A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, A Nomura, K Omote, M Soshi Information Security Practice and Experience: 5th International Conference …, 2009 | 396 | 2009 |
Bitvisor: a thin hypervisor for enforcing i/o device security T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ... Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009 | 345 | 2009 |
Device and method for worm detection, and computer product K Omote, S Torii US Patent App. 10/812,622, 2005 | 282 | 2005 |
A practical English auction with one-time registration K Omote, A Miyaji Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001 | 87 | 2001 |
Group signatures with message-dependent opening Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 75 | 2013 |
Generic constructions of secure‐channel free searchable encryption with adaptive security K Emura, A Miyaji, MS Rahman, K Omote Security and communication networks 8 (8), 1547-1560, 2015 | 50 | 2015 |
Malware function classification using apis in initial behavior N Kawaguchi, K Omote 2015 10th Asia Joint Conference on Information Security, 138-144, 2015 | 49 | 2015 |
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root K Omote, A Miyaji Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003 | 49 | 2003 |
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, K Omote, A Nomura, M Soshi International Journal of Applied Cryptography 2 (1), 46-59, 2010 | 46 | 2010 |
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics K Emura, A Miyaji, K Omote Information and Media Technologies 4 (4), 1060-1075, 2009 | 45 | 2009 |
An approach to detect remote access trojan in the early stage of communication D Jiang, K Omote 2015 IEEE 29th international conference on advanced information networking …, 2015 | 43 | 2015 |
Network intrusion detection based on semi-supervised variational auto-encoder G Osada, K Omote, T Nishide Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 37 | 2017 |
An anonymous auction protocol with a single non-trusted center using binary trees K Omote, A Miyaji Information Security: Third International Workshop, ISW 2000 Wollongong …, 2000 | 31 | 2000 |
Recording medium recording a network shutdown control program, and network shutdown device M Komura, K Omote, Y Higashikado, M Mitomo, B Noda, S Torii US Patent 7,564,837, 2009 | 29 | 2009 |
A timed-release proxy re-encryption scheme K Emura, A Miyaji, K Omote IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011 | 28 | 2011 |
Secure and anonymous communication technique: Formal model and its prototype implementation K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015 | 27 | 2015 |
Toward achieving anonymous nft trading Z Chen, K Omote IEEE Access 10, 130166-130176, 2022 | 20 | 2022 |
Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ... 2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230, 2008 | 20 | 2008 |
Optimizing share size in efficient and robust secret sharing scheme for big data TP Thao, MS Rahman, MZA Bhuiyan, A Kubota, S Kiyomoto, K Omote IEEE Transactions on Big Data 7 (4), 703-716, 2017 | 19 | 2017 |
A host-based detection method of remote access trojan in the early stage D Adachi, K Omote Information Security Practice and Experience: 12th International Conference …, 2016 | 19 | 2016 |