顔写真

PHOTO

Inomata Atsuo
猪俣 敦夫
Inomata Atsuo
猪俣 敦夫
Office for Information Security, Professor

Research History 8

  1. 2019/04 - Present
    Ritsumeikan University Research Organization of Science and Technology Visiting Professor

  2. 2019/04 - Present
    Osaka universitiy Cybermedia Center Professor

  3. 2016/04 - Present
    JPCERT Coordination Center Director

  4. 2015/04 - Present
    Wireless LAN Certification Organization Representative Director

  5. 2016/04 - 2019/03
    Nara Institute of Science and Technology Graduate of Information Science Visiting Professor

  6. 2016/04 - 2019/03
    Tokyo Denki University School of science and technology for future life Professor

  7. 2008/03 - 2016/03
    Nara Institute of Science and Technology Graduate School of Information Science Associate Professor

  8. 2004/04 - 2008/02
    Japan Science and Technology Agency Research Institute of Science and Technology for Society Researcher

Education 1

  1. Japan Advanced Institute of Science and Technology

    1999/04 - 2002/06

Committee Memberships 8

  1. 大阪府警察 サイバーセキュリティアドバイザ Municipal

    2021/04 - Present

  2. 阪急阪神HD株式会社 サイバーセキュリティアドバイザ Other

    2021/04 - Present

  3. 株式会社カプコン セキュリティ監督委員会 Other

    2020/12 - Present

  4. 奈良県警察 サイバーセキュリティ対策アドバイザー Municipal

    2019/08 - Present

  5. 電子情報通信学会情報セキュリティ研究会(ISEC) 幹事補佐 Academic society

    2016/04/01 - Present

  6. ベネッセHD株式会社 情報セキュリティ監視委員会 Other

    2014/10 - Present

  7. 情報処理学会セキュリティ心理学とトラスト研究会(SPT) 専門委員 Academic society

    2014/04/01 - Present

  8. 情報処理学会コンピュータセキュリティ研究会(CSEC) 運営委員 Academic society

    2014/04/01 - Present

Professional Memberships 2

  1. IEICE

  2. 情報処理学会

Research Areas 1

  1. Informatics / Information security /

Awards 6

  1. IEICE ICSS2021 Research Award

    Masahiro IIDA, Mitsuaki Akiyama, Masaki Kamizono, Takahiro Kasama, Yuichi Hattori, Hiroyuki Inoue, Atsuo Inomata IEICE 2022/06

  2. 18th Security Best Award

    Atsuo INOMATA Institute of Information Security 2022/02

  3. Best paper award on CSS2021

    Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori IPSJ 2021/10

  4. Award of ICSS 2020 IEICE

    Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori IEICE 2021/06

  5. 2014 Asia-Pacific Information Security Leadership Achievements

    (ISC)2 2014/07

  6. Paper Award for IPSJ

    Information Processing Society of Japan 2006/06

Papers 82

  1. 同一運用元によるOnionサイトの類型化と運用モチベーションの推定

    木村 悠生, 石川 琉聖, 穐山 空道, 猪俣 敦夫, 上原 哲太郎

    情報処理学会IOT研究会予稿集 Vol. IOT8 2025/03 Research paper (conference, symposium, etc.)

  2. 未知の攻撃に対するMQTTブローカーの2段階分類侵入検知モデル

    宮澤昌子, 橋本俊甫, 中山崇嗣, 井上博之, 猪俣敦夫

    電子情報通信学会IA研究会予稿集 Vol. IS2024 No. 85 p. 118-123 2025/03 Research paper (conference, symposium, etc.)

  3. FALCONを用いた量子耐性ブロックチェーンのトランザクションサイズ削減に関する検討

    中西 陽路, 橋本 俊甫, 中山 崇嗣, 井上 博之, 猪俣 敦夫

    暗号と情報セキュリティシンポジウム(SCIS2025)予稿集 No. 4A2-4 2025/01 Research paper (conference, symposium, etc.)

  4. セキュリティ教育用ビデオゲームに向けた大規模言語モデルを活用した分析手法

    新井 美音, 矢内 直人, 猪俣 敦夫, 花岡 悟一郎

    暗号と情報セキュリティシンポジウム(SCIS2025)予稿集 No. 3F4-3 2025/01 Research paper (conference, symposium, etc.)

  5. A New Authentication ID Supporting Digital Transformation—Progress Report on OUID System Construction

    Matsumoto Satoru, Haraguchi Naohiro, Ohira Kenji, Hiromori Akihito, Yarimizu Toru, Inomata Atsuo

    Journal for Academic Computing and Networking Vol. 28 No. 1 p. 16-22 2024/11/20

    Publisher: Academic eXcange for Information Environment and Strategy
  6. セキュリティ教育用ビデオゲームにおけるテーマに関する体系調査

    コンピュータセキュリティシンポジウム(CSS2024)予稿集 No. 2D2-4 2024/10 Research paper (conference, symposium, etc.)

  7. Onion Domain

    Yusei Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara

    Vol. IOT2023 2024/03 Research paper (conference, symposium, etc.)

  8. Proposal of Moving Target Defense (MTD) makes attackers' information obsolete by dynamically

    Mamoru Saita, Shunsuke Hashimoto, Atsuo Inomata, Hiroyuki Inoue

    Vol. ICSS2023 No. 82 p. 93-99 2024/03 Research paper (conference, symposium, etc.)

  9. Discussion of possiblity for collection fingerprint and identifying the ordinal operation on Onion Service

    Yusei Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara

    Vol. 2023-SPT-50(38) p. 1-6 2024/03 Research paper (conference, symposium, etc.)

  10. Backdoor Attacks by Leveraging Latent Representation in Competitive Learning for Resistance to Removal

    Kazuki IWAHANA, Naoto YANAI, Atsuo INOMATA, Toru FUJIWARA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2024 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  11. ASPA

    Yusho Yamaguchi, Taiji Kimura, Naoto Yanai, Atsuo Inomata

    Vol. IA2023 No. 40 p. 25-32 2023/11 Research paper (conference, symposium, etc.)

  12. On Collecting Onion Server Fingerprints and Identification of Their Operators.

    Yuuki Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara

    Proc. of IEEE Reliability conference QRS 2023 p. 540-548 2023/10 Research paper (international conference proceedings)

  13. Design of the electric phiysical stamp on authentication infrastructure for DNS and IBE

    Hyuga Yamamoto, Atsuo Inomata, Tetsutaro Uehara

    Vol. 2023-SPT-50(32) p. 1-6 2023/03 Research paper (conference, symposium, etc.)

