-
同一運用元によるOnionサイトの類型化と運用モチベーションの推定
木村 悠生, 石川 琉聖, 穐山 空道, 猪俣 敦夫, 上原 哲太郎
情報処理学会IOT研究会予稿集 Vol. IOT8 2025/03 Research paper (conference, symposium, etc.)
-
未知の攻撃に対するMQTTブローカーの2段階分類侵入検知モデル
宮澤昌子, 橋本俊甫, 中山崇嗣, 井上博之, 猪俣敦夫
電子情報通信学会IA研究会予稿集 Vol. IS2024 No. 85 p. 118-123 2025/03 Research paper (conference, symposium, etc.)
-
FALCONを用いた量子耐性ブロックチェーンのトランザクションサイズ削減に関する検討
中西 陽路, 橋本 俊甫, 中山 崇嗣, 井上 博之, 猪俣 敦夫
暗号と情報セキュリティシンポジウム(SCIS2025)予稿集 No. 4A2-4 2025/01 Research paper (conference, symposium, etc.)
-
セキュリティ教育用ビデオゲームに向けた大規模言語モデルを活用した分析手法
新井 美音, 矢内 直人, 猪俣 敦夫, 花岡 悟一郎
暗号と情報セキュリティシンポジウム(SCIS2025)予稿集 No. 3F4-3 2025/01 Research paper (conference, symposium, etc.)
-
A New Authentication ID Supporting Digital Transformation—Progress Report on OUID System Construction
Matsumoto Satoru, Haraguchi Naohiro, Ohira Kenji, Hiromori Akihito, Yarimizu Toru, Inomata Atsuo
Journal for Academic Computing and Networking Vol. 28 No. 1 p. 16-22 2024/11/20
Publisher: Academic eXcange for Information Environment and Strategy
-
セキュリティ教育用ビデオゲームにおけるテーマに関する体系調査
コンピュータセキュリティシンポジウム(CSS2024)予稿集 No. 2D2-4 2024/10 Research paper (conference, symposium, etc.)
-
Onion Domain
Yusei Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara
Vol. IOT2023 2024/03 Research paper (conference, symposium, etc.)
-
Proposal of Moving Target Defense (MTD) makes attackers' information obsolete by dynamically
Mamoru Saita, Shunsuke Hashimoto, Atsuo Inomata, Hiroyuki Inoue
Vol. ICSS2023 No. 82 p. 93-99 2024/03 Research paper (conference, symposium, etc.)
-
Discussion of possiblity for collection fingerprint and identifying the ordinal operation on Onion Service
Yusei Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara
Vol. 2023-SPT-50(38) p. 1-6 2024/03 Research paper (conference, symposium, etc.)
-
Backdoor Attacks by Leveraging Latent Representation in Competitive Learning for Resistance to Removal
Kazuki IWAHANA, Naoto YANAI, Atsuo INOMATA, Toru FUJIWARA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2024 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
-
ASPA
Yusho Yamaguchi, Taiji Kimura, Naoto Yanai, Atsuo Inomata
Vol. IA2023 No. 40 p. 25-32 2023/11 Research paper (conference, symposium, etc.)
-
On Collecting Onion Server Fingerprints and Identification of Their Operators.
Yuuki Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara
Proc. of IEEE Reliability conference QRS 2023 p. 540-548 2023/10 Research paper (international conference proceedings)
-
Design of the electric phiysical stamp on authentication infrastructure for DNS and IBE
Hyuga Yamamoto, Atsuo Inomata, Tetsutaro Uehara
Vol. 2023-SPT-50(32) p. 1-6 2023/03 Research paper (conference, symposium, etc.)
-
Verification for the attack to notice inforamation by Password recover of web service and its countermeasure
Ryusei Ishikawa, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara
Vol. 2023-SPT-50(21) p. 1-6 2023/03 Research paper (conference, symposium, etc.)
-
Field survey to utilize and apply the public Wi-Fi service to the campus network -in Covid-19 pandemic 2 years-
Atsuo Inomata, Shinji Shimojo, Madoka Aihara
IPSJ, Proc. of IoT Symposium2022 p. 17-24 2022/12/01 Research paper (conference, symposium, etc.)
-
Personal Identification by Keyboard Input and Mouse Operation Information Using Deep Learning
Yuuki Kimura, Atsuo Inomata, Tetsutaro Uehara
p. 493-499 2022/10 Research paper (conference, symposium, etc.)
