BibTeX records: Eiji Okamoto

download as .bib file

@article{DBLP:journals/ieicetb/AsanoOAOY23,
  author       = {Keisuke Asano and
                  Mamoru Okumura and
                  Takumi Abe and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {High-Quality Secure Wireless Transmission Scheme Using Polar Codes
                  and Radio-Wave Encrypted Modulation},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {106},
  number       = {4},
  pages        = {374--383},
  year         = {2023},
  url          = {https://doi.org/10.1587/transcom.2022ebp3098},
  doi          = {10.1587/TRANSCOM.2022EBP3098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/AsanoOAOY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetb/TomitaOO23,
  author       = {Kenya Tomita and
                  Mamoru Okumura and
                  Eiji Okamoto},
  title        = {Demonstration of Chaos-Based Radio Encryption Modulation Scheme through
                  Wired Transmission Experiments},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {106},
  number       = {8},
  pages        = {686--695},
  year         = {2023},
  url          = {https://doi.org/10.1587/transcom.2022ebt0005},
  doi          = {10.1587/TRANSCOM.2022EBT0005},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/TomitaOO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetb/Okamoto23,
  author       = {Eiji Okamoto},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {106},
  number       = {9},
  pages        = {723},
  year         = {2023},
  url          = {https://doi.org/10.1587/transcom.2022fgf0001},
  doi          = {10.1587/TRANSCOM.2022FGF0001},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/Okamoto23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetb/AsanoAKOY23,
  author       = {Keisuke Asano and
                  Takumi Abe and
                  Kenta Kato and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {High-Quality and Low-Complexity Polar-Coded Radio-Wave Encrypted Modulation
                  Utilizing Multipurpose Frozen Bits},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {106},
  number       = {10},
  pages        = {987--996},
  year         = {2023},
  url          = {https://doi.org/10.1587/transcom.2022ebt0007},
  doi          = {10.1587/TRANSCOM.2022EBT0007},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/AsanoAKOY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/OkamotoYSNIY23,
  author       = {Eiji Okamoto and
                  Yuma Yamashita and
                  Yohei Satoh and
                  Mitsuhiro Nakadai and
                  Takamasa Itahashi and
                  Shiro Yamakawa},
  title        = {Performance Comparison of Channel Coding Methods for Optical Satellite
                  Data Relay System},
  booktitle    = {34th {IEEE} Annual International Symposium on Personal, Indoor and
                  Mobile Radio Communications {PIMRC} 2023, Toronto, ON, Canada, September
                  5-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PIMRC56721.2023.10294033},
  doi          = {10.1109/PIMRC56721.2023.10294033},
  timestamp    = {Mon, 13 Nov 2023 17:50:37 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/OkamotoYSNIY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetb/TomokiOOY22,
  author       = {Kaga Tomoki and
                  Mamoru Okumura and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear
                  Modulation},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {105-B},
  number       = {5},
  pages        = {638--647},
  year         = {2022},
  url          = {https://doi.org/10.1587/transcom.2021ebp3092},
  doi          = {10.1587/TRANSCOM.2021EBP3092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/TomokiOOY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetb/OkumuraAAOY22,
  author       = {Mamoru Okumura and
                  Keisuke Asano and
                  Takumi Abe and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Performance Improvement of Radio-Wave Encrypted {MIMO} Communications
                  Using Average {LLR} Clipping},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {105-B},
  number       = {8},
  pages        = {931--943},
  year         = {2022},
  url          = {https://doi.org/10.1587/transcom.2021ebt0007},
  doi          = {10.1587/TRANSCOM.2021EBT0007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetb/OkumuraAAOY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/IshikawaHOXX21,
  author       = {Naoki Ishikawa and
                  Jehad M. Hamamreh and
                  Eiji Okamoto and
                  Chao Xu and
                  Lixia Xiao},
  title        = {Artificially Time-Varying Differential {MIMO} for Achieving Practical
                  Physical Layer Security},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {2},
  pages        = {2180--2194},
  year         = {2021},
  url          = {https://doi.org/10.1109/OJCOMS.2021.3112486},
  doi          = {10.1109/OJCOMS.2021.3112486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/IshikawaHOXX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/OkumuraTOY21,
  author       = {Mamoru Okumura and
                  Kaga Tomoki and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Chaos-Based Interleave Division Multiple Access Scheme with Physical
                  Layer Security},
  booktitle    = {18th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2021, Las Vegas, NV, USA, January 9-12, 2021},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CCNC49032.2021.9369489},
  doi          = {10.1109/CCNC49032.2021.9369489},
  timestamp    = {Fri, 19 Mar 2021 12:19:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/OkumuraTOY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/IshikawaOOM20,
  author       = {Hayato Ishikawa and
                  Eiji Okamoto and
                  Hiraku Okada and
                  Satoshi Makido},
  title        = {Performance improvement of {V2I} uplink transmission on far vehicles
                  using frequency scheduling-based cooperative {V2V} relay transmission},
  booktitle    = {{IEEE} 17th Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2020, Las Vegas, NV, USA, January 10-13, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCNC46108.2020.9045722},
  doi          = {10.1109/CCNC46108.2020.9045722},
  timestamp    = {Mon, 30 Mar 2020 12:18:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/IshikawaOOM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/MasudaOY20,
  author       = {Yoshihiro Masuda and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Low Complexity Decoding of Downlink Chaos {NOMA} Scheme with Physical
                  Layer Security},
  booktitle    = {{IEEE} 17th Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2020, Las Vegas, NV, USA, January 10-13, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCNC46108.2020.9045697},
  doi          = {10.1109/CCNC46108.2020.9045697},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/MasudaOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/ShiomitsuOMY20,
  author       = {Yusaku Shiomitsu and
                  Eiji Okamoto and
                  Manabu Mikami and
                  Hitoshi Yoshino},
  title        = {Poster: Performance analysis of early {HARQ} retransmission scheme
                  in highway environments},
  booktitle    = {{IEEE} Vehicular Networking Conference, {VNC} 2020, New York, NY,
                  USA, December 16-18, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VNC51378.2020.9318354},
  doi          = {10.1109/VNC51378.2020.9318354},
  timestamp    = {Mon, 25 Jan 2021 11:10:27 +0100},
  biburl       = {https://dblp.org/rec/conf/vnc/ShiomitsuOMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoMY19,
  author       = {Eiji Okamoto and
                  Manabu Mikami and
                  Hitoshi Yoshino},
  title        = {Performance Comparison of Multi-User Shared Multiple Access Scheme
                  in Uplink Channels},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {102-B},
  number       = {8},
  pages        = {1458--1466},
  year         = {2019},
  url          = {https://doi.org/10.1587/transcom.2018TTP0016},
  doi          = {10.1587/TRANSCOM.2018TTP0016},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoMY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/IshikawaOOOM19,
  author       = {Hayato Ishikawa and
                  Eiji Okamoto and
                  Shouhei Okamoto and
                  Hiraku Okada and
                  Satoshi Makido},
  title        = {Performance Analysis of Uplink {V2I} Cooperative Transmission Scheme
                  in Practical Road Environments},
  booktitle    = {33rd International Conference on Information Networking, {ICOIN} 2019,
                  Kuala Lumpur, Malaysia, January 9-11, 2019},
  pages        = {98--102},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICOIN.2019.8718122},
  doi          = {10.1109/ICOIN.2019.8718122},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/IshikawaOOOM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HasegawaOTM19,
  author       = {Ryo Hasegawa and
                  Eiji Okamoto and
                  Hiroyuki Tsuji and
                  Amane Miura},
  title        = {Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications
                  System Using Code Division Multiplexing in Natural Disasters},
  booktitle    = {33rd International Conference on Information Networking, {ICOIN} 2019,
                  Kuala Lumpur, Malaysia, January 9-11, 2019},
  pages        = {103--107},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICOIN.2019.8718128},
  doi          = {10.1109/ICOIN.2019.8718128},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/HasegawaOTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/MasudaOIY19,
  author       = {Yoshihiro Masuda and
                  Eiji Okamoto and
                  Keita Ito and
                  Tetsuya Yamamoto},
  title        = {An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer
                  Security Based on Chaos Modulation},
  booktitle    = {33rd International Conference on Information Networking, {ICOIN} 2019,
                  Kuala Lumpur, Malaysia, January 9-11, 2019},
  pages        = {136--140},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICOIN.2019.8718195},
  doi          = {10.1109/ICOIN.2019.8718195},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/MasudaOIY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/ItoMO19,
  author       = {Keita Ito and
                  Yoshihiro Masuda and
                  Eiji Okamoto},
  title        = {A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding},
  booktitle    = {33rd International Conference on Information Networking, {ICOIN} 2019,
                  Kuala Lumpur, Malaysia, January 9-11, 2019},
  pages        = {262--267},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICOIN.2019.8718168},
  doi          = {10.1109/ICOIN.2019.8718168},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/ItoMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/ShiomitsuOMY19,
  author       = {Yusaku Shiomitsu and
                  Eiji Okamoto and
                  Manabu Mikami and
                  Hitoshi Yoshino},
  title        = {Poster: Effective frame configuration of 5G {URLLC} using open-loop
                  {HARQ} for autonomous driving},
  booktitle    = {2019 {IEEE} Vehicular Networking Conference, {VNC} 2019, Los Angeles,
                  CA, USA, December 4-6, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VNC48660.2019.9062781},
  doi          = {10.1109/VNC48660.2019.9062781},
  timestamp    = {Sun, 19 Apr 2020 11:03:20 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/ShiomitsuOMY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/HoriikeOY18,
  author       = {Naoto Horiike and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {A downlink non-orthogonal multiple access scheme having physical layer
                  security},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2018},
  pages        = {205},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13638-018-1156-8},
  doi          = {10.1186/S13638-018-1156-8},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/HoriikeOY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/TsuchidaNO18,
  author       = {Hikaru Tsuchida and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Expressive Ciphertext-Policy Attribute-Based Encryption with Fast
                  Decryption},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {37--56},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.11.30.037},
  doi          = {10.22667/JISIS.2018.11.30.037},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/TsuchidaNO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/SasakiO18,
  author       = {Kengo Sasaki and
                  Eiji Okamoto},
  title        = {A Study on Indoor Dimming Method Utilizing Outside Light for Power
                  Saving},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November
                  12-15, 2018},
  pages        = {1847--1852},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/APSIPA.2018.8659602},
  doi          = {10.23919/APSIPA.2018.8659602},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/SasakiO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/HoriikeKOY18,
  author       = {Naoto Horiike and
                  Hiroki Kitagawa and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Chaos MIMO-based downlink non-orthogonal multiple access scheme with
                  physical layer security},
  booktitle    = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCNC.2018.8319189},
  doi          = {10.1109/CCNC.2018.8319189},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/HoriikeKOY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/OkamotoHY18,
  author       = {Eiji Okamoto and
                  Naoto Horiike and
                  Tetsuya Yamamoto},
  title        = {Large-Scale Grant-Free Sparse Chaos Code Multiple Access Scheme for
                  5G IoT},
  booktitle    = {88th {IEEE} Vehicular Technology Conference, {VTC} Fall 2018, Chicago,
                  IL, USA, August 27-30, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VTCFall.2018.8690973},
  doi          = {10.1109/VTCFALL.2018.8690973},
  timestamp    = {Mon, 20 Dec 2021 11:29:23 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/OkamotoHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoTYO18,
  author       = {Takeshi Okamoto and
                  Raylin Tso and
                  Michitomo Yamaguchi and
                  Eiji Okamoto},
  title        = {A k-out-of-n Ring Signature with Flexible Participation for Signers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoTYO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinagawaMSNKNH17,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Card-Based Protocols Using Regular Polygon Cards},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1900--1909},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1900},
  doi          = {10.1587/TRANSFUN.E100.A.1900},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiYYNHKO17,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  title        = {Provably Secure Gateway Threshold Password-Based Authenticated Key
                  Exchange Secure against Undetectable On-Line Dictionary Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {12},
  pages        = {2991--3006},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.2991},
  doi          = {10.1587/TRANSFUN.E100.A.2991},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KobayashiYYNHKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/NakagawaNOEHSK17,
  author       = {Sanami Nakagawa and
                  Takashi Nishide and
                  Eiji Okamoto and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Akihisa Kodate},
  title        = {A privacy-enhanced access log management mechanism in {SSO} systems
                  from nominative signatures},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {394--406},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010348},
  doi          = {10.1504/IJACT.2017.10010348},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/NakagawaNOEHSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KitagawaO17,
  author       = {Hiroki Kitagawa and
                  Eiji Okamoto},
  title        = {Performance improvement of non-orthogonal multiple access scheme using
                  code division multiplexing},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {11},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147717744528},
  doi          = {10.1177/1550147717744528},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KitagawaO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/AtBOSY17,
  author       = {Nuray At and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Ismail San and