  14. Verification for the attack to notice inforamation by Password recover of web service and its countermeasure

    Ryusei Ishikawa, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara

    Vol. 2023-SPT-50(21) p. 1-6 2023/03 Research paper (conference, symposium, etc.)

  15. Field survey to utilize and apply the public Wi-Fi service to the campus network -in Covid-19 pandemic 2 years-

    Atsuo Inomata, Shinji Shimojo, Madoka Aihara

    IPSJ, Proc. of IoT Symposium2022 p. 17-24 2022/12/01 Research paper (conference, symposium, etc.)

  16. Personal Identification by Keyboard Input and Mouse Operation Information Using Deep Learning

    Yuuki Kimura, Atsuo Inomata, Tetsutaro Uehara

    p. 493-499 2022/10 Research paper (conference, symposium, etc.)

  17. Detection of vulnerable OAuth2.0 implementations by browser extensions

    Shingo Kunihiro, Junjun Zheng, Atsuo Inomata, Tetsutarou Uehara

    Vol. 2022-IOT-58(5) p. 1-8 2022/07 Research paper (conference, symposium, etc.)

  18. On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.

    Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori

    Proceedings on Privacy Enhancing Technologies Vol. 2022 No. 4 p. 140-161 2022 Research paper (scientific journal)

  19. Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code

    Hoang Viet Nguyen, Junjun Zheng, Atsuo Inomata, Tetsutaro Uehara

    IEEE Access Vol. 10 p. 123786-123800 2022 Research paper (scientific journal)

    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
  20. BERTモデルを用いたキーボード打鍵音による入力推定攻撃とその対策

    飯田 雅裕, 秋山 満昭, 神薗 雅紀, 笠間 貴弘, 服部 祐一, 井上 博之, 猪俣 敦夫

    情報処理学会研究報告セキュリティ心理学とトラスト(SPT) Vol. 2022-SPT-46 No. 17 p. 1-6 2022/01 Research paper (conference, symposium, etc.)

  21. Understanding the Risks of Re-identification Attack on Tracing Frameworks and its Countermeasures

    Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori

    2021/10 Research paper (conference, symposium, etc.)

  22. Migrating to Zero Trust Architecture: Reviews and Challenges

    Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata

    Security and Communication Networks Vol. 2021 p. 1-10 2021/05/25 Research paper (scientific journal)

    Publisher: Hindawi Limited
  23. Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA

    Daiki Yamakawa, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara

    Security and Communication Networks Vol. 2021 p. 1-14 2021/02/16 Research paper (scientific journal)

    Publisher: Hindawi Limited
  24. A Secure Cloud-centric IoT Framework for Smart Device Registration

    Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata

    Journal of Information Processing Vol. 29 p. 381-391 2021/01 Research paper (scientific journal)

  25. Can the Exposure Notification Framework Expose Personal Information

    Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori

    Proc. of The Network and Distributed System Security Symposium (NDSS) 2021 2021 Research paper (international conference proceedings)

  26. The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing

    Hoang Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara

    Proceedings of the 7th International Conference on Information Systems Security and Privacy p. 440-449 2021 Research paper (international conference proceedings)

    Publisher: SCITEPRESS - Science and Technology Publications
  27. The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection

    Hai Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara

    Proceedings of the 7th International Conference on Information Systems Security and Privacy p. 109-120 2021 Research paper (international conference proceedings)

    Publisher: SCITEPRESS - Science and Technology Publications
  28. API グループ間の相関性とフォルダ操作頻度に基づくマルウェア分類手法の提案

    周家興, 廣瀬幸, 柿崎淑郎, 猪俣敦夫, 寺田真敏

    情報処理学会論文誌 Vol. 61 No. 12 p. 1792-1801 2020/12 Research paper (scientific journal)

  29. Evaluation to Classify Ransomware Variants based on Correlations between APIs.

    Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata

    Proceedings of the 6th International Conference on Information Systems Security and Privacy(ICISSP) p. 465-472 2020/02 Research paper (international conference proceedings)

    Publisher: SCITEPRESS
  30. Wireless Access Point Spoofing by Unmanned Aerial Vehicles (UAVs)

    Ryota Kawakami, Atsuo Inomata, Naoto Yanai, Toru Fujiwara

    Proc. of The Network and Distributed System Security Symposium (NDSS) 2020, poster (2020-02). 2020/02 Research paper (international conference proceedings)

  31. エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知

    石井 将大, 宇野 真純, 猪俣 敦夫, 新井 イスマイル, 藤川 和利

    電子情報通信学会論文誌 Vol. J1010-B No. 3 p. 220-232 2018/03 Research paper (scientific journal)

  32. Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM

    Masahiro Ishii, Jeremie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa

    IEEE TRANSACTIONS ON COMPUTERS Vol. 66 No. 12 p. 2019-2030 2017/12 Research paper (scientific journal)

  33. Proposal of Hardware Device Model for IoT Endpoint Security and Its Implementation

    Ryota Jinnai, Atsuo Inomata, Ismail Arai, Kazutoshi Fujikawa

    2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS) 2017 Research paper (international conference proceedings)

  34. A weil pairing on a family of genus 2 hyperelliptic curves with efficiently computable automorphisms

    Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E100A No. 1 p. 62-72 2017/01/01 Research paper (international conference proceedings)

    Publisher: Maruzen Co., Ltd.
  35. A construction of a twisted ate pairing on a family of kawazoe-Takahashi curves at 192-bit security level and its cost estimate

    Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa

    ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy p. 432-439 2016 Research paper (international conference proceedings)

    Publisher: SciTePress
  36. A vehicle clustering algorithm for information propagation by inter-vehicle communications

    Naohiro Washio, Satoshi Matsuura, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa

    2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 p. 111-116 2015/06/24 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  37. Dynamic Division and Reassignment Method for Publish/Subscribe System

    福井 達也, 松浦 正尚, 松浦 知史, 猪俣 敦夫, 藤川 和利

    情報処理学会論文誌 Vol. 55 No. 1 p. 289-299 2014/01 Research paper (scientific journal)

    Publisher: 情報処理学会
  38. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 Geo Networking

    Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara

    IEICE TRANSACTIONS ON COMMUNICATIONS Vol. E96B No. 7 p. 1706-1715 2013/07 Research paper (scientific journal)