-
Detection of vulnerable OAuth2.0 implementations by browser extensions
Shingo Kunihiro, Junjun Zheng, Atsuo Inomata, Tetsutarou Uehara
Vol. 2022-IOT-58(5) p. 1-8 2022/07 Research paper (conference, symposium, etc.)
-
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori
Proceedings on Privacy Enhancing Technologies Vol. 2022 No. 4 p. 140-161 2022 Research paper (scientific journal)
-
Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code
Hoang Viet Nguyen, Junjun Zheng, Atsuo Inomata, Tetsutaro Uehara
IEEE Access Vol. 10 p. 123786-123800 2022 Research paper (scientific journal)
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
-
BERTモデルを用いたキーボード打鍵音による入力推定攻撃とその対策
飯田 雅裕, 秋山 満昭, 神薗 雅紀, 笠間 貴弘, 服部 祐一, 井上 博之, 猪俣 敦夫
情報処理学会研究報告セキュリティ心理学とトラスト(SPT) Vol. 2022-SPT-46 No. 17 p. 1-6 2022/01 Research paper (conference, symposium, etc.)
-
Understanding the Risks of Re-identification Attack on Tracing Frameworks and its Countermeasures
Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori
2021/10 Research paper (conference, symposium, etc.)
-
Migrating to Zero Trust Architecture: Reviews and Challenges
Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata
Security and Communication Networks Vol. 2021 p. 1-10 2021/05/25 Research paper (scientific journal)
Publisher: Hindawi Limited
-
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
Daiki Yamakawa, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara
Security and Communication Networks Vol. 2021 p. 1-14 2021/02/16 Research paper (scientific journal)
Publisher: Hindawi Limited
-
A Secure Cloud-centric IoT Framework for Smart Device Registration
Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata
Journal of Information Processing Vol. 29 p. 381-391 2021/01 Research paper (scientific journal)
-
Can the Exposure Notification Framework Expose Personal Information
Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori
Proc. of The Network and Distributed System Security Symposium (NDSS) 2021 2021 Research paper (international conference proceedings)
-
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing
Hoang Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara
Proceedings of the 7th International Conference on Information Systems Security and Privacy p. 440-449 2021 Research paper (international conference proceedings)
Publisher: SCITEPRESS - Science and Technology Publications
-
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection
Hai Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara
Proceedings of the 7th International Conference on Information Systems Security and Privacy p. 109-120 2021 Research paper (international conference proceedings)
Publisher: SCITEPRESS - Science and Technology Publications
-
API グループ間の相関性とフォルダ操作頻度に基づくマルウェア分類手法の提案
周家興, 廣瀬幸, 柿崎淑郎, 猪俣敦夫, 寺田真敏
情報処理学会論文誌 Vol. 61 No. 12 p. 1792-1801 2020/12 Research paper (scientific journal)
-
Evaluation to Classify Ransomware Variants based on Correlations between APIs.
Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata
Proceedings of the 6th International Conference on Information Systems Security and Privacy(ICISSP) p. 465-472 2020/02 Research paper (international conference proceedings)
Publisher: SCITEPRESS
-
Wireless Access Point Spoofing by Unmanned Aerial Vehicles (UAVs)
Ryota Kawakami, Atsuo Inomata, Naoto Yanai, Toru Fujiwara
Proc. of The Network and Distributed System Security Symposium (NDSS) 2020, poster (2020-02). 2020/02 Research paper (international conference proceedings)
-
エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知
石井 将大, 宇野 真純, 猪俣 敦夫, 新井 イスマイル, 藤川 和利
電子情報通信学会論文誌 Vol. J1010-B No. 3 p. 220-232 2018/03 Research paper (scientific journal)
-
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Masahiro Ishii, Jeremie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa
IEEE TRANSACTIONS ON COMPUTERS Vol. 66 No. 12 p. 2019-2030 2017/12 Research paper (scientific journal)
-
Proposal of Hardware Device Model for IoT Endpoint Security and Its Implementation
Ryota Jinnai, Atsuo Inomata, Ismail Arai, Kazutoshi Fujikawa
2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS) 2017 Research paper (international conference proceedings)
-
A weil pairing on a family of genus 2 hyperelliptic curves with efficiently computable automorphisms
Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E100A No. 1 p. 62-72 2017/01/01 Research paper (international conference proceedings)
Publisher: Maruzen Co., Ltd.