                  Teppei Yamazaki},
  title        = {A low-area unified hardware architecture for the {AES} and the cryptographic
                  hash function Gr{\o}stl},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {106},
  pages        = {106--120},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jpdc.2017.01.029},
  doi          = {10.1016/J.JPDC.2017.01.029},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/AtBOSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apcc/HoriikeOY17,
  author       = {Naoto Horiike and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Performance improvement of multi-user chaos {MIMO} transmission scheme
                  using dirty paper coding},
  booktitle    = {23rd Asia-Pacific Conference on Communications, {APCC} 2017, Perth,
                  Australia, December 11-13, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/APCC.2017.8303988},
  doi          = {10.23919/APCC.2017.8303988},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apcc/HoriikeOY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KitamuraSNO17,
  author       = {Takuya Kitamura and
                  Kazumasa Shinagawa and
                  Takashi Nishide and
                  Eiji Okamoto},
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {One-time Programs with Cloud Storage and Its Application to Electronic
                  Money},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504.3055507},
  doi          = {10.1145/3055504.3055507},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KitamuraSNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HoriikeOY17,
  author       = {Naoto Horiike and
                  Eiji Okamoto and
                  Tetsuya Yamamoto},
  title        = {Performance improvement of chaos {MIMO} transmission scheme by {LDPC}
                  code concatenation using symbol {MAP} detection and {STBC}},
  booktitle    = {2017 International Conference on Information Networking, {ICOIN} 2017,
                  Da Nang, Vietnam, January 11-13, 2017},
  pages        = {200--205},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICOIN.2017.7899504},
  doi          = {10.1109/ICOIN.2017.7899504},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/HoriikeOY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/KitagawaO17,
  author       = {Hiroki Kitagawa and
                  Eiji Okamoto},
  title        = {Performance improvement of non-orthogonal multiple access scheme using
                  code division multiplexing},
  booktitle    = {2017 International Conference on Information Networking, {ICOIN} 2017,
                  Da Nang, Vietnam, January 11-13, 2017},
  pages        = {327--331},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICOIN.2017.7899453},
  doi          = {10.1109/ICOIN.2017.7899453},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/KitagawaO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/AkiyoshiOTM17,
  author       = {Tomohiro Akiyoshi and
                  Eiji Okamoto and
                  Hiroyuki Tsuji and
                  Amane Miura},
  title        = {Performance improvement of satellite/terrestrial integrated mobile
                  communication system using unmanned aerial vehicle cooperative communications},
  booktitle    = {2017 International Conference on Information Networking, {ICOIN} 2017,
                  Da Nang, Vietnam, January 11-13, 2017},
  pages        = {417--422},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICOIN.2017.7899525},
  doi          = {10.1109/ICOIN.2017.7899525},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/AkiyoshiOTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/OkamotoOIM17,
  author       = {Eiji Okamoto and
                  Hiraku Okada and
                  Yoshinao Ishii and
                  Satoshi Makido},
  title        = {Performance Improvement of Low-Latency {V2I} Uplink Using Superposed
                  Cooperative {V2V} Transmission},
  booktitle    = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto,
                  ON, Canada, September 24-27, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VTCFall.2017.8288284},
  doi          = {10.1109/VTCFALL.2017.8288284},
  timestamp    = {Mon, 20 Dec 2021 11:29:16 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/OkamotoOIM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/OkamotoHY17,
  author       = {Eiji Okamoto and
                  Naoto Horiike and
                  Tetsuya Yamamoto},
  title        = {Sparse chaos code multiple access scheme achieving larger capacity
                  and physical layer security},
  booktitle    = {20th International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2017, Bali, Indonesia, December 17-20, 2017},
  pages        = {604--610},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WPMC.2017.8301884},
  doi          = {10.1109/WPMC.2017.8301884},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpmc/OkamotoHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinagawaMSNKNH16,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Secure Computation Protocols Using Polarizing Cards},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {6},
  pages        = {1122--1131},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1122},
  doi          = {10.1587/TRANSFUN.E99.A.1122},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MurataOMOSIMYT16,
  author       = {Hidekazu Murata and
                  Eiji Okamoto and
                  Manabu Mikami and
                  Akihiro Okazaki and
                  Satoshi Suyama and
                  Takamichi Inoue and
                  Jun Mashino and
                  Tetsuya Yamamoto and
                  Makoto Taromaru},
  title        = {Radio Access Technologies for Fifth Generation Mobile Communications
                  System: Review of Recent Research and Developments in Japan},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {99-B},
  number       = {8},
  pages        = {1638--1647},
  year         = {2016},
  url          = {https://doi.org/10.1587/transcom.2015CCI0004},
  doi          = {10.1587/TRANSCOM.2015CCI0004},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MurataOMOSIMYT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoT16a,
  author       = {Eiji Okamoto and
                  Hiroyuki Tsuji},
  title        = {Application of Non-Orthogonal Multiple Access Scheme for Satellite
                  Downlink in Satellite/Terrestrial Integrated Mobile Communication
                  System with Dual Satellites},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {99-B},
  number       = {10},
  pages        = {2146--2155},
  year         = {2016},
  url          = {https://doi.org/10.1587/transcom.2016ATP0011},
  doi          = {10.1587/TRANSCOM.2016ATP0011},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoT16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KitajimaYNHO16,
  author       = {Nobuaki Kitajima and
                  Naoto Yanai and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions,
                  and Their Extensions},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {2},
  pages        = {275--291},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.275},
  doi          = {10.2197/IPSJJIP.24.275},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/KitajimaYNHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HasegawaKNO16,
  author       = {Keisuke Hasegawa and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Software Library for Ciphertext/Key-Policy Functional Encryption with
                  Simple Usability},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {5},
  pages        = {764--771},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.764},
  doi          = {10.2197/IPSJJIP.24.764},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/HasegawaKNO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShinagawaNNHO16,
  author       = {Kazumasa Shinagawa and
                  Koji Nuida and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Size-Hiding Computation for Multiple Parties},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {937--966},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_31},
  doi          = {10.1007/978-3-662-53890-6\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShinagawaNNHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/TsuchidaNOK16,
  author       = {Hikaru Tsuchida and
                  Takashi Nishide and
                  Eiji Okamoto and
                  Kwangjo Kim},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {Revocable Decentralized Multi-Authority Functional Encryption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {248--265},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_14},
  doi          = {10.1007/978-3-319-49890-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/TsuchidaNOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/ShinagawaNNHO16,
  author       = {Kazumasa Shinagawa and
                  Koji Nuida and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Committed {AND} protocol using three cards with more handy shuffle},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {700--702},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840515/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/ShinagawaNNHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/OkamotoKAK16,
  author       = {Eiji Okamoto and
                  Keisuke Kunitomo and
                  Hidenori Akita and
                  Takuma Kyo},
  title        = {A Cooperative {V2I} Uplink Transmission Scheme Utilizing {V2V} Network
                  Coding},
  booktitle    = {{IEEE} 83rd Vehicular Technology Conference, {VTC} Spring 2016, Nanjing,
                  China, May 15-18, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/VTCSpring.2016.7504059},
  doi          = {10.1109/VTCSPRING.2016.7504059},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/OkamotoKAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2015,
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29814-6},
  doi          = {10.1007/978-3-319-29814-6},
  isbn         = {978-3-319-29813-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoI15,
  author       = {Eiji Okamoto and
                  Yuma Inaba},
  title        = {A Chaos {MIMO} Transmission Scheme Using Turbo Principle for Secure
                  Channel-Coded Transmission},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {98-B},
  number       = {8},
  pages        = {1482--1491},
  year         = {2015},
  url          = {https://doi.org/10.1587/transcom.E98.B.1482},
  doi          = {10.1587/TRANSCOM.E98.B.1482},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HoribaOSM15,
  author       = {Manato Horiba and
                  Eiji Okamoto and
                  Toshiko Shinohara and
                  Katsuhiko Matsumura},
  title        = {An Accurate Indoor-Localization Scheme with {NLOS} Detection and Elimination
                  Exploiting Stochastic Characteristics},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {98-B},
  number       = {9},
  pages        = {1758--1767},
  year         = {2015},
  url          = {https://doi.org/10.1587/transcom.E98.B.1758},
  doi          = {10.1587/TRANSCOM.E98.B.1758},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HoribaOSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/GotoKOO15,
  author       = {Nasato Goto and
                  Akira Kanaoka and
                  Masayuki Okada and
                  Eiji Okamoto},
  title        = {{METRO:} Measurement of End-to-End Route Trust},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {5},
  pages        = {613--622},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.613},
  doi          = {10.2197/IPSJJIP.23.613},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/GotoKOO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apcc/MurataOMOSIMYT15,
  author       = {Hidekazu Murata and
                  Eiji Okamoto and
                  Manabu Mikami and
                  Akihiro Okazaki and
                  Satoshi Suyama and
                  Takamichi Inoue and
                  Jun Mashino and
                  Tetsuya Yamamoto and
                  Makoto Taromaru},
  title        = {R{\&}D activities for 5G in {IEICE} technical committee on radio
                  communication systems},
  booktitle    = {21st Asia-Pacific Conference on Communications, {APCC} 2015, Kyoto,
                  Japan, October 14-16, 2015},
  pages        = {250--256},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/APCC.2015.7412520},
  doi          = {10.1109/APCC.2015.7412520},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/apcc/MurataOMOSIMYT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiuGKO15,
  author       = {Yu Liu and
                  Nasato Goto and
                  Akira Kanaoka and
                  Eiji Okamoto},
  title        = {Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party
                  Computation},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.32},
  doi          = {10.1109/ASIAJCIS.2015.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiuGKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KitajimaYNHO15,
  author       = {Nobuaki Kitajima and
                  Naoto Yanai and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Constructions of Fail-Stop Signatures for Multi-signer Setting},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.26},
  doi          = {10.1109/ASIAJCIS.2015.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KitajimaYNHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HasegawaKNO15,
  author       = {Keisuke Hasegawa and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Software Implementation of Ciphertext-Policy Functional Encryption
                  with Simple Usability},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293020},
  doi          = {10.1109/ICITCS.2015.7293020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HasegawaKNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KanbaraTKNO15,
  author       = {Yusuke Kanbara and
                  Tadanori Teruya and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Software Implementation of a Pairing Function for Public Key Cryptosystems},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293019},
  doi          = {10.1109/ICITCS.2015.7293019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KanbaraTKNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HoribaOSM15,
  author       = {Manato Horiba and
                  Eiji Okamoto and
                  Toshiko Shinohara and
                  Katsuhiko Matsumura},
  title        = {An improved {NLOS} detection scheme using stochastic characteristics
                  for indoor localization},
  booktitle    = {2015 International Conference on Information Networking, {ICOIN} 2015,
                  Siem Reap, Cambodia, January 12-14, 2015},
  pages        = {478--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICOIN.2015.7057951},
  doi          = {10.1109/ICOIN.2015.7057951},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/HoribaOSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/YanaiMTNO15,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Kazuma Tanaka and
                  Takashi Nishide and
                  Eiji Okamoto},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {Another Look at Aggregate Signatures: Their Capability and Security
                  on Network Graphs},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_3},
  doi          = {10.1007/978-3-319-31550-8\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Secure Multi-Party Computation Using Polarizing Cards},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {281--297},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_17},
  doi          = {10.1007/978-3-319-22425-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ShinagawaMSNKNH15,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Multi-party Computation with Small Shuffle Complexity Using Regular
                  Polygon Cards},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_7},
  doi          = {10.1007/978-3-319-26059-4\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ShinagawaMSNKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Gateway Threshold Password-based Authenticated Key Exchange Secure
                  against Undetectable On-line Dictionary Attack},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {39--52},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005539300390052},
  doi          = {10.5220/0005539300390052},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/Okamoto15,
  author       = {Eiji Okamoto},
  title        = {An Improved Proportional Fair Scheduling in Downlink Non-Orthogonal
                  Multiple Access System},
  booktitle    = {{IEEE} 82nd Vehicular Technology Conference, {VTC} Fall 2015, Boston,