  39. Cryptography Compromising Risk Changes with the Cloud Computing Times

    INOMATA,Atsuo, OKAMOTO,Eiji

    Computer Software Vol. 30 No. 2 p. 14-22 2013/04 Research paper (scientific journal)

    Publisher: Japan Society for Software Science and Technology
  40. Vehicle clustering algorithm for sharing information on traffic congestion

    Yohei Kanemaru, Satoshi Matsuura, Masatoshi Kakiuchi, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa

    2013 13th International Conference on ITS Telecommunications, ITST 2013 p. 38-43 2013 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  41. Location tracking prevention with dummy messages for vehicular communications

    Tsubasa Teramoto, Satoshi Matsuura, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa

    2013 13th International Conference on ITS Telecommunications, ITST 2013 p. 56-61 2013 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  42. A two-tier overlay publish/subscribe system for sensor data stream using geographic based load balancing

    Tatsuya Fukui, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa

    Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013 p. 749-756 2013 Research paper (international conference proceedings)

  43. TrafficCam: Sharing traffic information based on dynamic IPv6 multicast group assignment using smartphone sensors

    Yohei Kanemaru, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa

    2013 IEEE 10th Consumer Communications and Networking Conference, CCNC 2013 p. 853-854 2013 Research paper (international conference proceedings)

  44. Design of IT Keys and Its Real Practice Specialist Program to Promote Key Engineers as Security Specialists

    Atsuo Inomata, Satoshi Matsuura, Kenji Ohira, Youki Kadobayashi, Kazutoshi Fujikawa, Hideki Sunahara, Suguru Yamaguchi

    Proceedings of 7th International Conference on Systems and Networks Communications(ICSNC2012) 2012/11 Research paper (international conference proceedings)

  45. Proposal of smooth channel switching mechanism for p2p streaming and its application

    Naomi Terada, Eiji Kominami, Atsuo Inomata, Kazutoshi Fujikawa, Eiji Kawai, Hideki Sunahara

    EUROMEDIA 2012 - 17th Annual Scientific Conference on Web Technology, New Media Communications and Telematics Theory Methods, Tools and Applications p. 73-77 2012 Research paper (international conference proceedings)

    Publisher: EUROSIS
  46. Design and field evaluation of geographical location-aware service discovery on IPv6 GeoNetworking for VANET.

    Satoru Noguchi, Manabu Tsukada, Thierry Ernst, Atsuo Inomata, Kazutoshi Fujikawa

    EURASIP Journal on Wireless Communications and Networking Vol. 2012 p. 29-29 2012 Research paper (scientific journal)

  47. Koshien-cloud: Operations of distributed cloud as a large scale web contents distribution platform

    Yoshihiro Okamoto, Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa

    Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 p. 363-368 2012 Research paper (international conference proceedings)

  48. A divide and merge method for sensor data processing on large-scale Publish/Subscribe systems

    Ryota Miyagi, Satoshi Matsuura, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa

    Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 p. 424-429 2012 Research paper (international conference proceedings)

  49. 3-6 Estimation of the Attack Ability for Cryptography(3. Status of Cryptographic Attacks,<Special Issue>Transition of Cryptographic Algorithms and Social Impacts)

    INOMATA,Atsuo, OKAMOTO,Eiji

    The Journal of the Institute of Electronics, Information, and Communication Engineers Vol. 94 No. 11 p. 993-998 2011/11 Research paper (scientific journal)

    Publisher: The Institute of Electronics, Information and Communication Engineers
  50. Flexible Data Access System Using Application Level Semantics on the Wide Area Network

    IKEBE Minoru, INOMATA Atsuo, FUJIKAWA Kazutoshi, SUNAHARA Hideki

    Computer Software Vol. 28 No. 2 p. 93-104 2011/05 Research paper (scientific journal)

    Publisher: 日本ソフトウェア科学会
  51. MetaFa: Metadata Management System for Flexible Data Access in the Wide Area Network Environments

    池部 実, 猪俣 敦夫, 藤川 和利, 砂原 秀樹

    情報処理学会論文誌 Vol. 52 No. 2 p. 488-506 2011/02 Research paper (scientific journal)

  52. Communication trials for Self-Mutual Help on the emergency situations in ε-ARK

    Atsuo Inomata, Hironobu Suzuki, Yoshiaki Kitaguchi, Hiroyuki Ohno

    2011 IEEE Consumer Communications and Networking Conference, CCNC'2011 p. 848-849 2011 Research paper (international conference proceedings)

    Publisher: IEEE
  53. Experimental research on personal awareness and behavior for information security protection

    Noriaki Yoshikai, Shun-Ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata

    Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011 p. 213-220 2011 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  54. Location-aware service discovery on IPv6 GeoNetworking for VANET

    Satoru Noguchi, Manabu Tsukada, Thierry Ernst, Atsuo Inomata, Kazutoshi Fujikawa

    2011 11th International Conference on ITS Telecommunications, ITST 2011 p. 224-229 2011 Research paper (international conference proceedings)

  55. Proposal and evaluation of a dynamic resource allocation method based on the load of VMs on IaaS

    Atsuo Inomata, Taiki Morikawa, Minoru Ikebe, Yoshihiro Okamoto, Satoru Noguchi, Kazutoshi Fujikawa, Hideki Sunahara, Sk Md. Mizanur Rahman

    2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings 2011 Research paper (international conference proceedings)

  56. Proposal of a solution model for the information security risk based on Protection Motivation Theory and its implementation to high school education

    INOMATA ATSUO, HIGASHI YUKA, UEDA MASASHI, KOMATSU AYAKO, FUJIKAWA KAZUTOSHI, SUNAHARA HIDEKI

    研究報告コンピュータセキュリティ(CSEC) Vol. 2010 No. 12 p. 1-6 2010/05/04

    Publisher: 情報処理学会
  57. 17. Implication of the Cryptography Vulnerability in Our Information Society(<Special Feature>Future Map of Information Processing Technology)

    INOMATA,Atsuo, OKAMOTO,Eiji

    Journal of Information Processing Society of Japan Vol. 51 No. 5 2010/05 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan (IPSJ)
  58. FPGA and ASIC implementations of the eta(T) pairing in characteristic three

    Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto

    COMPUTERS & ELECTRICAL ENGINEERING Vol. 36 No. 1 p. 73-87 2010/01 Research paper (scientific journal)

