关注
Kazumasa Omote
Kazumasa Omote
在 risk.tsukuba.ac.jp 的电子邮件经过验证
标题
引用次数
引用次数
年份
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
Information Security Practice and Experience: 5th International Conference …, 2009
3962009
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
3452009
Device and method for worm detection, and computer product
K Omote, S Torii
US Patent App. 10/812,622, 2005
2822005
A practical English auction with one-time registration
K Omote, A Miyaji
Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001
872001
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
752013
Generic constructions of secure‐channel free searchable encryption with adaptive security
K Emura, A Miyaji, MS Rahman, K Omote
Security and communication networks 8 (8), 1547-1560, 2015
502015
Malware function classification using apis in initial behavior
N Kawaguchi, K Omote
2015 10th Asia Joint Conference on Information Security, 138-144, 2015
492015
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root
K Omote, A Miyaji
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
492003
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied Cryptography 2 (1), 46-59, 2010
462010
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
K Emura, A Miyaji, K Omote
Information and Media Technologies 4 (4), 1060-1075, 2009
452009
An approach to detect remote access trojan in the early stage of communication
D Jiang, K Omote
2015 IEEE 29th international conference on advanced information networking …, 2015
432015
Network intrusion detection based on semi-supervised variational auto-encoder
G Osada, K Omote, T Nishide
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
372017
An anonymous auction protocol with a single non-trusted center using binary trees
K Omote, A Miyaji
Information Security: Third International Workshop, ISW 2000 Wollongong …, 2000
312000
Recording medium recording a network shutdown control program, and network shutdown device
M Komura, K Omote, Y Higashikado, M Mitomo, B Noda, S Torii
US Patent 7,564,837, 2009
292009
A timed-release proxy re-encryption scheme
K Emura, A Miyaji, K Omote
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011
282011
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
272015
Toward achieving anonymous nft trading
Z Chen, K Omote
IEEE Access 10, 130166-130176, 2022
202022
Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers
M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ...
2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230, 2008
202008
Optimizing share size in efficient and robust secret sharing scheme for big data
TP Thao, MS Rahman, MZA Bhuiyan, A Kubota, S Kiyomoto, K Omote
IEEE Transactions on Big Data 7 (4), 703-716, 2017
192017
A host-based detection method of remote access trojan in the early stage
D Adachi, K Omote
Information Security Practice and Experience: 12th International Conference …, 2016
192016
系统目前无法执行此操作,请稍后再试。
文章 1–20