Follow
Kazumasa Omote
Kazumasa Omote
Verified email at risk.tsukuba.ac.jp
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
Information Security Practice and Experience: 5th International Conference …, 2009
3892009
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
3442009
Device and method for worm detection, and computer product
K Omote, S Torii
US Patent App. 10/812,622, 2005
2772005
A practical English auction with one-time registration
K Omote, A Miyaji
Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001
882001
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
712013
Generic constructions of secure‐channel free searchable encryption with adaptive security
K Emura, A Miyaji, MS Rahman, K Omote
Security and communication networks 8 (8), 1547-1560, 2015
502015
Malware function classification using apis in initial behavior
N Kawaguchi, K Omote
2015 10th Asia Joint Conference on Information Security, 138-144, 2015
482015
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied Cryptography 2 (1), 46-59, 2010
472010
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root
K Omote, A Miyaji
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
472003
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
K Emura, A Miyaji, K Omote
Information and Media Technologies 4 (4), 1060-1075, 2009
452009
An approach to detect remote access trojan in the early stage of communication
D Jiang, K Omote
2015 IEEE 29th international conference on advanced information networking …, 2015
422015
Network intrusion detection based on semi-supervised variational auto-encoder
G Osada, K Omote, T Nishide
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
352017
An anonymous auction protocol with a single non-trusted center using binary trees
K Omote, A Miyaji
Information Security: Third International Workshop, ISW 2000 Wollongong …, 2000
312000
Recording medium recording a network shutdown control program, and network shutdown device
M Komura, K Omote, Y Higashikado, M Mitomo, B Noda, S Torii
US Patent 7,564,837, 2009
292009
Secure and anonymous communication technique: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi
IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015
262015
A timed-release proxy re-encryption scheme
K Emura, A Miyaji, K Omote
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011
252011
A host-based detection method of remote access trojan in the early stage
D Adachi, K Omote
Information Security Practice and Experience: 12th International Conference …, 2016
202016
Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers
M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ...
2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230, 2008
202008
An-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users
K Emura, A Miyaji, K Omote
Journal of Applied Mathematics 2014, 2014
182014
A practical English auction with simple revocation
K Omote, A Miyaji
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2002
182002
The system can't perform the operation now. Try again later.
Articles 1–20