                  MA, USA, September 6-9, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/VTCFall.2015.7390839},
  doi          = {10.1109/VTCFALL.2015.7390839},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/Okamoto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KanayamaLOSTU14,
  author       = {Naoki Kanayama and
                  Yang Liu and
                  Eiji Okamoto and
                  Kazutaka Saito and
                  Tadanori Teruya and
                  Shigenori Uchiyama},
  title        = {Implementation of an Elliptic Curve Scalar Multiplication Method Using
                  Division Polynomials},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {300--302},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.300},
  doi          = {10.1587/TRANSFUN.E97.A.300},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KanayamaLOSTU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YanaiCMO14,
  author       = {Naoto Yanai and
                  Eikoh Chida and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A CDH-based Ordered Multisignature Scheme Provably Secure without
                  Random Oracles},
  journal      = {J. Inf. Process.},
  volume       = {22},
  number       = {2},
  pages        = {366--375},
  year         = {2014},
  url          = {https://doi.org/10.2197/ipsjjip.22.366},
  doi          = {10.2197/IPSJJIP.22.366},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/YanaiCMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/OkadaGKO14,
  author       = {Masayuki Okada and
                  Nasato Goto and
                  Akira Kanaoka and
                  Eiji Okamoto},
  title        = {Transparent Probabilistic Packet Marking},
  journal      = {J. Inf. Process.},
  volume       = {22},
  number       = {4},
  pages        = {609--616},
  year         = {2014},
  url          = {https://doi.org/10.2197/ipsjjip.22.609},
  doi          = {10.2197/IPSJJIP.22.609},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/OkadaGKO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/LiuKSTUO14,
  author       = {Yang Liu and
                  Naoki Kanayama and
                  Kazutaka Saito and
                  Tadanori Teruya and
                  Shigenori Uchiyama and
                  Eiji Okamoto},
  title        = {Computing fixed argument pairings with the elliptic net algorithm},
  journal      = {{JSIAM} Lett.},
  volume       = {6},
  pages        = {69--72},
  year         = {2014},
  url          = {https://doi.org/10.14495/jsiaml.6.69},
  doi          = {10.14495/JSIAML.6.69},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/LiuKSTUO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/KramerGO14,
  author       = {Simon Kramer and
                  Rajeev Gor{\'{e}} and
                  Eiji Okamoto},
  title        = {Computer-aided decision-making with trust relations and trust domains
                  (cryptographic applications)},
  journal      = {J. Log. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {19--54},
  year         = {2014},
  url          = {https://doi.org/10.1093/logcom/exs013},
  doi          = {10.1093/LOGCOM/EXS013},
  timestamp    = {Sun, 31 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/logcom/KramerGO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/AtBOSY14,
  author       = {Nuray At and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Ismail San and
                  Teppei Yamazaki},
  title        = {Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and
                  Skein on {FPGA}},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {61-I},
  number       = {2},
  pages        = {485--498},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCSI.2013.2278385},
  doi          = {10.1109/TCSI.2013.2278385},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcas/AtBOSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GotoKOO14,
  author       = {Nasato Goto and
                  Akira Kanaoka and
                  Masayuki Okada and
                  Eiji Okamoto},
  title        = {{METRO:} Measurement of End-to-End Route Trust},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.16},
  doi          = {10.1109/ASIAJCIS.2014.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GotoKOO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/OkamotoHNSM14,
  author       = {Eiji Okamoto and
                  Manato Horiba and
                  Keita Nakashima and
                  Toshiko Shinohara and
                  Katsuhiko Matsumura},
  title        = {Particle swarm optimization-based low-complexity three-dimensional
                  {UWB} localization scheme},
  booktitle    = {Sixth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2014, Shanghai, China, July 8-11, 2014},
  pages        = {120--124},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICUFN.2014.6876763},
  doi          = {10.1109/ICUFN.2014.6876763},
  timestamp    = {Thu, 28 Jul 2022 14:35:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/OkamotoHNSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/YanaiMO14,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A CDH-based ordered multisignature scheme in the standard model with
                  better efficiency},
  booktitle    = {International Symposium on Information Theory and its Applications,
                  {ISITA} 2014, Melbourne, Australia, October 26-29, 2014},
  pages        = {236--240},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6979839/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/YanaiMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YamakawaKNHO14,
  author       = {Takashi Yamakawa and
                  Nobuaki Kitajima and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {A Short Fail-Stop Signature Scheme from Factoring},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {309--316},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_22},
  doi          = {10.1007/978-3-319-12475-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YamakawaKNHO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NakagawaEHKNOS14,
  author       = {Sanami Nakagawa and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Akihisa Kodate and
                  Takashi Nishide and
                  Eiji Okamoto and
                  Yusuke Sakai},
  title        = {A Privacy-Enhanced Access Log Management Mechanism in {SSO} Systems
                  from Nominative Signatures},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {565--574},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.72},
  doi          = {10.1109/TRUSTCOM.2014.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NakagawaEHKNOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KoshimizuO13,
  author       = {Yuta Koshimizu and
                  Eiji Okamoto},
  title        = {An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional
                  Wireless {OFDM} Relay Systems with Analog Network Coding},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {8},
  pages        = {2119--2130},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.2119},
  doi          = {10.1587/TRANSCOM.E96.B.2119},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KoshimizuO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HigurashiKKO13,
  author       = {Ichita Higurashi and
                  Akira Kanaoka and
                  Masahiko Kato and
                  Eiji Okamoto},
  title        = {Detection of Unexpected Services and Communication Paths in Networked
                  Systems},
  journal      = {J. Inf. Process.},
  volume       = {21},
  number       = {4},
  pages        = {632--639},
  year         = {2013},
  url          = {https://doi.org/10.2197/ipsjjip.21.632},
  doi          = {10.2197/IPSJJIP.21.632},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/HigurashiKKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YiO13,
  author       = {Xun Yi and
                  Eiji Okamoto},
  title        = {Practical Internet voting system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {378--387},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.005},
  doi          = {10.1016/J.JNCA.2012.05.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YiO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/OkadaGKO13,
  author       = {Masayuki Okada and
                  Nasato Goto and
                  Akira Kanaoka and
                  Eiji Okamoto},
  title        = {A Device for Transparent Probabilistic Packet Marking},
  booktitle    = {{IEEE} 37th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013},
  pages        = {242--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMPSACW.2013.33},
  doi          = {10.1109/COMPSACW.2013.33},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/OkadaGKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/MitamuraYO13,
  author       = {Yoshinori Mitamura and
                  Tetsuya Yano and
                  Eiji Okamoto},
  title        = {A magnetic fluid seal for rotary blood pumps: Image and computational
                  analyses of behaviors of magnetic fluids},
  booktitle    = {35th Annual International Conference of the {IEEE} Engineering in
                  Medicine and Biology Society, {EMBC} 2013, Osaka, Japan, July 3-7,
                  2013},
  pages        = {663--666},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EMBC.2013.6609587},
  doi          = {10.1109/EMBC.2013.6609587},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/MitamuraYO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/OkamotoKM13,
  author       = {Eiji Okamoto and
                  Sakiko Kikuchi and
                  Yoshinori Mitamura},
  title        = {Evaluation of titanium mesh electrode using for transcutaneous intrabody
                  communication by tissue-electrode impedance},
  booktitle    = {35th Annual International Conference of the {IEEE} Engineering in
                  Medicine and Biology Society, {EMBC} 2013, Osaka, Japan, July 3-7,
                  2013},
  pages        = {667--670},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EMBC.2013.6609588},
  doi          = {10.1109/EMBC.2013.6609588},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/embc/OkamotoKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YanaiMO13,
  author       = {Naoto Yanai and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Yvo Desmedt},
  title        = {An Ordered Multisignature Scheme Under the {CDH} Assumption Without
                  Random Oracles},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {367--377},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_26},
  doi          = {10.1007/978-3-319-27659-5\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/YanaiMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/TanakaOTF13,
  author       = {Akihisa Tanaka and
                  Eiji Okamoto and
                  Hiroyuki Tsuji and
                  Yoshiyuki Fujino},
  editor       = {Roberto Saracco and
                  Khaled Ben Letaief and
                  Mario Gerla and
                  Sergio Palazzo and
                  Luigi Atzori},
  title        = {Interference-aware weighting scheme for satellite/terrestrial integrated
                  mobile communication system},
  booktitle    = {2013 9th International Wireless Communications and Mobile Computing
                  Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013},
  pages        = {1803--1808},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IWCMC.2013.6583830},
  doi          = {10.1109/IWCMC.2013.6583830},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/TanakaOTF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/NiwaKO13,
  author       = {Yusuke Niwa and
                  Akira Kanaoka and
                  Eiji Okamoto},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  James J. Park},
  title        = {Construction of a Multi-domain Functional Encryption System on Functional
                  Information Infrastructure},
  booktitle    = {16th International Conference on Network-Based Information Systems,
                  NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013},
  pages        = {105--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/NBiS.2013.19},
  doi          = {10.1109/NBIS.2013.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/NiwaKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/TeruyaSKKKO13,
  author       = {Tadanori Teruya and
                  Kazutaka Saito and
                  Naoki Kanayama and
                  Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Eiji Okamoto},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Constructing Symmetric Pairings over Supersingular Elliptic Curves
                  with Embedding Degree Three},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_6},
  doi          = {10.1007/978-3-319-04873-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/TeruyaSKKKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtBOSY13,
  author       = {Nuray At and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Ismail San and
                  Teppei Yamazaki},
  title        = {Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and
                  Skein on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtBOSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWMO12,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
                  Confidentialities},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {70--88},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.70},
  doi          = {10.1587/TRANSFUN.E95.A.70},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OguraUKO12,
  author       = {Naoki Ogura and
                  Shigenori Uchiyama and
                  Naoki Kanayama and
                  Eiji Okamoto},
  title        = {A Note on the Pairing Computation Using Normalized Miller Functions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {196--203},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.196},
  doi          = {10.1587/TRANSFUN.E95.A.196},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OguraUKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamashitaOISTT12,
  author       = {Yoshitoshi Yamashita and
                  Eiji Okamoto and
                  Yasunori Iwanami and
                  Yozo Shoji and
                  Morio Toyoshima and
                  Yoshihisa Takayama},
  title        = {A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective
                  Coding Scheme},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {1},
  pages        = {254--262},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.254},
  doi          = {10.1587/TRANSCOM.E95.B.254},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamashitaOISTT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Okamoto12,
  author       = {Eiji Okamoto},
  title        = {A Chaos {MIMO} Transmission Scheme for Channel Coding and Physical-Layer
                  Security},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {4},
  pages        = {1384--1392},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.1384},
  doi          = {10.1587/TRANSCOM.E95.B.1384},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Okamoto12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukudaO12,
  author       = {Kazutaka Fukuda and
                  Eiji Okamoto},
  title        = {Performance Improvement of IMR-Based {NLOS} Detection in Indoor Ultra
                  Wide-Band {TOA} Localization},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {10},
  pages        = {1658--1666},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.1658},
  doi          = {10.1587/TRANSFUN.E95.A.1658},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukudaO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YanaiTMO12,
  author       = {Naoto Yanai and
                  Raylin Tso and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A Certificateless Ordered Sequential Aggregate Signature Scheme Secure
                  against Super Adverssaries},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {30--54},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.030},
  doi          = {10.22667/JOWUA.2012.03.31.030},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YanaiTMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/RahmanHMEO12,
  author       = {Sk. Md. Mizanur Rahman and
                  M. Anwar Hossain and
                  Hussein T. Mouftah and
                  Abdulmotaleb El{-}Saddik and
                  Eiji Okamoto},
  title        = {Chaos-cryptography based privacy preservation technique for video
                  surveillance},
  journal      = {Multim. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {145--155},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00530-011-0246-9},
  doi          = {10.1007/S00530-011-0246-9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mms/RahmanHMEO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KanayamaO12,
