34]Naoki Kanayama, Eiji Okamoto:
Approach to Pairing Inversions Without Solving Miller Inversion. IEEE Trans. Inf. Theory 58(2): 1248-1253 (2012) - [c103]Kazutaka Fukuda, Eiji Okamoto:
Performance improvement of TOA localization using IMR-based NLOS detection in sensor networks. ICOIN 2012: 13-18 - [c102]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Discovery of Unexpected Services and Communication Paths in Networked Systems. SafeConfig 2012: 169-178 - [c101]Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto:
Tracing Advanced Persistent Threats in Networked Systems. SafeConfig 2012: 179-187 - [c100]Xun Yi, Raylin Tso, Eiji Okamoto:
Identity-based Password-Authenticated Key Exchange for Client/Server Model. SECRYPT 2012: 45-54 - [c99]Yuta Koshimizu, Eiji Okamoto:
An Effective Channel Estimation Scheme for Bi-Directional Two-Timeslot OFDM Relay Transmission Using Analog Network Coding. VTC Spring 2012: 1-5 - [i30]Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl. IACR Cryptol. ePrint Arch. 2012: 535 (2012) - 2011
- [j33]Naoki Kanayama, Tadanori Teruya
, Eiji Okamoto:
Scalar Multiplication on Pairing Friendly Elliptic Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1285-1292 (2011) - [j32]Yasuhiro Fuwa, Eiji Okamoto, Yasunori Iwanami:
An Effective Downlink Resource Allocation Scheme Based on MIMO-OFDMA-CDM in Cellular System. IEICE Trans. Commun. 94-B(12): 3550-3558 (2011) - [j31]Jean-Luc Beuchat
, Eiji Okamoto, Teppei Yamazaki:
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO. J. Cryptogr. Eng. 1(2): 101-121 (2011) - [j30]Jean-Luc Beuchat
, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez:
Fast Architectures for the \eta_T Pairing over Small-Characteristic Supersingular Elliptic Curves. IEEE Trans. Computers 60(2): 266-281 (2011) - [c98]Xun Yi
, Eiji Okamoto:
Practical Remote End-to-End Voting Scheme. EGOVIS 2011: 386-400 - [c97]Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, Eiji Okamoto:
32-bit as Number Based IP Traceback. IMIS 2011: 628-633 - [c96]Naoto Yanai, Raylin Tso
, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. INCoS 2011: 662-667 - [c95]Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto:
Cryptographic Pairings Based on Elliptic Nets. IWSEC 2011: 65-78 - [c94]Alberto Moreno, Eiji Okamoto:
BlueSnarf Revisited: OBEX FTP Service Directory Traversal. Networking Workshops 2011: 155-166 - [c93]Sk. Md. Mizanur Rahman
, Md. Mehedi Masud
, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Cryptographic security models for eHealth P2P database management systems network. PST 2011: 164-173 - [c92]Xun Yi, Raylin Tso, Eiji Okamoto:
Three-party Password-authenticated Key Exchange without Random Oracles. SECRYPT 2011: 15-24 - [c91]Eiji Okamoto:
A Chaos MIMO Transmission Scheme for Secure Communications on Physical Layer. VTC Spring 2011: 1-5 - [c90]Eiji Okamoto, Hiroyuki Tsuji, Yoshiyuki Fujino:
Performance improvement of OFDMA cellular system using code division multiplexing in satellite/terrestrial integrated mobile communication system. WPMC 2011: 1-5 - [c89]Yuya Takahashi, Yasunori Iwanami, Eiji Okamoto:
A comparative study on MIMO MLSE turbo equalizer on frequency selective channels. WPMC 2011: 1-5 - [i29]Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki:
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO. IACR Cryptol. ePrint Arch. 2011: 78 (2011) - [i28]Simon Kramer, Rajeev Goré, Eiji Okamoto:
Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications. IACR Cryptol. ePrint Arch. 2011: 235 (2011) - 2010
- [j29]Jean-Luc Beuchat
, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [j28]Anton Romanov, Eiji Okamoto:
Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study. IEICE Trans. Commun. 93-B(6): 1411-1421 (2010) - [j27]Takashi Kozawa, Yasunori Iwanami, Eiji Okamoto, Ryota Yamada, Naoki Okamoto:
An Evaluation on Throughput Performance for Type II Hybrid-ARQ Using Non-binary Rate-Compatible-Punctured LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2089-2091 (2010) - [j26]Satoshi Nakanobu, Yasunori Iwanami, Eiji Okamoto:
A Comparative Study on Time Domain Sequential Equalizer with MLD and MLSE Equalizer on MIMO Frequency Selective Channels. IEICE Trans. Commun. 93-B(11): 3197-3202 (2010) - [j25]Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Strongly unforgeable ID-based signatures without random oracles. Int. J. Appl. Cryptogr. 2(1): 35-45 (2010) - [j24]Anton Romanov, Hiroe Tsubaki, Eiji Okamoto:
An Approach to Perform Quantitative Information Security Risk Assessment in IT Landscapes. J. Inf. Process. 18: 213-226 (2010) - [j23]Simon Kramer, Rajeev Goré, Eiji Okamoto:
Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography. SIGACT News 41(1): 75-98 (2010) - [c88]Raylin Tso
, Xun Yi, Tadahiko Ito, Takeshi Okamoto, Eiji Okamoto:
Design and Analysis of "Flexible" k-out-of-n Signatures. ATC 2010: 255-267 - [c87]Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. Inscrypt 2010: 1-17 - [c86]