-
A construction of a twisted ate pairing on a family of kawazoe-Takahashi curves at 192-bit security level and its cost estimate
Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa
ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy p. 432-439 2016 Research paper (international conference proceedings)
Publisher: SciTePress
-
A vehicle clustering algorithm for information propagation by inter-vehicle communications
Naohiro Washio, Satoshi Matsuura, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa
2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 p. 111-116 2015/06/24 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Dynamic Division and Reassignment Method for Publish/Subscribe System
福井 達也, 松浦 正尚, 松浦 知史, 猪俣 敦夫, 藤川 和利
情報処理学会論文誌 Vol. 55 No. 1 p. 289-299 2014/01 Research paper (scientific journal)
Publisher: 情報処理学会
-
Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 Geo Networking
Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara
IEICE TRANSACTIONS ON COMMUNICATIONS Vol. E96B No. 7 p. 1706-1715 2013/07 Research paper (scientific journal)
-
Cryptography Compromising Risk Changes with the Cloud Computing Times
INOMATA,Atsuo, OKAMOTO,Eiji
Computer Software Vol. 30 No. 2 p. 14-22 2013/04 Research paper (scientific journal)
Publisher: Japan Society for Software Science and Technology
-
Vehicle clustering algorithm for sharing information on traffic congestion
Yohei Kanemaru, Satoshi Matsuura, Masatoshi Kakiuchi, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa
2013 13th International Conference on ITS Telecommunications, ITST 2013 p. 38-43 2013 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
Location tracking prevention with dummy messages for vehicular communications
Tsubasa Teramoto, Satoshi Matsuura, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa
2013 13th International Conference on ITS Telecommunications, ITST 2013 p. 56-61 2013 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
A two-tier overlay publish/subscribe system for sensor data stream using geographic based load balancing
Tatsuya Fukui, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa
Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013 p. 749-756 2013 Research paper (international conference proceedings)
-
TrafficCam: Sharing traffic information based on dynamic IPv6 multicast group assignment using smartphone sensors
Yohei Kanemaru, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa
2013 IEEE 10th Consumer Communications and Networking Conference, CCNC 2013 p. 853-854 2013 Research paper (international conference proceedings)
-
Design of IT Keys and Its Real Practice Specialist Program to Promote Key Engineers as Security Specialists
Atsuo Inomata, Satoshi Matsuura, Kenji Ohira, Youki Kadobayashi, Kazutoshi Fujikawa, Hideki Sunahara, Suguru Yamaguchi
Proceedings of 7th International Conference on Systems and Networks Communications(ICSNC2012) 2012/11 Research paper (international conference proceedings)
-
Proposal of smooth channel switching mechanism for p2p streaming and its application
Naomi Terada, Eiji Kominami, Atsuo Inomata, Kazutoshi Fujikawa, Eiji Kawai, Hideki Sunahara
EUROMEDIA 2012 - 17th Annual Scientific Conference on Web Technology, New Media Communications and Telematics Theory Methods, Tools and Applications p. 73-77 2012 Research paper (international conference proceedings)
Publisher: EUROSIS
-
Design and field evaluation of geographical location-aware service discovery on IPv6 GeoNetworking for VANET.
Satoru Noguchi, Manabu Tsukada, Thierry Ernst, Atsuo Inomata, Kazutoshi Fujikawa
EURASIP Journal on Wireless Communications and Networking Vol. 2012 p. 29-29 2012 Research paper (scientific journal)
-
Koshien-cloud: Operations of distributed cloud as a large scale web contents distribution platform
Yoshihiro Okamoto, Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa
Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 p. 363-368 2012 Research paper (international conference proceedings)
-
A divide and merge method for sensor data processing on large-scale Publish/Subscribe systems
Ryota Miyagi, Satoshi Matsuura, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa
Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 p. 424-429 2012 Research paper (international conference proceedings)
-
3-6 Estimation of the Attack Ability for Cryptography(3. Status of Cryptographic Attacks,<Special Issue>Transition of Cryptographic Algorithms and Social Impacts)
INOMATA,Atsuo, OKAMOTO,Eiji
The Journal of the Institute of Electronics, Information, and Communication Engineers Vol. 94 No. 11 p. 993-998 2011/11 Research paper (scientific journal)