  author       = {Naoki Kanayama and
                  Eiji Okamoto},
  title        = {Approach to Pairing Inversions Without Solving Miller Inversion},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {2},
  pages        = {1248--1253},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2011.2173714},
  doi          = {10.1109/TIT.2011.2173714},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KanayamaO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/FukudaO12,
  author       = {Kazutaka Fukuda and
                  Eiji Okamoto},
  editor       = {Younghan Kim and
                  Cheeha Kim and
                  Panjai Tantatsanawong},
  title        = {Performance improvement of {TOA} localization using IMR-based {NLOS}
                  detection in sensor networks},
  booktitle    = {2012 International Conference on Information Networking, {ICOIN} 2012,
                  Bali, Indonesia, February 1-3, 2012},
  pages        = {13--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICOIN.2012.6164341},
  doi          = {10.1109/ICOIN.2012.6164341},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/FukudaO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/Okamoto12,
  author       = {Eiji Okamoto},
  title        = {A secure cooperative relay transmission using chaos {MIMO} scheme},
  booktitle    = {Fourth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2012, Puket, Thailand, July 4-6, 2012},
  pages        = {374--378},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICUFN.2012.6261731},
  doi          = {10.1109/ICUFN.2012.6261731},
  timestamp    = {Wed, 27 Jul 2022 15:52:03 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/Okamoto12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/HigurashiKKO12,
  author       = {Ichita Higurashi and
                  Akira Kanaoka and
                  Masahiko Kato and
                  Eiji Okamoto},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Discovery of Unexpected Services and Communication Paths in Networked
                  Systems},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {169--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_10},
  doi          = {10.1007/978-3-319-01433-3\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/HigurashiKKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KatoMKKO12,
  author       = {Masahiko Kato and
                  Takumi Matsunami and
                  Akira Kanaoka and
                  Hiroshi Koide and
                  Eiji Okamoto},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Tracing Advanced Persistent Threats in Networked Systems},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {179--187},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_11},
  doi          = {10.1007/978-3-319-01433-3\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/KatoMKKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YiTO12,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Identity-based Password-Authenticated Key Exchange for Client/Server
                  Model},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {45--54},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/YiTO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/KoshimizuO12,
  author       = {Yuta Koshimizu and
                  Eiji Okamoto},
  title        = {An Effective Channel Estimation Scheme for Bi-Directional Two-Timeslot
                  {OFDM} Relay Transmission Using Analog Network Coding},
  booktitle    = {Proceedings of the 75th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2012, Yokohama, Japan, May 6-9, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/VETECS.2012.6239996},
  doi          = {10.1109/VETECS.2012.6239996},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/KoshimizuO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtBOSY12,
  author       = {Nuray At and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Ismail San and
                  Teppei Yamazaki},
  title        = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic
                  Hash Function Gr{\o}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtBOSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KanayamaTO11,
  author       = {Naoki Kanayama and
                  Tadanori Teruya and
                  Eiji Okamoto},
  title        = {Scalar Multiplication on Pairing Friendly Elliptic Curves},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1285--1292},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1285},
  doi          = {10.1587/TRANSFUN.E94.A.1285},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KanayamaTO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FuwaOI11,
  author       = {Yasuhiro Fuwa and
                  Eiji Okamoto and
                  Yasunori Iwanami},
  title        = {An Effective Downlink Resource Allocation Scheme Based on {MIMO-OFDMA-CDM}
                  in Cellular System},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {94-B},
  number       = {12},
  pages        = {3550--3558},
  year         = {2011},
  url          = {https://doi.org/10.1587/transcom.E94.B.3550},
  doi          = {10.1587/TRANSCOM.E94.B.3550},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FuwaOI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BeuchatOY11,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {A low-area unified hardware architecture for the {AES} and the cryptographic
                  hash function {ECHO}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {101--121},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0009-8},
  doi          = {10.1007/S13389-011-0009-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BeuchatOY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BeuchatDEOR11,
  author       = {Jean{-}Luc Beuchat and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Fast Architectures for the {\textbackslash}eta{\_}T Pairing over Small-Characteristic
                  Supersingular Elliptic Curves},
  journal      = {{IEEE} Trans. Computers},
  volume       = {60},
  number       = {2},
  pages        = {266--281},
  year         = {2011},
  url          = {https://doi.org/10.1109/TC.2010.163},
  doi          = {10.1109/TC.2010.163},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BeuchatDEOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/YiO11,
  author       = {Xun Yi and
                  Eiji Okamoto},
  editor       = {Kim Normann Andersen and
                  Enrico Francesconi and
                  {\AA}ke Gr{\"{o}}nlund and
                  Tom M. van Engers},
  title        = {Practical Remote End-to-End Voting Scheme},
  booktitle    = {Electronic Government and the Information Systems Perspective - Second
                  International Conference, {EGOVIS} 2011, Toulouse, France, August
                  29 - September 2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6866},
  pages        = {386--400},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22961-9\_30},
  doi          = {10.1007/978-3-642-22961-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/YiO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/OkadaKKO11,
  author       = {Masayuki Okada and
                  Yasuharu Katsuno and
                  Akira Kanaoka and
                  Eiji Okamoto},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Feilong Tang and
                  Fatos Xhafa},
  title        = {32-bit as Number Based {IP} Traceback},
  booktitle    = {Proceedings of the Fifth International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
                  Korea, June 30-July 02, 2011},
  pages        = {628--633},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMIS.2011.95},
  doi          = {10.1109/IMIS.2011.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/OkadaKKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/YanaiTMO11,
  author       = {Naoto Yanai and
                  Raylin Tso and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Certificateless Ordered Sequential Aggregate Signature Scheme},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {662--667},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.60},
  doi          = {10.1109/INCOS.2011.60},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/YanaiTMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OguraKUO11,
  author       = {Naoki Ogura and
                  Naoki Kanayama and
                  Shigenori Uchiyama and
                  Eiji Okamoto},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Cryptographic Pairings Based on Elliptic Nets},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_5},
  doi          = {10.1007/978-3-642-25141-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OguraKUO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MorenoO11,
  author       = {Alberto Moreno and
                  Eiji Okamoto},
  editor       = {Vicente Casares Giner and
                  Pietro Manzoni and
                  Ana Pont},
  title        = {BlueSnarf Revisited: {OBEX} {FTP} Service Directory Traversal},
  booktitle    = {{NETWORKING} 2011 Workshops - International {IFIP} {TC} 6 Workshops,
                  PE-CRN, NC-Pro, WCNS, and {SUNSET} 2011, Held at {NETWORKING} 2011,
                  Valencia, Spain, May 13, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6827},
  pages        = {155--166},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23041-7\_16},
  doi          = {10.1007/978-3-642-23041-7\_16},
  timestamp    = {Mon, 16 Sep 2019 15:26:11 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/MorenoO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/RahmanMAEMO11,
  author       = {Sk. Md. Mizanur Rahman and
                  Md. Mehedi Masud and
                  Carlisle Adams and
                  Khalil El{-}Khatib and
                  Hussein T. Mouftah and
                  Eiji Okamoto},
  title        = {Cryptographic security models for eHealth {P2P} database management
                  systems network},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {164--173},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971979},
  doi          = {10.1109/PST.2011.5971979},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/RahmanMAEMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YiTO11,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Three-party Password-authenticated Key Exchange without Random Oracles},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {15--24},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YiTO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/Okamoto11,
  author       = {Eiji Okamoto},
  title        = {A Chaos {MIMO} Transmission Scheme for Secure Communications on Physical
                  Layer},
  booktitle    = {Proceedings of the 73rd {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2011, 15-18 May 2011, Budapest, Hungary},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/VETECS.2011.5956601},
  doi          = {10.1109/VETECS.2011.5956601},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/Okamoto11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/OkamotoTF11,
  author       = {Eiji Okamoto and
                  Hiroyuki Tsuji and
                  Yoshiyuki Fujino},
  title        = {Performance improvement of {OFDMA} cellular system using code division
                  multiplexing in satellite/terrestrial integrated mobile communication
                  system},
  booktitle    = {14th International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2011, Brest, France, October 3-7, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6081539/},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpmc/OkamotoTF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/TakahashiIO11,
  author       = {Yuya Takahashi and
                  Yasunori Iwanami and
                  Eiji Okamoto},
  title        = {A comparative study on {MIMO} {MLSE} turbo equalizer on frequency
                  selective channels},
  booktitle    = {14th International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2011, Brest, France, October 3-7, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6081455/},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpmc/TakahashiIO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatOY11,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic
                  Hash Function {ECHO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatOY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KramerGO11,
  author       = {Simon Kramer and
                  Rajeev Gor{\'{e}} and
                  Eiji Okamoto},
  title        = {Computer-Aided Decision-Making for Formal Relations and Domains of
                  Trust, Distrust, and Mistrust with Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KramerGO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BeuchatDFIIKKMOOSSSTVY10,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} implementations of the eta\({}_{\mbox{T}}\) pairing
                  in characteristic three},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {73--87},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.05.001},
  doi          = {10.1016/J.COMPELECENG.2009.05.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/BeuchatDFIIKKMOOSSSTVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/RomanovO10,
  author       = {Anton Romanov and
                  Eiji Okamoto},
  title        = {Forecasting of Information Security Related Incidents: Amount of Spam
                  Messages as a Case Study},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {93-B},
  number       = {6},
  pages        = {1411--1421},
  year         = {2010},
  url          = {https://doi.org/10.1587/transcom.E93.B.1411},
  doi          = {10.1587/TRANSCOM.E93.B.1411},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/RomanovO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KozawaIOYO10,
  author       = {Takashi Kozawa and
                  Yasunori Iwanami and
                  Eiji Okamoto and
                  Ryota Yamada and
                  Naoki Okamoto},
  title        = {An Evaluation on Throughput Performance for Type {II} Hybrid-ARQ Using
                  Non-binary Rate-Compatible-Punctured {LDPC} Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {11},
  pages        = {2089--2091},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.2089},
  doi          = {10.1587/TRANSFUN.E93.A.2089},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KozawaIOYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanobuIO10,
  author       = {Satoshi Nakanobu and
                  Yasunori Iwanami and
                  Eiji Okamoto},
  title        = {A Comparative Study on Time Domain Sequential Equalizer with {MLD}
                  and {MLSE} Equalizer on {MIMO} Frequency Selective Channels},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {93-B},
  number       = {11},
  pages        = {3197--3202},
  year         = {2010},
  url          = {https://doi.org/10.1587/transcom.E93.B.3197},
  doi          = {10.1587/TRANSCOM.E93.B.3197},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanobuIO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SatoOO10,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {Strongly unforgeable ID-based signatures without random oracles},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {35--45},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033797},
  doi          = {10.1504/IJACT.2010.033797},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SatoOO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/RomanovTO10,
  author       = {Anton Romanov and
                  Hiroe Tsubaki and
                  Eiji Okamoto},
  title        = {An Approach to Perform Quantitative Information Security Risk Assessment
                  in {IT} Landscapes},
  journal      = {J. Inf. Process.},
  volume       = {18},
  pages        = {213--226},
  year         = {2010},
  url          = {https://doi.org/10.2197/ipsjjip.18.213},
  doi          = {10.2197/IPSJJIP.18.213},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/RomanovTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/KramerGO10,
  author       = {Simon Kramer and
                  Rajeev Gor{\'{e}} and
                  Eiji Okamoto},
  title        = {Formal definitions and complexity results for trust relations and
                  trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography},
  journal      = {{SIGACT} News},
  volume       = {41},
  number       = {1},
  pages        = {75--98},
  year         = {2010},
  url          = {https://doi.org/10.1145/1753171.1753193},
  doi          = {10.1145/1753171.1753193},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigact/KramerGO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/TsoYIOO10,
  author       = {Raylin Tso and
                  Xun Yi and