  59. Proposal of smooth switching mechanism on P2P streaming

    Naomi Terada, Eiji Kominami, Atsuo Inomata, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara

    Advances in Intelligent and Soft Computing Vol. 79 p. 181-184 2010 Research paper (international conference proceedings)

  60. It-Kyes: New lecture style for information security

    Atsuo Inomata, Satoshi Matsuura, Kazutoshi Fujikawa, Hideki Sunahara

    IADIS International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2009 p. 544-545 2009/11 Research paper (international conference proceedings)

  61. Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP

    Jumpei Togashi, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara, Hideki Sunahara

    Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009 p. 70-76 2009/02 Research paper (international conference proceedings)

  62. Uncompressed 4K2K and HD live transmission on global internet

    Masatoshi Kakiuchi, Akira Yutani, Atsuo Inomata, Kazutoshi Fujikawa, Keishi Kandori

    ACM SIGGRAPH ASIA 2009 Posters, SIGGRAPH ASIA '09 2009 Research paper (international conference proceedings)

  63. Total solar eclipse: Fish-eye 4K image transmission experimentation on the internet

    Akira Yutani, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa, Yoshitsugu Manabe, Kunihiro Chihara, Keishi Kandori

    ACM SIGGRAPH ASIA 2009 Posters, SIGGRAPH ASIA '09 2009 Research paper (international conference proceedings)

  64. MetaFa: Metadata management framework for data sharing in data-intensive applications

    Minoru Ikebe, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 5518 No. 2 p. 655-658 2009 Research paper (international conference proceedings)

  65. Efficient Data Management using the Session Log in DHT and its Evaluation

    Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara

    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2 p. 1257-1261 2009 Research paper (international conference proceedings)

  66. Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks

    Sk Md Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto

    SECURITY AND COMMUNICATION NETWORKS Vol. 1 No. 2 p. 179-189 2008/03 Research paper (scientific journal)

  67. Proposal of cryptography-sla and its application against the compromise risk of cryptosystems

    Atsuo Inomata, Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara, Takeshi Okamoto, Eiji Okamoto

    Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications and Visual Communications p. 82-87 2008 Research paper (international conference proceedings)

  68. Distributed Data Access/Find System with Metadata for Data-Intensive Computing

    Minoru Ikebe, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara

    2008 9TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING p. 361-366 2008 Research paper (international conference proceedings)

  69. Private communication and authentication protocol for wireless sensor networks

    Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata

    Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008 2008 Research paper (international conference proceedings)

  70. Implementation of ID-based signature in RFID system

    Piseth Ith, Yoshihito Oyama, Atsuo Inomata, Eiji Okamoto

    2007 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS p. 233-+ 2007 Research paper (international conference proceedings)

  71. Anonymous secure communication in wireless mobile ad-hoc networks

    Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto

    UBIQUITOUS CONVERGENCE TECHNOLOGY Vol. 4412 p. 140-+ 2007 Research paper (international conference proceedings)

  72. Proposal of the Crypto SLA and Its Support Tool against Compromising of Cryptosystems(Networked Services in Social Security Context,<Special Issue>Networked Services to be Placed in the Social Contexts)

    INOMATA,ATSUO, OYAMA,YOSHIHITO, OKAMOTO,EIJI

    Transactions of Information Processing Society of Japan Vol. 48 No. 1 p. 178-188 2007/01 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan (IPSJ)
  73. Broadcast Encryption with Sender Authentication and its Application(Network Security)

    KANAZAWA,FUMIAKI, OKAMOTO,TAKESHI, INOMATA,ATSUO, OKAMOTO,EIJI

    Transactions of Information Processing Society of Japan Vol. 47 No. 11 p. 2992-3004 2006/11 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan (IPSJ)
  74. A-7-4 Ramp Secret Sharing Schemes using Exclusive OR Calculation

    Nagamura,Kensaku, Inomata,Atsuo, Okamoto,Takeshi, Okamoto,Eiji

    Proceedings of the Society Conference of IEICE Vol. 2006 No. 0 2006/09 Research paper (scientific journal)

    Publisher: The Institute of Electronics, Information and Communication Engineers
  75. A-18-7 Development of cryptography SLA supporting tool for cryptography vulnerability risk

    Inomata,Atsuo, Oyama,Yoshihito, Okamoto,Eiji

    Proceedings of the Society Conference of IEICE Vol. 2006 No. 0 2006/09 Research paper (scientific journal)

    Publisher: The Institute of Electronics, Information and Communication Engineers
  76. An anonymous on-demand position-based routing in mobile ad hoc networks

    SMM Rahman, M Mambo, A Inomata, E Okamoto

    INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET , PROCEEDINGS p. 300-+ 2006 Research paper (international conference proceedings)

  77. Learner's privacy enhanced architecture for distance learning

    Atsuo Inomata, Yoshihito Oyama, Satoshi Uda, Takeshi Okamoto, Eiji Okamoto

    Proceedings of the IASTED International Conference on Web-Based Education, WBE 2005 p. 414-418 2005/12/01

  78. A proposal of short proxy signature using pairing

    Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto

    International Conference on Information Technology: Coding and Computing, ITCC Vol. 1 p. 631-635 2005 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  79. A novel mail filtering method against phishing

    Atsuo Inomata, Sk. Md. Mizanur Rahman, Takeshi Okamoto, Eiji Okamoto

    IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings Vol. 2005 p. 221-224 2005 Research paper (international conference proceedings)

  80. Performance evaluation of efficient algorithms for Tate pairing

    Seiichi Matsuda, Atsuo Inomata, Takeshi Okamoto, Eiji Okamoto

    IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings Vol. 2005 p. 657-660 2005 Research paper (international conference proceedings)

  81. L-002 Proposal and evaluation of GRID security environment b designated confirmer proxy signature

    Inomata,Atsuo, Oyama,Yoshihito, Okamoto,Takeshi, Okamoto,Eiji

    情報科学技術フォーラム一般講演論文集 Vol. 3 No. 4 p. 3-6 2004/08 Research paper (scientific journal)

    Publisher: FIT(電子情報通信学会・情報処理学会)推進委員会
  82. Anonymous traceable disclosure scheme using pairing over elliptic curve

    Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto

    ACM International Conference Proceeding Series Vol. 85 p. 48-52 2004 Research paper (international conference proceedings)