Publisher: The Institute of Electronics, Information and Communication Engineers
-
Flexible Data Access System Using Application Level Semantics on the Wide Area Network
IKEBE Minoru, INOMATA Atsuo, FUJIKAWA Kazutoshi, SUNAHARA Hideki
Computer Software Vol. 28 No. 2 p. 93-104 2011/05 Research paper (scientific journal)
Publisher: 日本ソフトウェア科学会
-
MetaFa: Metadata Management System for Flexible Data Access in the Wide Area Network Environments
池部 実, 猪俣 敦夫, 藤川 和利, 砂原 秀樹
情報処理学会論文誌 Vol. 52 No. 2 p. 488-506 2011/02 Research paper (scientific journal)
-
Communication trials for Self-Mutual Help on the emergency situations in ε-ARK
Atsuo Inomata, Hironobu Suzuki, Yoshiaki Kitaguchi, Hiroyuki Ohno
2011 IEEE Consumer Communications and Networking Conference, CCNC'2011 p. 848-849 2011 Research paper (international conference proceedings)
Publisher: IEEE
-
Experimental research on personal awareness and behavior for information security protection
Noriaki Yoshikai, Shun-Ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata
Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011 p. 213-220 2011 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
Location-aware service discovery on IPv6 GeoNetworking for VANET
Satoru Noguchi, Manabu Tsukada, Thierry Ernst, Atsuo Inomata, Kazutoshi Fujikawa
2011 11th International Conference on ITS Telecommunications, ITST 2011 p. 224-229 2011 Research paper (international conference proceedings)
-
Proposal and evaluation of a dynamic resource allocation method based on the load of VMs on IaaS
Atsuo Inomata, Taiki Morikawa, Minoru Ikebe, Yoshihiro Okamoto, Satoru Noguchi, Kazutoshi Fujikawa, Hideki Sunahara, Sk Md. Mizanur Rahman
2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings 2011 Research paper (international conference proceedings)
-
Proposal of a solution model for the information security risk based on Protection Motivation Theory and its implementation to high school education
INOMATA ATSUO, HIGASHI YUKA, UEDA MASASHI, KOMATSU AYAKO, FUJIKAWA KAZUTOSHI, SUNAHARA HIDEKI
研究報告コンピュータセキュリティ(CSEC) Vol. 2010 No. 12 p. 1-6 2010/05/04
Publisher: 情報処理学会
-
17. Implication of the Cryptography Vulnerability in Our Information Society(<Special Feature>Future Map of Information Processing Technology)
INOMATA,Atsuo, OKAMOTO,Eiji
Journal of Information Processing Society of Japan Vol. 51 No. 5 2010/05 Research paper (scientific journal)
Publisher: Information Processing Society of Japan (IPSJ)
-
FPGA and ASIC implementations of the eta(T) pairing in characteristic three
Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
COMPUTERS & ELECTRICAL ENGINEERING Vol. 36 No. 1 p. 73-87 2010/01 Research paper (scientific journal)
-
Proposal of smooth switching mechanism on P2P streaming
Naomi Terada, Eiji Kominami, Atsuo Inomata, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara
Advances in Intelligent and Soft Computing Vol. 79 p. 181-184 2010 Research paper (international conference proceedings)
-
It-Kyes: New lecture style for information security
Atsuo Inomata, Satoshi Matsuura, Kazutoshi Fujikawa, Hideki Sunahara
IADIS International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2009 p. 544-545 2009/11 Research paper (international conference proceedings)
-
Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP
Jumpei Togashi, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara, Hideki Sunahara
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, PDCN 2009 p. 70-76 2009/02 Research paper (international conference proceedings)
-
Uncompressed 4K2K and HD live transmission on global internet
Masatoshi Kakiuchi, Akira Yutani, Atsuo Inomata, Kazutoshi Fujikawa, Keishi Kandori
ACM SIGGRAPH ASIA 2009 Posters, SIGGRAPH ASIA '09 2009 Research paper (international conference proceedings)
-
Total solar eclipse: Fish-eye 4K image transmission experimentation on the internet
Akira Yutani, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa, Yoshitsugu Manabe, Kunihiro Chihara, Keishi Kandori
ACM SIGGRAPH ASIA 2009 Posters, SIGGRAPH ASIA '09 2009 Research paper (international conference proceedings)
-
MetaFa: Metadata management framework for data sharing in data-intensive applications
Minoru Ikebe, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 5518 No. 2 p. 655-658 2009 Research paper (international conference proceedings)
-
Efficient Data Management using the Session Log in DHT and its Evaluation
Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara
2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2 p. 1257-1261 2009 Research paper (international conference proceedings)
-
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks
Sk Md Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