                  Tadahiko Ito and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Bing Xie and
                  J{\"{u}}rgen Branke and
                  Seyed Masoud Sadjadi and
                  Daqing Zhang and
                  Xingshe Zhou},
  title        = {Design and Analysis of "Flexible" \emph{k}-out-of-\emph{n}
                  Signatures},
  booktitle    = {Autonomic and Trusted Computing - 7th International Conference, {ATC}
                  2010, Xi'an, China, October 26-29, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6407},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16576-4\_19},
  doi          = {10.1007/978-3-642-16576-4\_19},
  timestamp    = {Wed, 11 Nov 2020 16:58:37 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/TsoYIOO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangWCOS10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Zhenfu Cao and
                  Eiji Okamoto and
                  Jun Shao},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {New Constructions of Public-Key Encryption Schemes from Conjugacy
                  Search Problems},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_1},
  doi          = {10.1007/978-3-642-21518-6\_1},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangWCOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/BeuchatOY10,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  editor       = {Jinian Bian and
                  Qiang Zhou and
                  Peter Athanas and
                  Yajun Ha and
                  Kang Zhao},
  title        = {Compact implementations of {BLAKE-32} and {BLAKE-64} on {FPGA}},
  booktitle    = {Proceedings of the International Conference on Field-Programmable
                  Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing,
                  China},
  pages        = {170--177},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/FPT.2010.5681776},
  doi          = {10.1109/FPT.2010.5681776},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpt/BeuchatOY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YamashitaOISTT10,
  author       = {Yoshitoshi Yamashita and
                  Eiji Okamoto and
                  Yasunori Iwanami and
                  Yozo Shoji and
                  Morio Toyoshima and
                  Yoshihisa Takayama},
  title        = {An Efficient {LDGM} Coding Scheme for Optical Satellite-to-Ground
                  Link Based on a New Channel Model},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683891},
  doi          = {10.1109/GLOCOM.2010.5683891},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YamashitaOISTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangWMO10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
                  Confidentialities},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {383--400},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_27},
  doi          = {10.1007/978-3-642-17650-0\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangWMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/RahmanHMSO10,
  author       = {Sk. Md. Mizanur Rahman and
                  M. Anwar Hossain and
                  Hussein T. Mouftah and
                  Abdulmotaleb El{-}Saddik and
                  Eiji Okamoto},
  title        = {A real-time privacy-sensitive data hiding approach based on chaos
                  cryptography},
  booktitle    = {Proceedings of the 2010 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2010, 19-23 July 2010, Singapore},
  pages        = {72--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICME.2010.5583558},
  doi          = {10.1109/ICME.2010.5583558},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/RahmanHMSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/NakayamaIO10,
  author       = {Kenji Nakayama and
                  Yasunori Iwanami and
                  Eiji Okamoto},
  title        = {{MIMO} {MFSK} receivers using {FDE} and {MLD} on quasi-static frequency
                  selective fading channels},
  booktitle    = {Proceedings of the International Symposium on Information Theory and
                  its Applications, {ISITA} 2010, 17-20 October 2010, Taichung, Taiwan},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISITA.2010.5649237},
  doi          = {10.1109/ISITA.2010.5649237},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/NakayamaIO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/BeuchatGMORT10,
  author       = {Jean{-}Luc Beuchat and
                  Jorge Enrique Gonz{\'{a}}lez{-}D{\'{\i}}az and
                  Shigeo Mitsunari and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Tadanori Teruya},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {High-Speed Software Implementation of the Optimal Ate Pairing over
                  Barreto-Naehrig Curves},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_2},
  doi          = {10.1007/978-3-642-17455-1\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/BeuchatGMORT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/WangWMO10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion
                  Attacks},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {327--346},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_21},
  doi          = {10.1007/978-3-642-17455-1\_21},
  timestamp    = {Fri, 17 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pairing/WangWMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/HaradaKOK10,
  author       = {Toshiki Harada and
                  Akira Kanaoka and
                  Eiji Okamoto and
                  Masahiko Kato},
  title        = {Identifying Potentially-Impacted Area by Vulnerabilities in Networked
                  Systems Using {CVSS}},
  booktitle    = {Tenth Annual International Symposium on Applications and the Internet,
                  {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings},
  pages        = {367--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SAINT.2010.105},
  doi          = {10.1109/SAINT.2010.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/HaradaKOK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AzizIO10,
  author       = {Azlan Abd Aziz and
                  Yasunori Iwanami and
                  Eiji Okamoto},
  title        = {On the Improvement of Maximum Likelihood Detection in Multiple Relay
                  Systems},
  booktitle    = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2010, Proceedings, Sydney, Australia, 18-21 April 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCNC.2010.5506662},
  doi          = {10.1109/WCNC.2010.5506662},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/AzizIO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RahmanMAEMO10,
  author       = {Sk. Md. Mizanur Rahman and
                  Mehedi Masud and
                  Carlisle Adams and
                  Khalil El{-}Khatib and
                  Hussein T. Mouftah and
                  Eiji Okamoto},
  title        = {Pair-wise Cryptographic Models for Secure Data Exchange in {P2P} Database
                  Management Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RahmanMAEMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatOY10,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {Compact Implementations of {BLAKE-32} and {BLAKE-64} on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatOY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OguraKUO10,
  author       = {Naoki Ogura and
                  Naoki Kanayama and
                  Shigenori Uchiyama and
                  Eiji Okamoto},
  title        = {Cryptographic Pairings Based on Elliptic Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OguraKUO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatGMORT10,
  author       = {Jean{-}Luc Beuchat and
                  Jorge Enrique Gonz{\'{a}}lez{-}D{\'{\i}}az and
                  Shigeo Mitsunari and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Tadanori Teruya},
  title        = {High-Speed Software Implementation of the Optimal Ate Pairing over
                  Barreto-Naehrig Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatGMORT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatOY10a,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {A Compact {FPGA} Implementation of the {SHA-3} Candidate {ECHO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatOY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MatsudaKHO09,
  author       = {Seiichi Matsuda and
                  Naoki Kanayama and
                  Florian Hess and
                  Eiji Okamoto},
  title        = {Optimised Versions of the Ate and Twisted Ate Pairings},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {7},
  pages        = {1660--1667},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1660},
  doi          = {10.1587/TRANSFUN.E92.A.1660},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MatsudaKHO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SatoOO09,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {Sender Authenticated Key Agreements without Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1787--1794},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1787},
  doi          = {10.1587/TRANSFUN.E92.A.1787},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SatoOO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KatsunoWKO09,
  author       = {Yasuharu Katsuno and
                  Yuji Watanabe and
                  Michiharu Kudo and
                  Eiji Okamoto},
  title        = {A Pluggable Domain Management Approach for Building Practical Distributed
                  Coalitions},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.73},
  doi          = {10.1109/ARES.2009.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KatsunoWKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BeuchatDEOR09,
  author       = {Jean{-}Luc Beuchat and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Hardware Accelerator for the Tate Pairing in Characteristic Three
                  Based on Karatsuba-Ofman Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_17},
  doi          = {10.1007/978-3-642-04138-9\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BeuchatDEOR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/RomanovO09,
  author       = {Anton Romanov and
                  Eiji Okamoto},
  editor       = {Anas Abou El Kalam and
                  Yves Deswarte and
                  Mahmoud Mostafa},
  title        = {A quantitative approach to assess information security related risks},
  booktitle    = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference
                  on Risks and Security of Internet and Systems, Toulouse, France, October
                  19-22, 2009},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CRISIS.2009.5411970},
  doi          = {10.1109/CRISIS.2009.5411970},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/RomanovO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/RomanovO09,
  author       = {Anton Romanov and
                  Eiji Okamoto},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {A Framework for Building and Managing Secured {ERP} Landscape},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {490--495},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/RomanovO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SatoOO09,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Strongly Unforgeable ID-Based Signatures without Random Oracles},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {35--46},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_4},
  doi          = {10.1007/978-3-642-00843-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SatoOO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/TsoOO09,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Shahram Latifi},
  title        = {Efficient Short Signatures from Pairing},
  booktitle    = {Sixth International Conference on Information Technology: New Generations,
                  {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages        = {417--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITNG.2009.176},
  doi          = {10.1109/ITNG.2009.176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/TsoOO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YiTO09,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {ID-Based Group Password-Authenticated Key Exchange},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_13},
  doi          = {10.1007/978-3-642-04846-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YiTO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RomanovO09,
  author       = {Anton Romanov and
                  Eiji Okamoto},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Approach for Designing of Enterprise {IT} Landscapes to Perform
                  Quantitave Information Security Risk Assessment},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {313--318},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RomanovO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatDEOR09,
  author       = {Jean{-}Luc Beuchat and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Hardware Accelerator for the Tate Pairing in Characteristic Three
                  Based on Karatsuba-Ofman Multipliers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatDEOR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatDEOR09a,
  author       = {Jean{-}Luc Beuchat and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Fast Architectures for the eta\({}_{\mbox{T}}\) Pairing over Small-Characteristic
                  Supersingular Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatDEOR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoOO09,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {Underlying Assumptions and Designated Verifier Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoOO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWCOS09,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Zhenfu Cao and
                  Eiji Okamoto and
                  Jun Shao},
  title        = {New Cryptosystems From CSP-Based Self-Distributive Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/566},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWCOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShiraseTO08,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Some Efficient Algorithms for the Final Exponentiation of eta\({}^{\mbox{T}}\)
                  Pairing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {221--228},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.221},
  doi          = {10.1093/IETFEC/E91-A.1.221},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShiraseTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RahmanNIOMO08,
  author       = {Sk. Md. Mizanur Rahman and
                  Nidal Nasser and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Anonymous authentication and secure communication protocol for wireless
                  mobile \emph{ad hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {2},
  pages        = {179--189},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.4},
  doi          = {10.1002/SEC.4},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RahmanNIOMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BeuchatBDOST08,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Algorithms and Arithmetic Operators for Computing the etaT Pairing
                  in Characteristic Three},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1454--1468},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.103},
  doi          = {10.1109/TC.2008.103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BeuchatBDOST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YiFO08,
  author       = {Xun Yi and
                  Mike Faulkner and
                  Eiji Okamoto},
  title        = {Secure Wireless Sensor Networks},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {497--502},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.99},
  doi          = {10.1109/ARES.2008.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YiFO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/KoideTOO08,
  author       = {Atsushi Koide and
                  Raylin Tso and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {A Restricted Undeniable Designated Verifier Signature},
  booktitle    = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008},
  pages        = {1375--1380},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/APSCC.2008.134},
  doi          = {10.1109/APSCC.2008.134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/KoideTOO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/KoideTO08,
  author       = {Atsushi Koide and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {A Sanitizing Signature Scheme with Indexing},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.63},
  doi          = {10.1109/EUC.2008.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/KoideTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/KoideTO08a,