Misc. 86

  1. プログラミングコンテストにおけるソースコードの盗作検知手法の実装と評価

    石川琉聖, 服部祐一, 井上博之, 猪俣敦夫

    情報処理学会研究報告セキュリティ心理学とトラスト(SPT) Vol. 2021-SPT-41 No. 13 p. 1-5 2021 Research paper, summary (national, other academic conference)

  2. SoK: A Systematic Survey on Game Genres for Security Education Video Games

    新井美音, 新井美音, 矢内直人, 猪俣敦夫, 花岡悟一郎

    情報処理学会論文誌ジャーナル(Web) Vol. 65 No. 12 2024

  3. 大阪急性期・総合医療センターにおけるサイバー事案から学ぶべきプラス・セキュリティ

    猪俣敦夫

    月刊病院 No. 9月 p. 780-784 2023/09 Article, review, commentary, editorial, etc. (scientific journal)

  4. Exposure Notification Frameworkがもたらすプライバシーリスクの評価と対策

    野本一輝, 秋山満昭, 衛藤将史, 猪俣敦夫, 森達哉

    情報処理学会研究報告セキュリティ心理学とトラスト(SPT) Vol. 2021-SPT-41 No. 11 p. 1-6 2021 Research paper, summary (national, other academic conference)

  5. 解読計算量に基づくLWE暗号の安全性に関する検討

    岡翔子, 國枝義敏, 上原哲太郎, 猪俣敦夫

    情報処理学会研究報告コンピュータセキュリティ(CSEC) Vol. 2021-CSEC-92 No. 33 p. 1-7 2021 Research paper, summary (national, other academic conference)

  6. 属性ベース暗号方式を用いたFIDO2の拡張による代理認証の実現

    大川悠人, 猪俣敦夫, 上原哲太郎

    情報処理学会(SPT)研究会予稿集 Vol. 2020-SPT-36 No. 52 p. 1-8 2020/10 Research paper, summary (national, other academic conference)

  7. スマート家電に適したPKIの運用方法の考察

    山川 大貴, 上原 哲太郎, 猪俣 敦夫

    情報処理学会CSEC研究会予稿集 Vol. 2020-CSEC-88 No. 29 p. 1-8 2020/10

  8. ECHONET Liteのクラス別リスク評価に基づいたセキュリティ対策

    山川大貴, 沖本貴志, 猪俣敦夫, 上原哲太郎

    情報処理学会研究報告コンピュータセキュリティ(CSEC) Vol. 2020-CSEC-91 No. 10 p. 1-8 2020/10 Research paper, summary (national, other academic conference)

  9. 文単位での著者識別に基づく公的文書の改ざん検知手法の検討

    松林由佑, 二又航介, 猪俣敦夫, 井上博之, 衛藤将史

    情報処理学会ドキュメントコミュニケーション(DC)研究会予稿集 Vol. 2020-DC-116 No. 3 p. 1-5 2020/03

  10. Design and Implementation of a multi-factor web authentication system with MyNumberCard and WebUSB

    Vol. 2019-IOT-46 No. 7 p. 1-5 2019/10 Research paper, summary (national, other academic conference)

  11. Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage

    Vol. 116 No. 491 p. 41-46 2017/03/03

    Publisher: 電子情報通信学会
  12. A Construction of an Optimal Pairing on a Family of Kawazoe-Takahashi Curves and Its Cost Estimate

    Vol. 2015 No. 3 p. 258-265 2015/10/14

  13. A Network Suited for DMAT to Perform BYOD

    辻井高浩, 大平健司, 垣内正年, 油谷曉, 猪俣敦夫, 藤川和利

    情報処理学会研究報告(Web) Vol. 2015 No. IOT-31 2015/09/18

  14. 衛星回線を含むSDNによる病院のBCP実現

    辻井高浩, 大平健司, 垣内正年, 油谷曉, 猪俣敦夫, 藤川和利

    情報処理学会シンポジウムシリーズ(CD-ROM) Vol. 2015 No. 1 2015/07/01

  15. Design of Car-mounted Satellite Internet Communication System for Emergency Situations and its implementation

    TSUJII TAKAHIRO, INOMATA ATSUO, KAKIUCHI MASATOSHI, YUTANI AKIRA, FUJIKAWA KAZUTOSHI

    IEICE technical report. Internet Architecture Vol. 114 No. 495 p. 47-52 2015/03/05

    Publisher: The Institute of Electronics, Information and Communication Engineers
  16. Design of Car-mounted Satellite Internet Communication System for Emergency Situations and its implementation

    Vol. 2015 No. 9 p. 1-6 2015/02/26

  17. A context aware routing metric for reliable route discovery in MANET using Fuzzy Logic (ITS)

    SERAJ Mehnaz, INOMATA Atsuo, FUJIKAWA Kazutoshi

    Vol. 114 No. 369 p. 63-67 2014/12/18

    Publisher: The Institute of Electronics, Information and Communication Engineers
  18. A method of dynamic route selection for searching disaster victims with unmanned aerial vehicle

    RYUGO Yoshihiro, OHIRA Kenji, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 114 No. 374 p. 43-48 2014/12/18

    Publisher: 一般社団法人電子情報通信学会
  19. State Notification System of an Infant on Android Device

    Vol. 2014 p. 35-42 2014/11/27

  20. Study of Malware's Function is Organized Using Goal-Oriented Requirements Analysis Method

    Vol. 2014 No. 2 p. 402-409 2014/10/15

  21. Data Guarantee Mechanism for Distributed Publish/Subscribe System

    MATSUURA Masanao, MATSUURA Satoshi, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 113 No. 424 p. 49-54 2014/01/30

    Publisher: The Institute of Electronics, Information and Communication Engineers
  22. A study on IPv4 Sunset technique in campus network

    MURATA Daisuke, OHIRA Kenji, KAKIUCHI Masatoshi, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 113 No. 424 p. 43-48 2014/01/30

    Publisher: 一般社団法人電子情報通信学会
  23. Dynamic Route Decision of Message Ferry for Disaster Relief Operation

    HATANAKA Kensaku, MATSUURA Satoshi, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. MoNA, Mobile network and applications Vol. 113 No. 398 p. 7-12 2014/01/23

    Publisher: The Institute of Electronics, Information and Communication Engineers
  24. An Efficient Implementation of nT Pairing on Genus 2 Hyperelliptic Curve and Discrete Logarithms in Finite Fields of Characteristic 2

    Vol. 2013 No. 4 p. 673-679 2013/10/14

  25. Effective message delivery method using a Message Ferry deciding a movement route dynamically

    Vol. 2013 2013/09/18

    Publisher: [情報処理学会関西支部]
  26. Introduction of a special human resource development program (SecCap) for information security

    猪俣 敦夫, 大平 健司, 松浦 知史

    日本ソフトウェア科学会大会論文集 Vol. 30 p. 312-318 2013/09/10

    Publisher: [日本ソフトウェア科学会]
  27. RA-006 Normal Basisを用いた多項式基底間の基底変換(A分野:モデル・アルゴリズム・プログラミング,査読付き論文)

    石井 将大, 猪俣 敦夫, 藤川 和利

    情報科学技術フォーラム講演論文集 Vol. 12 No. 1 p. 41-48 2013/08/20

    Publisher: FIT(電子情報通信学会・情報処理学会)運営委員会
  28. Adaptation of Storm to Large Scale Distributed Publish/Subscribe System

    Vol. 2013 p. 2128-2132 2013/07/03

  29. 東大寺内におけるネットワーク整備について

    辻井高浩, 山内正人, 秋山寛子, 猪俣敦夫, 藤川和利, 砂原秀樹

    マルチメディア、分散協調とモバイルシンポジウム2013論文集 Vol. 2013 p. 435-441 2013/07/03

  30. IPv4/v6アドレス混在環境におけるネットワークセキュリティ

    村田大輔, 東結香, 大平健司, 猪俣敦夫, 藤川和利

    マルチメディア、分散協調とモバイルシンポジウム2013論文集 Vol. 2013 No. 2 p. 761-765 2013/07/03

  31. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    Noguchi Satoru, Matsuura Satoshi, Inomata Atsuo, Fujikawa Kazutoshi, Sunahara Hideki

    2013/07/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  32. Location Tracking Prevention with Dummy Packet for Vehicular Communications

    TERAMOTO Tsubasa, NOGUCHI Satoru, KAKIUCHI Masatoshi, INOMATA ATSUO, FUJIKAWA Kazutoshi

    Vol. 112 No. 470 p. 49-54 2013/03/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  33. 情報セキュリティ人材育成プログラムSecCapの取り組み

    猪俣敦夫, 大平健司, 松浦知史, 奥田剛, 門林雄基, 山口英, 藤川和利, 砂原秀樹, 曽根秀昭, 宮地充子, 後藤厚宏

    日本ソフトウェア科学会大会講演論文集(CD-ROM) Vol. 30th p. 312-318 2013

  34. Energy optimal data-center network topology calculation considering network traffic changing

    TSUDA Toru, ICHIKAWA Kohei, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 112 No. 353 p. 61-66 2012/12/13

    Publisher: The Institute of Electronics, Information and Communication Engineers
  35. A proposal for dynamic server consolidation considering the impact on applications

    HASHIMOTO Masashi, IKEBE Minoru, OKAMOTO Yoshihiro, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 112 No. 353 p. 55-60 2012/12/13

    Publisher: The Institute of Electronics, Information and Communication Engineers
  36. A study of parallel computation of pairings on hyperelliptic curves with pairing-friendly fields

    Vol. 2012 No. 3 p. 843-848 2012/10/23

  37. OpenFlow技術を用いたデータセンタネットワークにおける消費電力量削減のためのフロー最適化

    津田徹, 市川昊平, 猪俣敦夫, 藤川和利

    平成24年度 情報処理学会関西支部 支部大会 講演論文集 Vol. 2012 2012/09/14

  38. A divide and merge method of sensor data processing based on geographic information on large-scale publish/subscribe systems

    Vol. 2012 No. 50 p. 1-6 2012/03/08

  39. A Design of Distributed Data Managements for Large Scale Location Based Services Guide to the Technical Report and Template

    Vol. 2012 No. 49 p. 1-6 2012/03/08

  40. Activity recognition on a mobile device by generation method of classification model

    Vol. 2012 No. 20 p. 1-6 2012/03/08

  41. Activity recognition on a mobile device by generation method of classification model

    KIMURA SHU, INOMATA ATSUO, FUJIKAWA KAZUTOSHI

    IEICE technical report. Internet Architecture Vol. 111 No. 485 p. 113-118 2012/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  42. Activity recognition on a mobile device by generation method of classification model

    KIMURA SHU, INOMATA ATSUO, FUJIKAWA KAZUTOSHI

    IEICE technical report. Social Implications of Technology and Information Ethics Vol. 111 No. 484 p. 113-118 2012/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  43. A divide and merge method of sensor data processing based on geographic information on large-scale publish/subscribe systems

    MIYAGI Ryota, MATSUURA Satoshi, NOGUCHI Satoru, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Social Implications of Technology and Information Ethics Vol. 111 No. 484 p. 293-298 2012/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  44. A Design of Distributed Data Managements for Large Scale Location Based Services : Guide to the Technical Report and Template

    NUNOBIKI Yuki, MATSUURA Satoshi, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Social Implications of Technology and Information Ethics Vol. 111 No. 484 p. 287-292 2012/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  45. A Methodology of Splitting Video Stream for Data Stream Management Systems

    KANDA Keita, MATSUURA Satoshi, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 111 No. 444 p. 41-46 2012/02/23

    Publisher: The Institute of Electronics, Information and Communication Engineers
  46. A sensor data collection method depending on collection rate on DTN high density sensor network and its evaluation

    MATSUTAKA Satoshi, MATSUURA Satoshi, INOMATA Atsuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 111 No. 444 p. 77-82 2012/02/23

    Publisher: The Institute of Electronics, Information and Communication Engineers
  47. Geographical P2P query optimization based on contents popularity change

    WADA Tomokazu, MATSUURA Satoshi, NOGUCHI Satoru, INOMATA Atuo, FUJIKAWA Kazutoshi

    IEICE technical report. Internet Architecture Vol. 111 No. 444 p. 89-94 2012/02/23

    Publisher: The Institute of Electronics, Information and Communication Engineers
  48. Proposal of flow digest approach on Hash-based IP traceback against actual attacks

    Vol. 2012 No. 17 p. 1-4 2012/02/22

  49. Proposal of Electric Power Saving on Mandara System for Universiy Continuity

    Vol. 2011 p. 83-89 2011/11/24

  50. A study to understand and elucidate model for informationsecurity risk based on Protection Motivation Theory

    Vol. 2009 p. 1-6 2011/10/12

  51. Proposal of a Security Framework for Virtual MachineResource Management on Cloud Computing

    Vol. 2009 p. 1-6 2011/10/12

  52. Consideration on Malware Classification by the Function based on the Malware's Code

    Vol. 2011 No. 3 p. 107-112 2011/10/12

  53. Context estimation based on an action speed by using Accelerometers

    Vol. 2010 No. 6 2011/04

    Publisher: 情報処理学会
  54. Proposal of dynamic resource allocation system based on load of server in the cloud computing

    Vol. 2010 No. 6 2011/04

    Publisher: 情報処理学会
  55. Proposal of dynamic resource allocation system based on load of server in the cloud computing

    MIYAGI Ryota, IKEBE Minoru, INOMATA Atsuo, FUJIKAWA Kazutoshi, SUNAHARA Hideki

    IEICE technical report. Social Implications of Technology and Information Ethics Vol. 110 No. 429 p. 17-22 2011/02/21

    Publisher: 一般社団法人電子情報通信学会
  56. Context estimation based on an action speed by using Accelerometers

    KIMURA Shu, INOMATA Atsuo, FUZIKAWA Kazutoshi, SUNAHARA Hideki

    IEICE technical report. Social Implications of Technology and Information Ethics Vol. 110 No. 429 p. 181-185 2011/02/21

    Publisher: 一般社団法人電子情報通信学会
  57. MetaFa : Metadata Management System for Fiexible Data Access in the Wide Area Network Environments

    Vol. 52 No. 2 p. 488-506 2011/02

    Publisher: 情報処理学会
  58. A-8-5 Experimental Report about Persuasion Communication for Promotion of Information Security

    Yoshikai Noriaki, Komatsu Ayako, Takagi Daisuke, Numata Hideho, Ueda Masashi, Inomata Atsuo, Shima Shigeyoshi

    Proceedings of the IEICE General Conference Vol. 161 p. 161-161 2011

    Publisher: The Institute of Electronics, Information and Communication Engineers
  59. Establishment of Transmission Technique for 4K Ultra High Definition Image

    油谷曉, 垣内正年, 香取啓志, 尾久土正己, 猪俣敦夫, 藤川和利, 砂原秀樹, 眞鍋佳嗣, 千原國宏

    コンピュータソフトウェア Vol. 28 No. 4 2011

  60. IT Keys:ITリスク軽減のための情報セキュリティ技術者・管理者育成

    猪俣敦夫, 松浦知史, 門林雄基, 藤川和利, 歌代和正, 山口英, 砂原秀樹, 東野輝夫, 中野博隆, 岡村真吾, 浜辺崇, 岡部寿男, 上原哲太郎, 大平健司, 篠田陽一, 宮地充子, 面和成

    コンピュータセキュリティシンポジウム2010論文集 Vol. 2010 No. 9 p. 411-416 2010/10 Research paper, summary (national, other academic conference)

  61. Flooded Displays and High Definition Transmission

    YUTANI Akira, INOMATA Atsuo

    IPSJ Magazine Vol. 51 No. 5 p. 527-527 2010/05/15

    Publisher: Information Processing Society of Japan (IPSJ)
  62. Proposal of Dynamic Resource Allocation Method for Load of Web Server in the Cloud

    MORIKAWA Taiki, INOMATA Atsuo, IKEBE Minoru, OKAMOTO Yoshihiro, UDA Satoshi, FUJIKAWA Kazutoshi, SUNAHARA Hideki

    IEICE technical report. Social Implications of Technology and Information Ethics Vol. 109 No. 437 p. 113-118 2010/02/22

    Publisher: 一般社団法人電子情報通信学会
  63. Transmission Experiment on the Internet for Uncompressed 4k Image

    YUTANI Akira, KAKIUCHI Masatoshi, FUJIKAWA Kazutoshi, INOMATA Atsuo, KANDORI Keishi, MANABE Yoshitsugu, CHIHARA Kunihiro

    IEICE technical report. Internet Architecture Vol. 109 No. 208 p. 55-58 2009/09/18

    Publisher: The Institute of Electronics, Information and Communication Engineers
  64. A Technical, Systematic and Operational Consideration for Realizing ε-ARK device using Apple iPhone

    OHNO HIROYUKI, INOMATA ATSUO

    IPSJ SIG Technical Reports Vol. 2008 No. 87 p. 13-18 2008/09/12

    Publisher: Information Processing Society of Japan (IPSJ)
  65. ASIC Implementation of the ηt Pairing

    ANANDA Vithanage, INOMATA Atsuo, OKAMOTO Eiji, OKAMOTO Takeshi, KANAOKA Akira, KATOUNO Masayoshi, SHIGA Takaaki, SHIRASE Masaaki, SOGA Ryuji, TAKAGI Tsuyoshi, DOI Hiroshi, FUJITA Kaoru, BEUCHAT Jean-Luc, MAMBO Masahiro, YAMAMOTO Hiroyasu

    IPSJ SIG Notes Vol. 2008 No. 45 p. 31-35 2008/05/15

    Publisher: Information Processing Society of Japan (IPSJ)
  66. Design and Implemntation of "Electronic/Emergency Army Knife" (ε-ARK) and Its Application to Distributed System Management.

    OHNO HIROYUKI, INOMATA ATSUO

    Vol. 2008 No. 15 p. 49-54 2008/03/07

    Publisher: Information Processing Society of Japan (IPSJ)
  67. Proposal and suggestion of the social and institutional subject for the emergency information system in a large-scale disaster

    INOMATA Atsuo, TADA Hiroyuki, NOSE Yoshio, KUMAHIRA Mika, OHNO Hiroyuki

    IPSJ SIG Notes Vol. 2008 No. 16 p. 1-8 2008/03/04

    Publisher: Information Processing Society of Japan (IPSJ)
  68. ID-based 暗号を用いたオーバレイネットワーク向けミドルウェアの構築

    猪俣敦夫

    Proc. of CSS2008 2008

    Publisher: IPSJ
  69. 乾電池でも運用可能な「非常時対応電子アーミーナイフ」(ε-ARK)を用いた非常時情報通信システムの実装

    猪俣敦夫

    Internet Conference 2008 p. 15-24 2008

  70. Study of the Cryptography Vulnerability Risks in Sociotechnical Systems

    INOMATA Atsuo, OKAMOTO Eiji

    The Journal of the Institute of Electronics, Information and Communication Engineers Vol. 90 No. 2 p. 135-138 2007/02/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  71. Proposal of the Crypto SLA and Its Support Tool against Compromising of Cryptosystems