SECURITY AND COMMUNICATION NETWORKS Vol. 1 No. 2 p. 179-189 2008/03 Research paper (scientific journal)
-
Proposal of cryptography-sla and its application against the compromise risk of cryptosystems
Atsuo Inomata, Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara, Takeshi Okamoto, Eiji Okamoto
Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications and Visual Communications p. 82-87 2008 Research paper (international conference proceedings)
-
Distributed Data Access/Find System with Metadata for Data-Intensive Computing
Minoru Ikebe, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara
2008 9TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING p. 361-366 2008 Research paper (international conference proceedings)
-
Private communication and authentication protocol for wireless sensor networks
Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata
Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008 2008 Research paper (international conference proceedings)
-
Implementation of ID-based signature in RFID system
Piseth Ith, Yoshihito Oyama, Atsuo Inomata, Eiji Okamoto
2007 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS p. 233-+ 2007 Research paper (international conference proceedings)
-
Anonymous secure communication in wireless mobile ad-hoc networks
Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
UBIQUITOUS CONVERGENCE TECHNOLOGY Vol. 4412 p. 140-+ 2007 Research paper (international conference proceedings)
-
Proposal of the Crypto SLA and Its Support Tool against Compromising of Cryptosystems(Networked Services in Social Security Context,<Special Issue>Networked Services to be Placed in the Social Contexts)
INOMATA,ATSUO, OYAMA,YOSHIHITO, OKAMOTO,EIJI
Transactions of Information Processing Society of Japan Vol. 48 No. 1 p. 178-188 2007/01 Research paper (scientific journal)
Publisher: Information Processing Society of Japan (IPSJ)
-
Broadcast Encryption with Sender Authentication and its Application(Network Security)
KANAZAWA,FUMIAKI, OKAMOTO,TAKESHI, INOMATA,ATSUO, OKAMOTO,EIJI
Transactions of Information Processing Society of Japan Vol. 47 No. 11 p. 2992-3004 2006/11 Research paper (scientific journal)
Publisher: Information Processing Society of Japan (IPSJ)
-
A-7-4 Ramp Secret Sharing Schemes using Exclusive OR Calculation
Nagamura,Kensaku, Inomata,Atsuo, Okamoto,Takeshi, Okamoto,Eiji
Proceedings of the Society Conference of IEICE Vol. 2006 No. 0 2006/09 Research paper (scientific journal)
Publisher: The Institute of Electronics, Information and Communication Engineers
-
A-18-7 Development of cryptography SLA supporting tool for cryptography vulnerability risk
Inomata,Atsuo, Oyama,Yoshihito, Okamoto,Eiji
Proceedings of the Society Conference of IEICE Vol. 2006 No. 0 2006/09 Research paper (scientific journal)
Publisher: The Institute of Electronics, Information and Communication Engineers
-
An anonymous on-demand position-based routing in mobile ad hoc networks
SMM Rahman, M Mambo, A Inomata, E Okamoto
INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET , PROCEEDINGS p. 300-+ 2006 Research paper (international conference proceedings)
-
Learner's privacy enhanced architecture for distance learning
Atsuo Inomata, Yoshihito Oyama, Satoshi Uda, Takeshi Okamoto, Eiji Okamoto
Proceedings of the IASTED International Conference on Web-Based Education, WBE 2005 p. 414-418 2005/12/01
-
A proposal of short proxy signature using pairing
Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
International Conference on Information Technology: Coding and Computing, ITCC Vol. 1 p. 631-635 2005 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
A novel mail filtering method against phishing
Atsuo Inomata, Sk. Md. Mizanur Rahman, Takeshi Okamoto, Eiji Okamoto
IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings Vol. 2005 p. 221-224 2005 Research paper (international conference proceedings)
-
Performance evaluation of efficient algorithms for Tate pairing
Seiichi Matsuda, Atsuo Inomata, Takeshi Okamoto, Eiji Okamoto
IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings Vol. 2005 p. 657-660 2005 Research paper (international conference proceedings)
-
L-002 Proposal and evaluation of GRID security environment b designated confirmer proxy signature
Inomata,Atsuo, Oyama,Yoshihito, Okamoto,Takeshi, Okamoto,Eiji
情報科学技術フォーラム一般講演論文集 Vol. 3 No. 4 p. 3-6 2004/08 Research paper (scientific journal)
Publisher: FIT(電子情報通信学会・情報処理学会)推進委員会
-
Anonymous traceable disclosure scheme using pairing over elliptic curve
Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
ACM International Conference Proceeding Series Vol. 85 p. 48-52 2004 Research paper (international conference proceedings)