  author       = {Atsushi Koide and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Convertible Undeniable Partially Blind Signature from Bilinear Pairings},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {77--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.64},
  doi          = {10.1109/EUC.2008.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/KoideTO08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/TsoYOO08,
  author       = {Raylin Tso and
                  Xun Yi and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Frank R. Kschischang and
                  En{-}Hui Yang},
  title        = {Efficient convertible Limited Verifier Signatures},
  booktitle    = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
                  2008, Toronto, ON, Canada, July 6-11, 2008},
  pages        = {230--234},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIT.2008.4594982},
  doi          = {10.1109/ISIT.2008.4594982},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/TsoYOO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TsoOO08,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {1-out-of-},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {45--55},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_4},
  doi          = {10.1007/978-3-540-79104-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TsoOO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShiraseTO08,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {An Efficient Countermeasure against Side Channel Attacks for Pairing
                  Computation},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_21},
  doi          = {10.1007/978-3-540-79104-1\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ShiraseTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/BeuchatBDOR08,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {A Comparison between Hardware Accelerators for the Modified Tate Pairing
                  over F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\) and F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {297--315},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_20},
  doi          = {10.1007/978-3-540-85538-5\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/BeuchatBDOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoOO08,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {Strongly Unforgeable ID-based Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoOO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDOR08,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {A Comparison Between Hardware Accelerators for the Modified Tate Pairing
                  over F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\) and F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cortez-DuarteRBO08,
  author       = {Nidia Cortez{-}Duarte and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto},
  title        = {A Pipelined Karatsuba-Ofman Multiplier over GF(3\({}^{\mbox{97}}\))
                  Amenable for Pairing Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cortez-DuarteRBO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangOMOD07,
  author       = {Lihua Wang and
                  Eiji Okamoto and
                  Ying Miao and
                  Takeshi Okamoto and
                  Hiroshi Doi},
  title        = {An {ID-SP-M4M} Scheme and Its Security Analysis},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {91--100},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.91},
  doi          = {10.1093/IETFEC/E90-A.1.91},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangOMOD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/TsoYO07,
  author       = {Raylin Tso and
                  Xun Yi and
                  Eiji Okamoto},
  editor       = {Jie Li and
                  Minyi Guo and
                  Qun Jin and
                  Yongbing Zhang and
                  Liang{-}Jie Zhang and
                  Hai Jin and
                  Masahiro Mambo and
                  Jiro Tanaka and
                  Hiromu Hayashi},
  title        = {ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing
                  Environments},
  booktitle    = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan},
  pages        = {103--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/APSCC.2007.42},
  doi          = {10.1109/APSCC.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/TsoYO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/BeuchatMOO07,
  author       = {Jean{-}Luc Beuchat and
                  Takanori Miyoshi and
                  Yoshihito Oyama and
                  Eiji Okamoto},
  editor       = {Pedro C. Diniz and
                  Eduardo Marques and
                  Koen Bertels and
                  Marcio Merino Fernandes and
                  Jo{\~{a}}o M. P. Cardoso},
  title        = {Multiplication over F\({}_{\mbox{p\({}^{\mbox{m}}\)}}\) on {FPGA:}
                  {A} Survey},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications, Third
                  International Workshop, {ARC} 2007, Mangaratiba, Brazil, March 27-29,
                  2007},
  series       = {Lecture Notes in Computer Science},
  volume       = {4419},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71431-6\_20},
  doi          = {10.1007/978-3-540-71431-6\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/BeuchatMOO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BeuchatSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {An Algorithm for the nt Pairing Calculation in Characteristic Three
                  and its Hardware Implementation},
  booktitle    = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27
                  June 2007, Montpellier, France},
  pages        = {97--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARITH.2007.10},
  doi          = {10.1109/ARITH.2007.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/BeuchatSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TsoGOO07,
  author       = {Raylin Tso and
                  Chunxiang Gu and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Efficient ID-Based Digital Signatures with Message Recovery},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_4},
  doi          = {10.1007/978-3-540-76969-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/TsoGOO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BeuchatBDO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Arithmetic Operators for Pairing-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {239--255},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_17},
  doi          = {10.1007/978-3-540-74735-2\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BeuchatBDO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TsoOO08,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {ECDSA-Verifiable Signcryption Scheme with Signature Verification on
                  the Signcrypted Message},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {11--24},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_3},
  doi          = {10.1007/978-3-540-79499-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TsoOO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MatsudaKHO07,
  author       = {Seiichi Matsuda and
                  Naoki Kanayama and
                  Florian Hess and
                  Eiji Okamoto},
  editor       = {Steven D. Galbraith},
  title        = {Optimised Versions of the Ate and Twisted Ate Pairings},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {302--312},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_18},
  doi          = {10.1007/978-3-540-77272-9\_18},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MatsudaKHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/TsoNOBO07,
  author       = {Raylin Tso and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Takeshi Okamoto and
                  Colin Boyd and
                  Eiji Okamoto},
  editor       = {Steven D. Galbraith},
  title        = {Verifier-Key-Flexible Universal Designated-Verifier Signatures},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {403--421},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_24},
  doi          = {10.1007/978-3-540-77272-9\_24},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/TsoNOBO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShiraseTO07,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Some Efficient Algorithms for the Final Exponentiation of \emph{eta}
                  \({}_{\mbox{ \emph{T} }}\) Pairing},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {254--268},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_20},
  doi          = {10.1007/978-3-540-72163-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ShiraseTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/TsoOO07,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Shahram Latifi},
  title        = {An Improved Signcryption Scheme and Its Variation},
  booktitle    = {Fourth International Conference on Information Technology: New Generations
                  {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}},
  pages        = {772--778},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITNG.2007.34},
  doi          = {10.1109/ITNG.2007.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/TsoOO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/TakahashiIO07,
  author       = {Yusuke Takahashi and
                  Yasunori Iwanami and
                  Eiji Okamoto},
  title        = {A Comparison of Time Domain Equalizers by Block Processing in {SISO}
                  Single Carrier Transmission},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394026},
  doi          = {10.1109/PIMRC.2007.4394026},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/TakahashiIO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/BeuchatBSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Claude Carlet and
                  Berk Sunar},
  title        = {A Coprocessor for the Final Exponentiation of the \emph{eta} \({}_{\mbox{
                  \emph{T} }}\) Pairing in Characteristic Three},
  booktitle    = {Arithmetic of Finite Fields, First International Workshop, {WAIFI}
                  2007, Madrid, Spain, June 21-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4547},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73074-3\_4},
  doi          = {10.1007/978-3-540-73074-3\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/BeuchatBSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShiraseKTO07,
  author       = {Masaaki Shirase and
                  Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary
                  Extension Degree},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_1},
  doi          = {10.1007/978-3-540-77535-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2007,
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5},
  doi          = {10.1007/978-3-540-73489-5},
  isbn         = {978-3-540-73488-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatsudaKHO07,
  author       = {Seiichi Matsuda and
                  Naoki Kanayama and
                  Florian Hess and
                  Eiji Okamoto},
  title        = {Optimised versions of the Ate and Twisted Ate Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatsudaKHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {A Coprocessor for the Final Exponentiation of the eta\({}_{\mbox{T}}\)
                  Pairing in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto},
  title        = {Arithmetic Operators for Pairing-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {A Refined Algorithm for the eta\({}_{\mbox{T}}\) Pairing Calculation
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDOST07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Algorithms and Arithmetic Operators for Computing the eta\({}_{\mbox{T}}\)
                  Pairing in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDOST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiTO07,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  title        = {ID-Based Group Password-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YiTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangCOMO06,
  author       = {Lihua Wang and
                  Zhenfu Cao and
                  Takeshi Okamoto and
                  Ying Miao and
                  Eiji Okamoto},
  title        = {Authorization-Limited Transformation-Free Proxy Cryptosystems and
                  Their Security Analyses},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {106--114},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.106},
  doi          = {10.1093/IETFEC/E89-A.1.106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangCOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengBDO06,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Eiji Okamoto},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {A Novel Range Test},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_21},
  doi          = {10.1007/11780656\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengBDO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/KawaharaTO06,
  author       = {Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Efficient Implementation of Tate Pairing on a Mobile Phone Using Java},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {396--405},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_42},
  doi          = {10.1007/978-3-540-74377-4\_42},
  timestamp    = {Tue, 19 Nov 2019 12:34:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/KawaharaTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/OkamotoI06,
  author       = {Eiji Okamoto and
                  Yasunori Iwanami},
  title        = {A trellis-coded chaotic modulation scheme},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {5010--5015},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255460},
  doi          = {10.1109/ICC.2006.255460},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/OkamotoI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuct/RahmanIOMO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Frank Stajano and
                  Hyoung Joong Kim and
                  Jong{-}Suk Chae and
                  Seong{-}Dong Kim},
  title        = {Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks},
  booktitle    = {Ubiquitous Convergence Technology, First International Conference,
                  {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4412},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71789-8\_15},
  doi          = {10.1007/978-3-540-71789-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icuct/RahmanIOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/RahmanMIO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Masahiro Mambo and
                  Atsuo Inomata and
                  Eiji Okamoto},
  title        = {An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks},
  booktitle    = {2006 International Symposium on Applications and the Internet {(SAINT}
                  2006), 23-27 January 2006, Phoenix, Arizona, {USA}},
  pages        = {300--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SAINT.2006.13},
  doi          = {10.1109/SAINT.2006.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/RahmanMIO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsoGOO06,
  author       = {Raylin Tso and
                  Chunxiang Gu and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {An Efficient ID-based Digital Signature with Message Recovery Based
                  on Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsoGOO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawaharaTO06,
  author       = {Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Efficient Implementation of Tate Pairing on a Mobile Phone using Java},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawaharaTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatSTO06,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {An Algorithm for the {\(\eta\)}\({}_{\mbox{T}}\) Pairing Calculation
                  in Characteristic Three and its Hardware Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatSTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RahmanIOMO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RahmanIOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangOMO06,
  author       = {Lihua Wang and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A Subject-Delegated Decryption Scheme with "Tightly" Limited
                  Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiraseTO06,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Some Efficient Algorithms for the Final Exponentiation of {\(\eta\)}\({}_{\mbox{T}}\)
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiraseTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LopezMVOD05,
  author       = {Javier L{\'{o}}pez and
                  Jos{\'{e}} A. Montenegro and