    INOMATA ATSUO, OYAMA YOSHIHITO, OKAMOTO EIJI

    IPSJ journal Vol. 48 No. 1 p. 178-188 2007/01/15

    Publisher: Information Processing Society of Japan (IPSJ)
  72. 政府 民間連携を考慮した非常時情報通信システムの設計と実装

    猪俣敦夫

    マルチメディア、分散、協調とモバイルシンポジウム (DICOMO2007) 2007

  73. Broadcast Encryption with Sender Authentication and its Application

    KANAZAWA FUMIAKI, OKAMOTO TAKESHI, INOMATA ATSUO, OKAMOTO EIJI

    IPSJ journal Vol. 47 No. 11 p. 2992-3004 2006/11/15

    Publisher: Information Processing Society of Japan (IPSJ)
  74. B-7-67 AS-path analysis with Homology

    Oyama Yoshihito, Inomata Atsuo, Okamoto Eiji, Okamura Koji

    Proceedings of the Society Conference of IEICE Vol. 2006 No. 2 p. 127-127 2006/09/07

    Publisher: The Institute of Electronics, Information and Communication Engineers
  75. Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks

    Sk.Md.MizanurRahman, Atsuo Inomata, Masahiro Mambo, Eiji Okamoto

    IPSJ journal Vol. 47 No. 8 p. 2396-2408 2006/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  76. Research Trends on Vulnerabilities in the AdvancedInformation Society:Vulnerabilities in Cryptography

    OKAMOTO Eiji, MATSUURA Kanta, TOMITAKA Seiji, INOMATA Atsuo

    IPSJ Magazine Vol. 46 No. 6 p. 625-629 2005/06/15

    Publisher: Information Processing Society of Japan (IPSJ)
  77. L-029 Relation of network latency and bandwidth from application view

    Oyama Yoshihito, Inomata Atsuo

    Vol. 3 No. 4 p. 75-77 2004/08/20

    Publisher: Forum on Information Technology
  78. B-6-156 Application of dynamically reconfigurable all-optical network with GMPLS to teleconference system

    Hashimoto Takeshi, Tanaka Shinya, Inomata Atsuo

    Proceedings of the IEICE General Conference Vol. 2004 No. 2 p. 156-156 2004/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  79. B-16-8 Evaluation of GRID file transfer protocol throughput on GMPLS Network

    Inomata Atsuo, Tanaka Shinya, Hashimoto Takeshi

    Proceedings of the IEICE General Conference p. 617-617 2004

    Publisher: The Institute of Electronics, Information and Communication Engineers
  80. Application of a GRID application to GMPLS Network

    Inomata Atsuo, Tanaka Shinya, Hashimoto Takeshi, Ishimatsu Hirokazu

    Proceedings of the Society Conference of IEICE Vol. 2003 No. 2 p. 493-493 2003/09/10

    Publisher: The Institute of Electronics, Information and Communication Engineers
  81. Evaluation Method of Distance Learning Teaching Materials by AHP

    INOMATA Atsuo, MURAKOSHI Hiroyuki, OCHIMIZU Koichiro, Atsuo Inomata, Hiroyuki Murakoshi, Koichiro Ochimizu, School of Information Science Japan Advanced Institute of Science and Technology, School of Information Science Japan Advanced Institute of Science and Technology, School of Information Science Japan Advanced Institute of Science and Technology

    Vol. 19 No. 2 p. 51-57 2002/03/15

    Publisher: 日本ソフトウェア科学会
  82. Extracting Parameters to measure the effectiveness of Distance Learning Materials

    INOMATA Atsuo, MURAKOSHI Hiroyuki, OCHIMIZU Koichiro

    IEICE technical report. Education technology Vol. 101 No. 433 p. 5-12 2001/11/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  83. コンセプトマップを用いた電子教材の評価手段の提案 (テーマ:先端メディアの教育利用と教材データの格納・再利用)

    鈴木 満, 猪俣 敦夫, 村越 広享

    知的教育システム研究会 Vol. 32 p. 41-48 2001/05/11

    Publisher: 人工知能学会
  84. A Method of Evaluating for Electronic Learning Material using Concept Map

    SUZUKI Mitsuru, INOMATA Atsuo, MURAKOSHI Hiroyuki, TOJO Satoshi, OCHIMIZU Koichiro

    ET Vol. 101 No. 41 p. 41-48 2001/05/04

    Publisher: The Institute of Electronics, Information and Communication Engineers
  85. How to Design and Construct Distance Learning System?

    INOMATA Atsuo, SHIMANAKA Tohru, OCHIMIZU Koichiro

    Technical report of IEICE. SS Vol. 100 No. 63 p. 25-32 2000/05/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  86. Organizing Electronic Teaching Materials for 0n - Demamd Learning

    INOMATA Atsuo, OCHIMIZU Koichiro

    IPSJ SIG Notes Vol. 1999 No. 42 p. 33-40 1999/05/21

    Publisher: Information Processing Society of Japan (IPSJ)

Publications 2

  1. Advances in Information and Computer Security: 13th International Workshop on Security (IWSEC2018)

    Atsuo Inomata, Kan Yasuda

    Springer 2018

  2. Introduction to Cyber Security -Light and Darkness-

    Kyoritsu Publishing 2016/02 Textbook, survey, introduction

Presentations 6

  1. セキュリティ人材育成 ~8年間の取り組みを経て~

    Security Days 2016/03/11

  2. A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate

    Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa

    2nd International Conference on Information Systems Security and Privacy (ICISSP 2016) 2016/02/19

  3. 種数2のKawazoe-Takahashi曲線族上のoptimalペアリングの構成とそのコスト評価

    石井将大, 猪俣敦夫, 藤川和利

    コンピュータセキュリティシンポジウム (CSS) 2015 2015/10/21

  4. 情報セキュリティ人材育成

    ネットワーキングアカデミー・インストラクターズミーティング 2015 2015/08/20

  5. 組織における情報セキュリティ

    ワークショップ 「第4回情報セキュリティ講座」 2015/06/09

  6. 大学における情報管理のあり方と 暗号学的視点からの文書の長期保存について

    第19回サイバー犯罪に関する白浜シンポジウム 2015/05/21