Follow
Kazumasa Omote
Kazumasa Omote
Verified email at risk.tsukuba.ac.jp
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
Information Security Practice and Experience: 5th International Conference …, 2009
4042009
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
3542009
Device and method for worm detection, and computer product
K Omote, S Torii
US Patent App. 10/812,622, 2005
2842005
A practical English auction with one-time registration
K Omote, A Miyaji
Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001
872001
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
802013
Generic constructions of secure‐channel free searchable encryption with adaptive security
K Emura, A Miyaji, MS Rahman, K Omote
Security and communication networks 8 (8), 1547-1560, 2015
512015
Malware function classification using apis in initial behavior
N Kawaguchi, K Omote
2015 10th Asia Joint Conference on Information Security, 138-144, 2015
502015
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root
K Omote, A Miyaji
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
492003
An approach to detect remote access trojan in the early stage of communication
D Jiang, K Omote
2015 IEEE 29th international conference on advanced information networking …, 2015
462015
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied Cryptography 2 (1), 46-59, 2010
462010
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
K Emura, A Miyaji, K Omote
Information and Media Technologies 4 (4), 1060-1075, 2009
452009
Network intrusion detection based on semi-supervised variational auto-encoder
G Osada, K Omote, T Nishide
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
402017
An anonymous auction protocol with a single non-trusted center using binary trees
K Omote, A Miyaji
Information Security: Third International Workshop, ISW 2000 Wollongong …, 2000
312000
Recording medium recording a network shutdown control program, and network shutdown device
M Komura, K Omote, Y Higashikado, M Mitomo, B Noda, S Torii
US Patent 7,564,837, 2009
292009
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
282015
A timed-release proxy re-encryption scheme
K Emura, A Miyaji, K Omote
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011
282011
Toward achieving anonymous nft trading
Z Chen, K Omote
IEEE Access 10, 130166-130176, 2022
262022
Machine-learning approach using solidity bytecode for smart-contract honeypot detection in the ethereum
K Hara, T Takahashi, M Ishimaki, K Omote
2021 IEEE 21st International Conference on Software Quality, Reliability and …, 2021
222021
Threat analysis of poisoning attack against ethereum blockchain
T Sato, M Imamura, K Omote
Information Security Theory and Practice: 13th IFIP WG 11.2 International …, 2020
212020
Optimizing share size in efficient and robust secret sharing scheme for big data
TP Thao, MS Rahman, MZA Bhuiyan, A Kubota, S Kiyomoto, K Omote
IEEE Transactions on Big Data 7 (4), 703-716, 2017
202017
The system can't perform the operation now. Try again later.
Articles 1–20