                  Jos{\'{e}} Luis Vivas and
                  Eiji Okamoto and
                  Ed Dawson},
  title        = {Specification and design of advanced authentication and authorization
                  services},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {5},
  pages        = {467--478},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2005.01.005},
  doi          = {10.1016/J.CSI.2005.01.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LopezMVOD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PengDNOL05,
  author       = {Kun Peng and
                  Ed Dawson and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Eiji Okamoto and
                  Javier L{\'{o}}pez},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {A Novel Method to Maintain Privacy in Mobile Agent Applications},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_21},
  doi          = {10.1007/11599371\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PengDNOL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccn/TsoOTO05,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {M. Y. Sanadidi},
  title        = {An id-based non-interactive tripartite key agreement protocol with
                  K-resilience},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communications
                  and Computer Networks, October 24-26, 2005, Marina del Rey, CA, {USA}},
  pages        = {38--42},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2005},
  timestamp    = {Thu, 25 Jan 2007 13:10:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ccn/TsoOTO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangOTO05,
  author       = {Lihua Wang and
                  Takeshi Okamoto and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme
                  and an Efficient Protocol for Multiple Keys},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {198--203},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_30},
  doi          = {10.1007/11596981\_30},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangOTO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TsoOO05,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  editor       = {Dengguo Feng and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Practical Strong Designated Verifier Signature Schemes Based on Double
                  Discrete Logarithms},
  booktitle    = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC}
                  2005, Beijing, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3822},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599548\_10},
  doi          = {10.1007/11599548\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TsoOO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/OkamotoIO05,
  author       = {Takeshi Okamoto and
                  Atsuo Inomata and
                  Eiji Okamoto},
  title        = {A Proposal of Short Proxy Signature using Pairing},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {631--635},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.27},
  doi          = {10.1109/ITCC.2005.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/OkamotoIO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdai/OkamotoO05,
  author       = {Eiji Okamoto and
                  Takeshi Okamoto},
  editor       = {Vicen{\c{c}} Torra and
                  Yasuo Narukawa and
                  Sadaaki Miyamoto},
  title        = {Cryptosystems Based on Elliptic Curve Pairing},
  booktitle    = {Modeling Decisions for Artificial Intelligence, Second International
                  Conference, {MDAI} 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3558},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11526018\_3},
  doi          = {10.1007/11526018\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/mdai/OkamotoO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdai/OkamotoTO05,
  author       = {Takeshi Okamoto and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Vicen{\c{c}} Torra and
                  Yasuo Narukawa and
                  Sadaaki Miyamoto},
  title        = {One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols
                  Using Pairing},
  booktitle    = {Modeling Decisions for Artificial Intelligence, Second International
                  Conference, {MDAI} 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3558},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11526018\_13},
  doi          = {10.1007/11526018\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mdai/OkamotoTO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcc/WangOMOD05,
  author       = {Lihua Wang and
                  Eiji Okamoto and
                  Ying Miao and
                  Takeshi Okamoto and
                  Hiroshi Doi},
  editor       = {{\O}yvind Ytrehus},
  title        = {ID-Based Series-Parallel Multisignature Schemes for Multi-Messages
                  from Bilinear Maps},
  booktitle    = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen,
                  Norway, March 14-18, 2005. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3969},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11779360\_23},
  doi          = {10.1007/11779360\_23},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcc/WangOMOD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2005,
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b135818},
  doi          = {10.1007/B135818},
  isbn         = {0-387-25658-X},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekharOO05,
  author       = {Malapati Raja Sekhar and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {On Designatedly Verified (Non-interactive) Watermarking Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekharOO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsoMOO05,
  author       = {Raylin Tso and
                  Ying Miao and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {A Share-Correctable Protocol for the Shamir Threshold Scheme and Its
                  Application to Participant Enrollment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/239},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TsoMOO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SoshiMO04,
  author       = {Masakazu Soshi and
                  Mamoru Maekawa and
                  Eiji Okamoto},
  title        = {The Dynamic-Typed Access Matrix Model and Decidability of the Safety
                  Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {190--203},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_190\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SoshiMO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ItoOIO04,
  author       = {Tadahiko Ito and
                  Takeshi Okamoto and
                  Atsuo Inomata and
                  Eiji Okamoto},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Anonymous traceable disclosure scheme using pairing over elliptic
                  curve},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {48--52},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046301},
  doi          = {10.1145/1046290.1046301},
  timestamp    = {Tue, 15 Feb 2022 16:17:26 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ItoOIO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/0001COMO04,
  author       = {Lihua Wang and
                  Zhenfu Cao and
                  Eiji Okamoto and
                  Ying Miao and
                  Takeshi Okamoto},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Transformation-free proxy cryptosystems and their applications to
                  electronic commerce},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {92--98},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046310},
  doi          = {10.1145/1046290.1046310},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/0001COMO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2004,
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b101042},
  doi          = {10.1007/B101042},
  isbn         = {3-540-23563-9},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RussellDOL03,
  author       = {Selwyn Russell and
                  Ed Dawson and
                  Eiji Okamoto and
                  Javier L{\'{o}}pez},
  title        = {Virtual certificates and synthetic certificates: new paradigms for
                  improving public key validation},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1826--1838},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00078-1},
  doi          = {10.1016/S0140-3664(03)00078-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/RussellDOL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasII/DengO03,
  author       = {Tian{-}Bo Deng and
                  Eiji Okamoto},
  title        = {SVD-based design of fractional-delay 2-D digital filters exploiting
                  specification symmetries},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {50},
  number       = {8},
  pages        = {470--480},
  year         = {2003},
  url          = {https://doi.org/10.1109/TCSII.2003.814809},
  doi          = {10.1109/TCSII.2003.814809},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasII/DengO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/NietoDO03,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Ed Dawson and
                  Eiji Okamoto},
  title        = {Privacy and Trusted Computing},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {383--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232052},
  doi          = {10.1109/DEXA.2003.1232052},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/NietoDO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/KanaokaO03,
  author       = {Akira Kanaoka and
                  Eiji Okamoto},
  title        = {Multivariate Statistical Analysis of Network Traffic for Intrusion
                  Detection},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {472--476},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232068},
  doi          = {10.1109/DEXA.2003.1232068},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/KanaokaO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TsoMO03,
  author       = {Raylin Tso and
                  Ying Miao and
                  Eiji Okamoto},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A New Algorithm for Searching a Consistent Set of Shares in a Threshold
                  Scheme with Cheaters},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {377--385},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_28},
  doi          = {10.1007/978-3-540-24691-6\_28},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/TsoMO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/OkamotoKO03,
  author       = {Takeshi Okamoto and
                  Hirofumi Katsuno and
                  Eiji Okamoto},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {A Fast Signature Scheme Based on New On-line Computation},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {111--121},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_9},
  doi          = {10.1007/10958513\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/OkamotoKO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkamotoLI02,
  author       = {Eiji Okamoto and
                  Huan{-}Bang Li and
                  Tetsushi Ikegami},
  title        = {A Pilot-Symbol-Assisted Fading and Frequency-Offset Compensation Method
                  Using {FFT}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {7},
  pages        = {1656--1664},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_7\_1656},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkamotoLI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/OkamotoO02,
  author       = {Eiji Okamoto and
                  Hiroyo Ogawa},
  title        = {A block-coded modulation method for one-way multimode data transmission},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {50},
  number       = {12},
  pages        = {2124--2135},
  year         = {2002},
  url          = {https://doi.org/10.1109/TCOMM.2002.806493},
  doi          = {10.1109/TCOMM.2002.806493},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/OkamotoO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HendersonCDO02,
  author       = {Marie Henderson and
                  Robert S. Coulter and
                  Ed Dawson and
                  Eiji Okamoto},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Modelling Trust Structures for Public Key Infrastructures},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {56--70},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_5},
  doi          = {10.1007/3-540-45450-0\_5},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HendersonCDO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/MamboOST02,
  author       = {Masahiro Mambo and
                  Eiji Okamoto and
                  Yasushi Sengoku and
                  Takashi Tanaka},
  title        = {Simple and Secure Mobile Access under the Flexible Organization Management},
  booktitle    = {13th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France},
  pages        = {456--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DEXA.2002.1045940},
  doi          = {10.1109/DEXA.2002.1045940},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/MamboOST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DawsonLMO02,
  author       = {Ed Dawson and
                  Javier L{\'{o}}pez and
                  Jos{\'{e}} A. Montenegro and
                  Eiji Okamoto},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {A New Design of Privilege Management Infrastructure for Organizations
                  Using Outsourced {PKI}},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_10},
  doi          = {10.1007/3-540-45811-5\_10},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DawsonLMO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Okamoto02,
  author       = {Eiji Okamoto},
  title        = {Cryptosystems based on polynomials over finite fields},
  booktitle    = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW}
                  2002, 20-25 October 2002, Bangalore, India},
  pages        = {74--77},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ITW.2002.1115420},
  doi          = {10.1109/ITW.2002.1115420},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Okamoto02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/X01,
  author       = {Dieter Gollmann and
                  Catherine A. Meadows and
                  Eiji Okamoto},
  title        = {Editorial},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2001},
  url          = {https://doi.org/10.1007/s102070100004},
  doi          = {10.1007/S102070100004},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/X01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/OkamotoO01,
  author       = {Eiji Okamoto and
                  Hiroyo Ogawa},
  title        = {One-way multimode transmission using block-coded modulation for mobile
                  communications},
  booktitle    = {Proceedings of the 54th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2001, 7-11 October 2001, Atlantic City, New Jersey, {USA}},
  pages        = {136--140},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/VTC.2001.956571},
  doi          = {10.1109/VTC.2001.956571},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/OkamotoO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/YiSWO00,
  author       = {Xun Yi and
                  Chee Kheong Siew and
                  Xiao Feng Wang and
                  Eiji Okamoto},
  title        = {A Secure Agent-based Framework for Internet Trading in Mobile Computing
                  Environments},
  journal      = {Distributed Parallel Databases},
  volume       = {8},
  number       = {1},
  pages        = {85--117},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1008735301014},
  doi          = {10.1023/A:1008735301014},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/YiSWO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DoiMO00,
  author       = {Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {On the Security of the RSA-Based Multisignature Scheme for Various
                  Group Structures},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {352--367},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_29},
  doi          = {10.1007/10718964\_29},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DoiMO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Mitsuru Tada and
                  Yuko Yoshifuji},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Structured ElGamal-Type Multisignature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_31},
  doi          = {10.1007/978-3-540-46588-1\_31},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2000,
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5},
  doi          = {10.1007/3-540-44495-5},
  isbn         = {3-540-41452-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2000,
  editor       = {Josef Pieprzyk and
                  Eiji Okamoto and
                  Jennifer Seberry},
  title        = {Information Security, Third International Workshop, {ISW} 2000, Wollongong,
                  NSW, Australia, December 20-21, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1975},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44456-4},
  doi          = {10.1007/3-540-44456-4},
  isbn         = {3-540-41416-9},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cia/WangLYZO99,
  author       = {Xiao Feng Wang and
                  Kwok{-}Yan Lam and
                  Xun Yi and
                  C. Q. Zhang and
                  Eiji Okamoto},
  editor       = {Matthias Klusch and
                  Onn Shehory and
                  Gerhard Wei{\ss}},
  title        = {Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet
                  Retail Commerce},
  booktitle    = {Cooperative Information Agents III, Third International Workshop,
                  CIA' 99, Uppsala, Sweden, July 31 - August 2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1652},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48414-0\_20},
  doi          = {10.1007/3-540-48414-0\_20},
  timestamp    = {Tue, 08 Mar 2022 10:12:49 +0100},
  biburl       = {https://dblp.org/rec/conf/cia/WangLYZO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/YiKSOH99,
  author       = {Xun Yi and
                  Shigeki Kitazawa and
                  Hisao Sakazaki and
                  Eiji Okamoto and
                  D. Frank Hsu},
  editor       = {Sanguthevar Rajasekaran and
                  Panos M. Pardalos and
                  D. Frank Hsu},
  title        = {An agent-based architecture for securing mobile {IP}},
  booktitle    = {Mobile Networks and Computing, Proceedings of a {DIMACS} Workshop,
                  Piscataway, New Jersey, USA, March 25-27, 1999},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {52},
  pages        = {303--314},
  publisher    = {{DIMACS/AMS}},
  year         = {1999},
  url          = {https://doi.org/10.1090/dimacs/052/19},
  doi          = {10.1090/DIMACS/052/19},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/YiKSOH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OmoteO99,
  author       = {Kazumasa Omote and
                  Eiji Okamoto},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {User Identification System Based on Biometrics for Keystroke},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {216--229},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_18},
  doi          = {10.1007/978-3-540-47942-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/OmoteO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PieprzykO99,
  author       = {Josef Pieprzyk and
                  Eiji Okamoto},
  editor       = {JooSeok Song},
  title        = {Verfiable Secret Sharing and Time Capsules},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_14},
  doi          = {10.1007/10719994\_14},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PieprzykO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/KitazawaYOM99,
  author       = {Shigeki Kitazawa and
                  Xun Yi and
                  Eiji Okamoto and
                  Masahiro Mambo},
  title        = {Improvement of Secure Access Control Agent for Distributed Files},
  booktitle    = {Proceedings of the 1999 International Conference on Parallel Processing
                  Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages        = {185--191},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICPPW.1999.800060},
  doi          = {10.1109/ICPPW.1999.800060},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/KitazawaYOM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/OkamotoTO99,
  author       = {Takeshi Okamoto and
                  Mitsuru Tada and
                  Eiji Okamoto},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {Extended Proxy Signatures for Smart Cards},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_21},
  doi          = {10.1007/3-540-47790-X\_21},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/OkamotoTO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/YiKOWLT99,
  author       = {Xun Yi and
                  S. Kitazawa and
                  Eiji Okamoto and
                  Xiao Feng Wang and
                  Kwok{-}Yan Lam and
                  S. Tu},
  editor       = {Ping Wah Wong and
                  Edward J. Delp III},
  title        = {Agent-based copyright protection architecture for online electronic
                  publishing},
  booktitle    = {Security and Watermarking of Multimedia Contents, San Jose, CA, USA,
                  January 23, 1999},
  series       = {{SPIE} Proceedings},
  volume       = {3657},
  pages        = {484--493},
  publisher    = {{SPIE}},
  year         = {1999},
  url          = {https://doi.org/10.1117/12.344698},
  doi          = {10.1117/12.344698},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/YiKOWLT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/OkamotoLTW99,
  author       = {Eiji Okamoto and
                  Huan{-}Bang Li and
                  Masato Tanaka and
                  Hiromitsu Wakana},
  title        = {A class-coded modulation method using orthogonal wavelets},
  booktitle    = {1999 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  1999, September 21-24, 1999, New Orleans, Louisiana, {USA}},
  pages        = {1158--1161},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/WCNC.1999.796898},
  doi          = {10.1109/WCNC.1999.796898},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/OkamotoLTW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1999,
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/b72231},
  doi          = {10.1007/B72231},
  isbn         = {3-540-66666-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/YiOL98,
  author       = {Xun Yi and
                  Eiji Okamoto and
                  Kwok{-}Yan Lam},
  title        = {An optimized protocol for mobile network authentication and security},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {2},
  number       = {3},
  pages        = {37--39},
  year         = {1998},
  url          = {https://doi.org/10.1145/1321387.1321391},
  doi          = {10.1145/1321387.1321391},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/YiOL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SyukriOM98,
  author       = {Agus Fanar Syukri and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A User Identification System Using Signature Written with Mouse},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {403--414},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053751},
  doi          = {10.1007/BFB0053751},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SyukriOM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dai/WangYLO98,
  author       = {Xiao Feng Wang and
                  Xun Yi and
                  Kwok{-}Yan Lam and
                  Eiji Okamoto},
  editor       = {Chengqi Zhang and
                  Dickson Lukose},
  title        = {Secure Information Gathering Agent for Internet Trading},
  booktitle    = {Multi-Agent Systems: Theories, Languages, and Applications, 4th Australian
                  Workshop on Distributed Artificial Intelligence, Brisbane, Queensland,
                  Australia, July 13, 1998, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1544},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10693067\_13},
  doi          = {10.1007/10693067\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dai/WangYLO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/YiWLOH98,
  author       = {Xun Yi and
                  Xiao Feng Wang and
                  Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  D. Frank Hsu},
  title        = {A Security Auction-Like Negotiation Protocol for Agent-Based Internet
                  Trading},
  booktitle    = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
                  1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  pages        = {197--203},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/RELDIS.1998.740495},
  doi          = {10.1109/RELDIS.1998.740495},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/YiWLOH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/1997,
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0030404},
  doi          = {10.1007/BFB0030404},
  isbn         = {3-540-64382-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/UyematsuO97,
  author       = {Tomohiko Uyematsu and
                  Eiji Okamoto},
  title        = {A construction of codes with exponential error bounds on arbitrary
                  discrete memoryless channels},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {43},
  number       = {3},
  pages        = {992--996},
  year         = {1997},
  url          = {https://doi.org/10.1109/18.568709},
  doi          = {10.1109/18.568709},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/UyematsuO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MamboOS97,
  author       = {Masahiro Mambo and
                  Eiji Okamoto and
                  Kouichi Sakurai},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Protection of Data and Delegated Keys in Digital Distribution},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027934},
  doi          = {10.1007/BFB0027934},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MamboOS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HayashiOM97,
  author       = {Kenichi Hayashi and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Proposal of user identification scheme using mouse},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {144--148},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028470},
  doi          = {10.1007/BFB0028470},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HayashiOM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SakazakiOM97,
  author       = {Hisao Sakazaki and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {The Application of ID-Based Key Distribution Systems to an Elliptic
                  Curve},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030434},
  doi          = {10.1007/BFB0030434},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/SakazakiOM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MamboMO97,
  author       = {Masahiro Mambo and
                  Takanori Murayama and
                  Eiji Okamoto},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {A tentative approach to constructing tamper-resistant software},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283736},
  doi          = {10.1145/283699.283736},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MamboMO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MamboSO96,
  author       = {Masahiro Mambo and
                  Kouichi Sakurai and
                  Eiji Okamoto},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {How to Utilize the Transformability of Digital Signatures for Solving
                  the Oracle Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {322--333},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034858},
  doi          = {10.1007/BFB0034858},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MamboSO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MamboUO96,
  author       = {Masahiro Mambo and
                  Keisuke Usuda and
                  Eiji Okamoto},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Proxy Signatures for Delegating Signing Operation},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {48--57},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238185},
  doi          = {10.1145/238168.238185},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MamboUO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/OkamotoLI96,
  author       = {Eiji Okamoto and
                  Huan{-}Bang Li and
                  Tetsushi Ikegami},
  title        = {Rayleigh fading compensation for {QAM} by using {FFT}},
  booktitle    = {The 7th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 1996, Taipei, Taiwan, October 15-18,
                  1996},
  pages        = {1079--1082},
  year         = {1996},
  url          = {https://doi.org/10.1109/PIMRC.1996.568448},
  doi          = {10.1109/PIMRC.1996.568448},
  timestamp    = {Thu, 28 May 2020 11:01:18 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/OkamotoLI96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoUM95,
  author       = {Eiji Okamoto and
                  Tomohiko Uyematsu and
                  Masahiro Mambo},
  title        = {Permutation Cipher Scheme Using Polynomials over a Field},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {78-D},
  number       = {2},
  pages        = {138--142},
  year         = {1995},
  url          = {http://search.ieice.org/bin/summary.php?id=e78-d\_2\_138},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoUM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TsunooOU94,
  author       = {Yukiyasu Tsunoo and
                  Eiji Okamoto and
                  Tomohiko Uyematsu},
  editor       = {Yvo Desmedt},
  title        = {Ciphertext Only Attack for One-way Function of the {MAP} Using One
                  Ciphertext},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {369--382},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_34},
  doi          = {10.1007/3-540-48658-5\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TsunooOU94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TanakaO91,
  author       = {Kazue Tanaka and
                  Eiji Okamoto},
  title        = {Key distribution system for mail systems using ID-related information
                  directory},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {25--33},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90052-F},
  doi          = {10.1016/0167-4048(91)90052-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TanakaO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/OkamotoT90,
  author       = {Eiji Okamoto and
                  Kazue Tanaka},
  title        = {Proposal for Cryptographic Key Distribution System Based on Identification
                  Information},
  journal      = {Syst. Comput. Jpn.},
  volume       = {21},
  number       = {4},
  pages        = {76--84},
  year         = {1990},
  url          = {https://doi.org/10.1002/scj.4690210408},
  doi          = {10.1002/SCJ.4690210408},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/OkamotoT90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/OkamotoT89,
  author       = {Eiji Okamoto and
                  Kazue Tanaka},
  title        = {Identity-based information security management system for personal
                  computer networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {7},
  number       = {2},
  pages        = {290--294},
  year         = {1989},
  url          = {https://doi.org/10.1109/49.17700},
  doi          = {10.1109/49.17700},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/OkamotoT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/OkamotoT89a,
  author       = {Eiji Okamoto and
                  Kazue Tanaka},
  title        = {Key distribution system based on identification information},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {7},
  number       = {4},
  pages        = {481--485},
  year         = {1989},
  url          = {https://doi.org/10.1109/49.17711},
  doi          = {10.1109/49.17711},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/OkamotoT89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Okamoto88,
  author       = {Eiji Okamoto},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Substantial Number of Cryptographic Keys and Its Application to Encryption
                  Designs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {361--373},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_34},
  doi          = {10.1007/3-540-45961-8\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Okamoto88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Okamoto87,
  author       = {Eiji Okamoto},
  editor       = {Carl Pomerance},
  title        = {Key Distribution Systems Based on Identification Information},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {194--202},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_15},
  doi          = {10.1007/3-540-48184-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Okamoto87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoN85,
  author       = {Eiji Okamoto and
                  K. Nakamura},
  editor       = {Hugh C. Williams},
  title        = {Lifetimes of Keys in Cryptographic Key Management Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {246--259},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_19},
  doi          = {10.1007/3-540-39799-X\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoN85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics