Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Eiji Okamoto
@article{DBLP:journals/ieicetb/AsanoOAOY23, author = {Keisuke Asano and Mamoru Okumura and Takumi Abe and Eiji Okamoto and Tetsuya Yamamoto}, title = {High-Quality Secure Wireless Transmission Scheme Using Polar Codes and Radio-Wave Encrypted Modulation}, journal = {{IEICE} Trans. Commun.}, volume = {106}, number = {4}, pages = {374--383}, year = {2023}, url = {https://doi.org/10.1587/transcom.2022ebp3098}, doi = {10.1587/TRANSCOM.2022EBP3098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/AsanoOAOY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetb/TomitaOO23, author = {Kenya Tomita and Mamoru Okumura and Eiji Okamoto}, title = {Demonstration of Chaos-Based Radio Encryption Modulation Scheme through Wired Transmission Experiments}, journal = {{IEICE} Trans. Commun.}, volume = {106}, number = {8}, pages = {686--695}, year = {2023}, url = {https://doi.org/10.1587/transcom.2022ebt0005}, doi = {10.1587/TRANSCOM.2022EBT0005}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/TomitaOO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetb/Okamoto23, author = {Eiji Okamoto}, title = {Foreword}, journal = {{IEICE} Trans. Commun.}, volume = {106}, number = {9}, pages = {723}, year = {2023}, url = {https://doi.org/10.1587/transcom.2022fgf0001}, doi = {10.1587/TRANSCOM.2022FGF0001}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/Okamoto23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetb/AsanoAKOY23, author = {Keisuke Asano and Takumi Abe and Kenta Kato and Eiji Okamoto and Tetsuya Yamamoto}, title = {High-Quality and Low-Complexity Polar-Coded Radio-Wave Encrypted Modulation Utilizing Multipurpose Frozen Bits}, journal = {{IEICE} Trans. Commun.}, volume = {106}, number = {10}, pages = {987--996}, year = {2023}, url = {https://doi.org/10.1587/transcom.2022ebt0007}, doi = {10.1587/TRANSCOM.2022EBT0007}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/AsanoAKOY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/OkamotoYSNIY23, author = {Eiji Okamoto and Yuma Yamashita and Yohei Satoh and Mitsuhiro Nakadai and Takamasa Itahashi and Shiro Yamakawa}, title = {Performance Comparison of Channel Coding Methods for Optical Satellite Data Relay System}, booktitle = {34th {IEEE} Annual International Symposium on Personal, Indoor and Mobile Radio Communications {PIMRC} 2023, Toronto, ON, Canada, September 5-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PIMRC56721.2023.10294033}, doi = {10.1109/PIMRC56721.2023.10294033}, timestamp = {Mon, 13 Nov 2023 17:50:37 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/OkamotoYSNIY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetb/TomokiOOY22, author = {Kaga Tomoki and Mamoru Okumura and Eiji Okamoto and Tetsuya Yamamoto}, title = {Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear Modulation}, journal = {{IEICE} Trans. Commun.}, volume = {105-B}, number = {5}, pages = {638--647}, year = {2022}, url = {https://doi.org/10.1587/transcom.2021ebp3092}, doi = {10.1587/TRANSCOM.2021EBP3092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/TomokiOOY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetb/OkumuraAAOY22, author = {Mamoru Okumura and Keisuke Asano and Takumi Abe and Eiji Okamoto and Tetsuya Yamamoto}, title = {Performance Improvement of Radio-Wave Encrypted {MIMO} Communications Using Average {LLR} Clipping}, journal = {{IEICE} Trans. Commun.}, volume = {105-B}, number = {8}, pages = {931--943}, year = {2022}, url = {https://doi.org/10.1587/transcom.2021ebt0007}, doi = {10.1587/TRANSCOM.2021EBT0007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetb/OkumuraAAOY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/IshikawaHOXX21, author = {Naoki Ishikawa and Jehad M. Hamamreh and Eiji Okamoto and Chao Xu and Lixia Xiao}, title = {Artificially Time-Varying Differential {MIMO} for Achieving Practical Physical Layer Security}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {2}, pages = {2180--2194}, year = {2021}, url = {https://doi.org/10.1109/OJCOMS.2021.3112486}, doi = {10.1109/OJCOMS.2021.3112486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ojcs/IshikawaHOXX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/OkumuraTOY21, author = {Mamoru Okumura and Kaga Tomoki and Eiji Okamoto and Tetsuya Yamamoto}, title = {Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security}, booktitle = {18th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2021, Las Vegas, NV, USA, January 9-12, 2021}, pages = {1--2}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CCNC49032.2021.9369489}, doi = {10.1109/CCNC49032.2021.9369489}, timestamp = {Fri, 19 Mar 2021 12:19:11 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/OkumuraTOY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/IshikawaOOM20, author = {Hayato Ishikawa and Eiji Okamoto and Hiraku Okada and Satoshi Makido}, title = {Performance improvement of {V2I} uplink transmission on far vehicles using frequency scheduling-based cooperative {V2V} relay transmission}, booktitle = {{IEEE} 17th Annual Consumer Communications {\&} Networking Conference, {CCNC} 2020, Las Vegas, NV, USA, January 10-13, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCNC46108.2020.9045722}, doi = {10.1109/CCNC46108.2020.9045722}, timestamp = {Mon, 30 Mar 2020 12:18:22 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/IshikawaOOM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/MasudaOY20, author = {Yoshihiro Masuda and Eiji Okamoto and Tetsuya Yamamoto}, title = {Low Complexity Decoding of Downlink Chaos {NOMA} Scheme with Physical Layer Security}, booktitle = {{IEEE} 17th Annual Consumer Communications {\&} Networking Conference, {CCNC} 2020, Las Vegas, NV, USA, January 10-13, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCNC46108.2020.9045697}, doi = {10.1109/CCNC46108.2020.9045697}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/MasudaOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/ShiomitsuOMY20, author = {Yusaku Shiomitsu and Eiji Okamoto and Manabu Mikami and Hitoshi Yoshino}, title = {Poster: Performance analysis of early {HARQ} retransmission scheme in highway environments}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2020, New York, NY, USA, December 16-18, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VNC51378.2020.9318354}, doi = {10.1109/VNC51378.2020.9318354}, timestamp = {Mon, 25 Jan 2021 11:10:27 +0100}, biburl = {https://dblp.org/rec/conf/vnc/ShiomitsuOMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoMY19, author = {Eiji Okamoto and Manabu Mikami and Hitoshi Yoshino}, title = {Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels}, journal = {{IEICE} Trans. Commun.}, volume = {102-B}, number = {8}, pages = {1458--1466}, year = {2019}, url = {https://doi.org/10.1587/transcom.2018TTP0016}, doi = {10.1587/TRANSCOM.2018TTP0016}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/IshikawaOOOM19, author = {Hayato Ishikawa and Eiji Okamoto and Shouhei Okamoto and Hiraku Okada and Satoshi Makido}, title = {Performance Analysis of Uplink {V2I} Cooperative Transmission Scheme in Practical Road Environments}, booktitle = {33rd International Conference on Information Networking, {ICOIN} 2019, Kuala Lumpur, Malaysia, January 9-11, 2019}, pages = {98--102}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICOIN.2019.8718122}, doi = {10.1109/ICOIN.2019.8718122}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icoin/IshikawaOOOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/HasegawaOTM19, author = {Ryo Hasegawa and Eiji Okamoto and Hiroyuki Tsuji and Amane Miura}, title = {Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters}, booktitle = {33rd International Conference on Information Networking, {ICOIN} 2019, Kuala Lumpur, Malaysia, January 9-11, 2019}, pages = {103--107}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICOIN.2019.8718128}, doi = {10.1109/ICOIN.2019.8718128}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoin/HasegawaOTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/MasudaOIY19, author = {Yoshihiro Masuda and Eiji Okamoto and Keita Ito and Tetsuya Yamamoto}, title = {An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation}, booktitle = {33rd International Conference on Information Networking, {ICOIN} 2019, Kuala Lumpur, Malaysia, January 9-11, 2019}, pages = {136--140}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICOIN.2019.8718195}, doi = {10.1109/ICOIN.2019.8718195}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoin/MasudaOIY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/ItoMO19, author = {Keita Ito and Yoshihiro Masuda and Eiji Okamoto}, title = {A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding}, booktitle = {33rd International Conference on Information Networking, {ICOIN} 2019, Kuala Lumpur, Malaysia, January 9-11, 2019}, pages = {262--267}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICOIN.2019.8718168}, doi = {10.1109/ICOIN.2019.8718168}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoin/ItoMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/ShiomitsuOMY19, author = {Yusaku Shiomitsu and Eiji Okamoto and Manabu Mikami and Hitoshi Yoshino}, title = {Poster: Effective frame configuration of 5G {URLLC} using open-loop {HARQ} for autonomous driving}, booktitle = {2019 {IEEE} Vehicular Networking Conference, {VNC} 2019, Los Angeles, CA, USA, December 4-6, 2019}, pages = {1--2}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VNC48660.2019.9062781}, doi = {10.1109/VNC48660.2019.9062781}, timestamp = {Sun, 19 Apr 2020 11:03:20 +0200}, biburl = {https://dblp.org/rec/conf/vnc/ShiomitsuOMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/HoriikeOY18, author = {Naoto Horiike and Eiji Okamoto and Tetsuya Yamamoto}, title = {A downlink non-orthogonal multiple access scheme having physical layer security}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {205}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1156-8}, doi = {10.1186/S13638-018-1156-8}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/HoriikeOY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/TsuchidaNO18, author = {Hikaru Tsuchida and Takashi Nishide and Eiji Okamoto}, title = {Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {4}, pages = {37--56}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.11.30.037}, doi = {10.22667/JISIS.2018.11.30.037}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/TsuchidaNO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/SasakiO18, author = {Kengo Sasaki and Eiji Okamoto}, title = {A Study on Indoor Dimming Method Utilizing Outside Light for Power Saving}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018}, pages = {1847--1852}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/APSIPA.2018.8659602}, doi = {10.23919/APSIPA.2018.8659602}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/SasakiO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/HoriikeKOY18, author = {Naoto Horiike and Hiroki Kitagawa and Eiji Okamoto and Tetsuya Yamamoto}, title = {Chaos MIMO-based downlink non-orthogonal multiple access scheme with physical layer security}, booktitle = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCNC.2018.8319189}, doi = {10.1109/CCNC.2018.8319189}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/HoriikeKOY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/OkamotoHY18, author = {Eiji Okamoto and Naoto Horiike and Tetsuya Yamamoto}, title = {Large-Scale Grant-Free Sparse Chaos Code Multiple Access Scheme for 5G IoT}, booktitle = {88th {IEEE} Vehicular Technology Conference, {VTC} Fall 2018, Chicago, IL, USA, August 27-30, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VTCFall.2018.8690973}, doi = {10.1109/VTCFALL.2018.8690973}, timestamp = {Mon, 20 Dec 2021 11:29:23 +0100}, biburl = {https://dblp.org/rec/conf/vtc/OkamotoHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoTYO18, author = {Takeshi Okamoto and Raylin Tso and Michitomo Yamaguchi and Eiji Okamoto}, title = {A k-out-of-n Ring Signature with Flexible Participation for Signers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2018}, url = {https://eprint.iacr.org/2018/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoTYO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinagawaMSNKNH17, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Card-Based Protocols Using Regular Polygon Cards}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1900--1909}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1900}, doi = {10.1587/TRANSFUN.E100.A.1900}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KobayashiYYNHKO17, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, title = {Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {12}, pages = {2991--3006}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.2991}, doi = {10.1587/TRANSFUN.E100.A.2991}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/KobayashiYYNHKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/NakagawaNOEHSK17, author = {Sanami Nakagawa and Takashi Nishide and Eiji Okamoto and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Akihisa Kodate}, title = {A privacy-enhanced access log management mechanism in {SSO} systems from nominative signatures}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {394--406}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010348}, doi = {10.1504/IJACT.2017.10010348}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/NakagawaNOEHSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KitagawaO17, author = {Hiroki Kitagawa and Eiji Okamoto}, title = {Performance improvement of non-orthogonal multiple access scheme using code division multiplexing}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {11}, year = {2017}, url = {https://doi.org/10.1177/1550147717744528}, doi = {10.1177/1550147717744528}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KitagawaO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/AtBOSY17, author = {Nuray At and Jean{-}Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {A low-area unified hardware architecture for the {AES} and the cryptographic hash function Gr{\o}stl}, journal = {J. Parallel Distributed Comput.}, volume = {106}, pages = {106--120}, year = {2017}, url = {https://doi.org/10.1016/j.jpdc.2017.01.029}, doi = {10.1016/J.JPDC.2017.01.029}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/AtBOSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apcc/HoriikeOY17, author = {Naoto Horiike and Eiji Okamoto and Tetsuya Yamamoto}, title = {Performance improvement of multi-user chaos {MIMO} transmission scheme using dirty paper coding}, booktitle = {23rd Asia-Pacific Conference on Communications, {APCC} 2017, Perth, Australia, December 11-13, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/APCC.2017.8303988}, doi = {10.23919/APCC.2017.8303988}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apcc/HoriikeOY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KitamuraSNO17, author = {Takuya Kitamura and Kazumasa Shinagawa and Takashi Nishide and Eiji Okamoto}, editor = {Joonsang Baek and Rui Zhang}, title = {One-time Programs with Cloud Storage and Its Application to Electronic Money}, booktitle = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {25--30}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504.3055507}, doi = {10.1145/3055504.3055507}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KitamuraSNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/HoriikeOY17, author = {Naoto Horiike and Eiji Okamoto and Tetsuya Yamamoto}, title = {Performance improvement of chaos {MIMO} transmission scheme by {LDPC} code concatenation using symbol {MAP} detection and {STBC}}, booktitle = {2017 International Conference on Information Networking, {ICOIN} 2017, Da Nang, Vietnam, January 11-13, 2017}, pages = {200--205}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICOIN.2017.7899504}, doi = {10.1109/ICOIN.2017.7899504}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/HoriikeOY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/KitagawaO17, author = {Hiroki Kitagawa and Eiji Okamoto}, title = {Performance improvement of non-orthogonal multiple access scheme using code division multiplexing}, booktitle = {2017 International Conference on Information Networking, {ICOIN} 2017, Da Nang, Vietnam, January 11-13, 2017}, pages = {327--331}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICOIN.2017.7899453}, doi = {10.1109/ICOIN.2017.7899453}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/KitagawaO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/AkiyoshiOTM17, author = {Tomohiro Akiyoshi and Eiji Okamoto and Hiroyuki Tsuji and Amane Miura}, title = {Performance improvement of satellite/terrestrial integrated mobile communication system using unmanned aerial vehicle cooperative communications}, booktitle = {2017 International Conference on Information Networking, {ICOIN} 2017, Da Nang, Vietnam, January 11-13, 2017}, pages = {417--422}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICOIN.2017.7899525}, doi = {10.1109/ICOIN.2017.7899525}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/AkiyoshiOTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/OkamotoOIM17, author = {Eiji Okamoto and Hiraku Okada and Yoshinao Ishii and Satoshi Makido}, title = {Performance Improvement of Low-Latency {V2I} Uplink Using Superposed Cooperative {V2V} Transmission}, booktitle = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto, ON, Canada, September 24-27, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VTCFall.2017.8288284}, doi = {10.1109/VTCFALL.2017.8288284}, timestamp = {Mon, 20 Dec 2021 11:29:16 +0100}, biburl = {https://dblp.org/rec/conf/vtc/OkamotoOIM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/OkamotoHY17, author = {Eiji Okamoto and Naoto Horiike and Tetsuya Yamamoto}, title = {Sparse chaos code multiple access scheme achieving larger capacity and physical layer security}, booktitle = {20th International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2017, Bali, Indonesia, December 17-20, 2017}, pages = {604--610}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WPMC.2017.8301884}, doi = {10.1109/WPMC.2017.8301884}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpmc/OkamotoHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinagawaMSNKNH16, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Secure Computation Protocols Using Polarizing Cards}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {6}, pages = {1122--1131}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1122}, doi = {10.1587/TRANSFUN.E99.A.1122}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MurataOMOSIMYT16, author = {Hidekazu Murata and Eiji Okamoto and Manabu Mikami and Akihiro Okazaki and Satoshi Suyama and Takamichi Inoue and Jun Mashino and Tetsuya Yamamoto and Makoto Taromaru}, title = {Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan}, journal = {{IEICE} Trans. Commun.}, volume = {99-B}, number = {8}, pages = {1638--1647}, year = {2016}, url = {https://doi.org/10.1587/transcom.2015CCI0004}, doi = {10.1587/TRANSCOM.2015CCI0004}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MurataOMOSIMYT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoT16a, author = {Eiji Okamoto and Hiroyuki Tsuji}, title = {Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites}, journal = {{IEICE} Trans. Commun.}, volume = {99-B}, number = {10}, pages = {2146--2155}, year = {2016}, url = {https://doi.org/10.1587/transcom.2016ATP0011}, doi = {10.1587/TRANSCOM.2016ATP0011}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoT16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KitajimaYNHO16, author = {Nobuaki Kitajima and Naoto Yanai and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions}, journal = {J. Inf. Process.}, volume = {24}, number = {2}, pages = {275--291}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.275}, doi = {10.2197/IPSJJIP.24.275}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/KitajimaYNHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HasegawaKNO16, author = {Keisuke Hasegawa and Naoki Kanayama and Takashi Nishide and Eiji Okamoto}, title = {Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability}, journal = {J. Inf. Process.}, volume = {24}, number = {5}, pages = {764--771}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.764}, doi = {10.2197/IPSJJIP.24.764}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/HasegawaKNO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShinagawaNNHO16, author = {Kazumasa Shinagawa and Koji Nuida and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Size-Hiding Computation for Multiple Parties}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {937--966}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_31}, doi = {10.1007/978-3-662-53890-6\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShinagawaNNHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/TsuchidaNOK16, author = {Hikaru Tsuchida and Takashi Nishide and Eiji Okamoto and Kwangjo Kim}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Revocable Decentralized Multi-Authority Functional Encryption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {248--265}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_14}, doi = {10.1007/978-3-319-49890-4\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/TsuchidaNOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/ShinagawaNNHO16, author = {Kazumasa Shinagawa and Koji Nuida and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Committed {AND} protocol using three cards with more handy shuffle}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {700--702}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840515/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/ShinagawaNNHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/OkamotoKAK16, author = {Eiji Okamoto and Keisuke Kunitomo and Hidenori Akita and Takuma Kyo}, title = {A Cooperative {V2I} Uplink Transmission Scheme Utilizing {V2V} Network Coding}, booktitle = {{IEEE} 83rd Vehicular Technology Conference, {VTC} Spring 2016, Nanjing, China, May 15-18, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/VTCSpring.2016.7504059}, doi = {10.1109/VTCSPRING.2016.7504059}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/OkamotoKAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2015, editor = {Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu}, title = {Information and Communications Security - 17th International Conference, {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9543}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29814-6}, doi = {10.1007/978-3-319-29814-6}, isbn = {978-3-319-29813-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoI15, author = {Eiji Okamoto and Yuma Inaba}, title = {A Chaos {MIMO} Transmission Scheme Using Turbo Principle for Secure Channel-Coded Transmission}, journal = {{IEICE} Trans. Commun.}, volume = {98-B}, number = {8}, pages = {1482--1491}, year = {2015}, url = {https://doi.org/10.1587/transcom.E98.B.1482}, doi = {10.1587/TRANSCOM.E98.B.1482}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HoribaOSM15, author = {Manato Horiba and Eiji Okamoto and Toshiko Shinohara and Katsuhiko Matsumura}, title = {An Accurate Indoor-Localization Scheme with {NLOS} Detection and Elimination Exploiting Stochastic Characteristics}, journal = {{IEICE} Trans. Commun.}, volume = {98-B}, number = {9}, pages = {1758--1767}, year = {2015}, url = {https://doi.org/10.1587/transcom.E98.B.1758}, doi = {10.1587/TRANSCOM.E98.B.1758}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HoribaOSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/GotoKOO15, author = {Nasato Goto and Akira Kanaoka and Masayuki Okada and Eiji Okamoto}, title = {{METRO:} Measurement of End-to-End Route Trust}, journal = {J. Inf. Process.}, volume = {23}, number = {5}, pages = {613--622}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.613}, doi = {10.2197/IPSJJIP.23.613}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/GotoKOO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apcc/MurataOMOSIMYT15, author = {Hidekazu Murata and Eiji Okamoto and Manabu Mikami and Akihiro Okazaki and Satoshi Suyama and Takamichi Inoue and Jun Mashino and Tetsuya Yamamoto and Makoto Taromaru}, title = {R{\&}D activities for 5G in {IEICE} technical committee on radio communication systems}, booktitle = {21st Asia-Pacific Conference on Communications, {APCC} 2015, Kyoto, Japan, October 14-16, 2015}, pages = {250--256}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/APCC.2015.7412520}, doi = {10.1109/APCC.2015.7412520}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/apcc/MurataOMOSIMYT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiuGKO15, author = {Yu Liu and Nasato Goto and Akira Kanaoka and Eiji Okamoto}, title = {Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.32}, doi = {10.1109/ASIAJCIS.2015.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiuGKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KitajimaYNHO15, author = {Nobuaki Kitajima and Naoto Yanai and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Constructions of Fail-Stop Signatures for Multi-signer Setting}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.26}, doi = {10.1109/ASIAJCIS.2015.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KitajimaYNHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HasegawaKNO15, author = {Keisuke Hasegawa and Naoki Kanayama and Takashi Nishide and Eiji Okamoto}, title = {Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293020}, doi = {10.1109/ICITCS.2015.7293020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HasegawaKNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KanbaraTKNO15, author = {Yusuke Kanbara and Tadanori Teruya and Naoki Kanayama and Takashi Nishide and Eiji Okamoto}, title = {Software Implementation of a Pairing Function for Public Key Cryptosystems}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293019}, doi = {10.1109/ICITCS.2015.7293019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KanbaraTKNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/HoribaOSM15, author = {Manato Horiba and Eiji Okamoto and Toshiko Shinohara and Katsuhiko Matsumura}, title = {An improved {NLOS} detection scheme using stochastic characteristics for indoor localization}, booktitle = {2015 International Conference on Information Networking, {ICOIN} 2015, Siem Reap, Cambodia, January 12-14, 2015}, pages = {478--482}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICOIN.2015.7057951}, doi = {10.1109/ICOIN.2015.7057951}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/HoribaOSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/YanaiMTNO15, author = {Naoto Yanai and Masahiro Mambo and Kazuma Tanaka and Takashi Nishide and Eiji Okamoto}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {32--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_3}, doi = {10.1007/978-3-319-31550-8\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/YanaiMTNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Secure Multi-Party Computation Using Polarizing Cards}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {281--297}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_17}, doi = {10.1007/978-3-319-22425-1\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ShinagawaMSNKNH15, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {127--146}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_7}, doi = {10.1007/978-3-319-26059-4\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ShinagawaMSNKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {39--52}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005539300390052}, doi = {10.5220/0005539300390052}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/Okamoto15, author = {Eiji Okamoto}, title = {An Improved Proportional Fair Scheduling in Downlink Non-Orthogonal Multiple Access System}, booktitle = {{IEEE} 82nd Vehicular Technology Conference, {VTC} Fall 2015, Boston, MA, USA, September 6-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/VTCFall.2015.7390839}, doi = {10.1109/VTCFALL.2015.7390839}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/Okamoto15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KanayamaLOSTU14, author = {Naoki Kanayama and Yang Liu and Eiji Okamoto and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama}, title = {Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {300--302}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.300}, doi = {10.1587/TRANSFUN.E97.A.300}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KanayamaLOSTU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YanaiCMO14, author = {Naoto Yanai and Eikoh Chida and Masahiro Mambo and Eiji Okamoto}, title = {A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles}, journal = {J. Inf. Process.}, volume = {22}, number = {2}, pages = {366--375}, year = {2014}, url = {https://doi.org/10.2197/ipsjjip.22.366}, doi = {10.2197/IPSJJIP.22.366}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YanaiCMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/OkadaGKO14, author = {Masayuki Okada and Nasato Goto and Akira Kanaoka and Eiji Okamoto}, title = {Transparent Probabilistic Packet Marking}, journal = {J. Inf. Process.}, volume = {22}, number = {4}, pages = {609--616}, year = {2014}, url = {https://doi.org/10.2197/ipsjjip.22.609}, doi = {10.2197/IPSJJIP.22.609}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/OkadaGKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/LiuKSTUO14, author = {Yang Liu and Naoki Kanayama and Kazutaka Saito and Tadanori Teruya and Shigenori Uchiyama and Eiji Okamoto}, title = {Computing fixed argument pairings with the elliptic net algorithm}, journal = {{JSIAM} Lett.}, volume = {6}, pages = {69--72}, year = {2014}, url = {https://doi.org/10.14495/jsiaml.6.69}, doi = {10.14495/JSIAML.6.69}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/LiuKSTUO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/KramerGO14, author = {Simon Kramer and Rajeev Gor{\'{e}} and Eiji Okamoto}, title = {Computer-aided decision-making with trust relations and trust domains (cryptographic applications)}, journal = {J. Log. Comput.}, volume = {24}, number = {1}, pages = {19--54}, year = {2014}, url = {https://doi.org/10.1093/logcom/exs013}, doi = {10.1093/LOGCOM/EXS013}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/logcom/KramerGO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/AtBOSY14, author = {Nuray At and Jean{-}Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on {FPGA}}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {61-I}, number = {2}, pages = {485--498}, year = {2014}, url = {https://doi.org/10.1109/TCSI.2013.2278385}, doi = {10.1109/TCSI.2013.2278385}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcas/AtBOSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GotoKOO14, author = {Nasato Goto and Akira Kanaoka and Masayuki Okada and Eiji Okamoto}, title = {{METRO:} Measurement of End-to-End Route Trust}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.16}, doi = {10.1109/ASIAJCIS.2014.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/GotoKOO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/OkamotoHNSM14, author = {Eiji Okamoto and Manato Horiba and Keita Nakashima and Toshiko Shinohara and Katsuhiko Matsumura}, title = {Particle swarm optimization-based low-complexity three-dimensional {UWB} localization scheme}, booktitle = {Sixth International Conference on Ubiquitous and Future Networks, {ICUFN} 2014, Shanghai, China, July 8-11, 2014}, pages = {120--124}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICUFN.2014.6876763}, doi = {10.1109/ICUFN.2014.6876763}, timestamp = {Thu, 28 Jul 2022 14:35:38 +0200}, biburl = {https://dblp.org/rec/conf/icufn/OkamotoHNSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/YanaiMO14, author = {Naoto Yanai and Masahiro Mambo and Eiji Okamoto}, title = {A CDH-based ordered multisignature scheme in the standard model with better efficiency}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {236--240}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979839/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/YanaiMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YamakawaKNHO14, author = {Takashi Yamakawa and Nobuaki Kitajima and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {A Short Fail-Stop Signature Scheme from Factoring}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {309--316}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_22}, doi = {10.1007/978-3-319-12475-9\_22}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YamakawaKNHO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NakagawaEHKNOS14, author = {Sanami Nakagawa and Keita Emura and Goichiro Hanaoka and Akihisa Kodate and Takashi Nishide and Eiji Okamoto and Yusuke Sakai}, title = {A Privacy-Enhanced Access Log Management Mechanism in {SSO} Systems from Nominative Signatures}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {565--574}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.72}, doi = {10.1109/TRUSTCOM.2014.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NakagawaEHKNOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KoshimizuO13, author = {Yuta Koshimizu and Eiji Okamoto}, title = {An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless {OFDM} Relay Systems with Analog Network Coding}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {8}, pages = {2119--2130}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.2119}, doi = {10.1587/TRANSCOM.E96.B.2119}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KoshimizuO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HigurashiKKO13, author = {Ichita Higurashi and Akira Kanaoka and Masahiko Kato and Eiji Okamoto}, title = {Detection of Unexpected Services and Communication Paths in Networked Systems}, journal = {J. Inf. Process.}, volume = {21}, number = {4}, pages = {632--639}, year = {2013}, url = {https://doi.org/10.2197/ipsjjip.21.632}, doi = {10.2197/IPSJJIP.21.632}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/HigurashiKKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YiO13, author = {Xun Yi and Eiji Okamoto}, title = {Practical Internet voting system}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {378--387}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.005}, doi = {10.1016/J.JNCA.2012.05.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YiO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/OkadaGKO13, author = {Masayuki Okada and Nasato Goto and Akira Kanaoka and Eiji Okamoto}, title = {A Device for Transparent Probabilistic Packet Marking}, booktitle = {{IEEE} 37th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013}, pages = {242--247}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/COMPSACW.2013.33}, doi = {10.1109/COMPSACW.2013.33}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/compsac/OkadaGKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/MitamuraYO13, author = {Yoshinori Mitamura and Tetsuya Yano and Eiji Okamoto}, title = {A magnetic fluid seal for rotary blood pumps: Image and computational analyses of behaviors of magnetic fluids}, booktitle = {35th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2013, Osaka, Japan, July 3-7, 2013}, pages = {663--666}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EMBC.2013.6609587}, doi = {10.1109/EMBC.2013.6609587}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/MitamuraYO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/OkamotoKM13, author = {Eiji Okamoto and Sakiko Kikuchi and Yoshinori Mitamura}, title = {Evaluation of titanium mesh electrode using for transcutaneous intrabody communication by tissue-electrode impedance}, booktitle = {35th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2013, Osaka, Japan, July 3-7, 2013}, pages = {667--670}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EMBC.2013.6609588}, doi = {10.1109/EMBC.2013.6609588}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/embc/OkamotoKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YanaiMO13, author = {Naoto Yanai and Masahiro Mambo and Eiji Okamoto}, editor = {Yvo Desmedt}, title = {An Ordered Multisignature Scheme Under the {CDH} Assumption Without Random Oracles}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {367--377}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_26}, doi = {10.1007/978-3-319-27659-5\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/YanaiMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/TanakaOTF13, author = {Akihisa Tanaka and Eiji Okamoto and Hiroyuki Tsuji and Yoshiyuki Fujino}, editor = {Roberto Saracco and Khaled Ben Letaief and Mario Gerla and Sergio Palazzo and Luigi Atzori}, title = {Interference-aware weighting scheme for satellite/terrestrial integrated mobile communication system}, booktitle = {2013 9th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013}, pages = {1803--1808}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IWCMC.2013.6583830}, doi = {10.1109/IWCMC.2013.6583830}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/TanakaOTF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/NiwaKO13, author = {Yusuke Niwa and Akira Kanaoka and Eiji Okamoto}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa and James J. Park}, title = {Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure}, booktitle = {16th International Conference on Network-Based Information Systems, NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013}, pages = {105--112}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NBiS.2013.19}, doi = {10.1109/NBIS.2013.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/NiwaKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/TeruyaSKKKO13, author = {Tadanori Teruya and Kazutaka Saito and Naoki Kanayama and Yuto Kawahara and Tetsutaro Kobayashi and Eiji Okamoto}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {97--112}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_6}, doi = {10.1007/978-3-319-04873-4\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/TeruyaSKKKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtBOSY13, author = {Nuray At and Jean{-}Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2013}, url = {http://eprint.iacr.org/2013/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtBOSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWMO12, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, title = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {70--88}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.70}, doi = {10.1587/TRANSFUN.E95.A.70}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OguraUKO12, author = {Naoki Ogura and Shigenori Uchiyama and Naoki Kanayama and Eiji Okamoto}, title = {A Note on the Pairing Computation Using Normalized Miller Functions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {196--203}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.196}, doi = {10.1587/TRANSFUN.E95.A.196}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OguraUKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamashitaOISTT12, author = {Yoshitoshi Yamashita and Eiji Okamoto and Yasunori Iwanami and Yozo Shoji and Morio Toyoshima and Yoshihisa Takayama}, title = {A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective Coding Scheme}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {1}, pages = {254--262}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.254}, doi = {10.1587/TRANSCOM.E95.B.254}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamashitaOISTT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Okamoto12, author = {Eiji Okamoto}, title = {A Chaos {MIMO} Transmission Scheme for Channel Coding and Physical-Layer Security}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {4}, pages = {1384--1392}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.1384}, doi = {10.1587/TRANSCOM.E95.B.1384}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Okamoto12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukudaO12, author = {Kazutaka Fukuda and Eiji Okamoto}, title = {Performance Improvement of IMR-Based {NLOS} Detection in Indoor Ultra Wide-Band {TOA} Localization}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {10}, pages = {1658--1666}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.1658}, doi = {10.1587/TRANSFUN.E95.A.1658}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FukudaO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YanaiTMO12, author = {Naoto Yanai and Raylin Tso and Masahiro Mambo and Eiji Okamoto}, title = {A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {30--54}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.030}, doi = {10.22667/JOWUA.2012.03.31.030}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YanaiTMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/RahmanHMEO12, author = {Sk. Md. Mizanur Rahman and M. Anwar Hossain and Hussein T. Mouftah and Abdulmotaleb El{-}Saddik and Eiji Okamoto}, title = {Chaos-cryptography based privacy preservation technique for video surveillance}, journal = {Multim. Syst.}, volume = {18}, number = {2}, pages = {145--155}, year = {2012}, url = {https://doi.org/10.1007/s00530-011-0246-9}, doi = {10.1007/S00530-011-0246-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/RahmanHMEO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KanayamaO12, author = {Naoki Kanayama and Eiji Okamoto}, title = {Approach to Pairing Inversions Without Solving Miller Inversion}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {2}, pages = {1248--1253}, year = {2012}, url = {https://doi.org/10.1109/TIT.2011.2173714}, doi = {10.1109/TIT.2011.2173714}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KanayamaO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/FukudaO12, author = {Kazutaka Fukuda and Eiji Okamoto}, editor = {Younghan Kim and Cheeha Kim and Panjai Tantatsanawong}, title = {Performance improvement of {TOA} localization using IMR-based {NLOS} detection in sensor networks}, booktitle = {2012 International Conference on Information Networking, {ICOIN} 2012, Bali, Indonesia, February 1-3, 2012}, pages = {13--18}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICOIN.2012.6164341}, doi = {10.1109/ICOIN.2012.6164341}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/FukudaO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/Okamoto12, author = {Eiji Okamoto}, title = {A secure cooperative relay transmission using chaos {MIMO} scheme}, booktitle = {Fourth International Conference on Ubiquitous and Future Networks, {ICUFN} 2012, Puket, Thailand, July 4-6, 2012}, pages = {374--378}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICUFN.2012.6261731}, doi = {10.1109/ICUFN.2012.6261731}, timestamp = {Wed, 27 Jul 2022 15:52:03 +0200}, biburl = {https://dblp.org/rec/conf/icufn/Okamoto12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/HigurashiKKO12, author = {Ichita Higurashi and Akira Kanaoka and Masahiko Kato and Eiji Okamoto}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Discovery of Unexpected Services and Communication Paths in Networked Systems}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {169--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_10}, doi = {10.1007/978-3-319-01433-3\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/HigurashiKKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/KatoMKKO12, author = {Masahiko Kato and Takumi Matsunami and Akira Kanaoka and Hiroshi Koide and Eiji Okamoto}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Tracing Advanced Persistent Threats in Networked Systems}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {179--187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_11}, doi = {10.1007/978-3-319-01433-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/KatoMKKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YiTO12, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Identity-based Password-Authenticated Key Exchange for Client/Server Model}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {45--54}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/YiTO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/KoshimizuO12, author = {Yuta Koshimizu and Eiji Okamoto}, title = {An Effective Channel Estimation Scheme for Bi-Directional Two-Timeslot {OFDM} Relay Transmission Using Analog Network Coding}, booktitle = {Proceedings of the 75th {IEEE} Vehicular Technology Conference, {VTC} Spring 2012, Yokohama, Japan, May 6-9, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/VETECS.2012.6239996}, doi = {10.1109/VETECS.2012.6239996}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/KoshimizuO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtBOSY12, author = {Nuray At and Jean{-}Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic Hash Function Gr{\o}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2012}, url = {http://eprint.iacr.org/2012/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtBOSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KanayamaTO11, author = {Naoki Kanayama and Tadanori Teruya and Eiji Okamoto}, title = {Scalar Multiplication on Pairing Friendly Elliptic Curves}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1285--1292}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1285}, doi = {10.1587/TRANSFUN.E94.A.1285}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KanayamaTO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FuwaOI11, author = {Yasuhiro Fuwa and Eiji Okamoto and Yasunori Iwanami}, title = {An Effective Downlink Resource Allocation Scheme Based on {MIMO-OFDMA-CDM} in Cellular System}, journal = {{IEICE} Trans. Commun.}, volume = {94-B}, number = {12}, pages = {3550--3558}, year = {2011}, url = {https://doi.org/10.1587/transcom.E94.B.3550}, doi = {10.1587/TRANSCOM.E94.B.3550}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FuwaOI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BeuchatOY11, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A low-area unified hardware architecture for the {AES} and the cryptographic hash function {ECHO}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {101--121}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0009-8}, doi = {10.1007/S13389-011-0009-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BeuchatOY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BeuchatDEOR11, author = {Jean{-}Luc Beuchat and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Fast Architectures for the {\textbackslash}eta{\_}T Pairing over Small-Characteristic Supersingular Elliptic Curves}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {2}, pages = {266--281}, year = {2011}, url = {https://doi.org/10.1109/TC.2010.163}, doi = {10.1109/TC.2010.163}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BeuchatDEOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/YiO11, author = {Xun Yi and Eiji Okamoto}, editor = {Kim Normann Andersen and Enrico Francesconi and {\AA}ke Gr{\"{o}}nlund and Tom M. van Engers}, title = {Practical Remote End-to-End Voting Scheme}, booktitle = {Electronic Government and the Information Systems Perspective - Second International Conference, {EGOVIS} 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6866}, pages = {386--400}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22961-9\_30}, doi = {10.1007/978-3-642-22961-9\_30}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/egov/YiO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/OkadaKKO11, author = {Masayuki Okada and Yasuharu Katsuno and Akira Kanaoka and Eiji Okamoto}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {32-bit as Number Based {IP} Traceback}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {628--633}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.95}, doi = {10.1109/IMIS.2011.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/OkadaKKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/YanaiTMO11, author = {Naoto Yanai and Raylin Tso and Masahiro Mambo and Eiji Okamoto}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Certificateless Ordered Sequential Aggregate Signature Scheme}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {662--667}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.60}, doi = {10.1109/INCOS.2011.60}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/YanaiTMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OguraKUO11, author = {Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Cryptographic Pairings Based on Elliptic Nets}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {65--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_5}, doi = {10.1007/978-3-642-25141-2\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OguraKUO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/MorenoO11, author = {Alberto Moreno and Eiji Okamoto}, editor = {Vicente Casares Giner and Pietro Manzoni and Ana Pont}, title = {BlueSnarf Revisited: {OBEX} {FTP} Service Directory Traversal}, booktitle = {{NETWORKING} 2011 Workshops - International {IFIP} {TC} 6 Workshops, PE-CRN, NC-Pro, WCNS, and {SUNSET} 2011, Held at {NETWORKING} 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6827}, pages = {155--166}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23041-7\_16}, doi = {10.1007/978-3-642-23041-7\_16}, timestamp = {Mon, 16 Sep 2019 15:26:11 +0200}, biburl = {https://dblp.org/rec/conf/networking/MorenoO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/RahmanMAEMO11, author = {Sk. Md. Mizanur Rahman and Md. Mehedi Masud and Carlisle Adams and Khalil El{-}Khatib and Hussein T. Mouftah and Eiji Okamoto}, title = {Cryptographic security models for eHealth {P2P} database management systems network}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {164--173}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971979}, doi = {10.1109/PST.2011.5971979}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/RahmanMAEMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YiTO11, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Three-party Password-authenticated Key Exchange without Random Oracles}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {15--24}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YiTO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/Okamoto11, author = {Eiji Okamoto}, title = {A Chaos {MIMO} Transmission Scheme for Secure Communications on Physical Layer}, booktitle = {Proceedings of the 73rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2011, 15-18 May 2011, Budapest, Hungary}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/VETECS.2011.5956601}, doi = {10.1109/VETECS.2011.5956601}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/Okamoto11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/OkamotoTF11, author = {Eiji Okamoto and Hiroyuki Tsuji and Yoshiyuki Fujino}, title = {Performance improvement of {OFDMA} cellular system using code division multiplexing in satellite/terrestrial integrated mobile communication system}, booktitle = {14th International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2011, Brest, France, October 3-7, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6081539/}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpmc/OkamotoTF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/TakahashiIO11, author = {Yuya Takahashi and Yasunori Iwanami and Eiji Okamoto}, title = {A comparative study on {MIMO} {MLSE} turbo equalizer on frequency selective channels}, booktitle = {14th International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2011, Brest, France, October 3-7, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6081455/}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpmc/TakahashiIO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatOY11, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic Hash Function {ECHO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2011}, url = {http://eprint.iacr.org/2011/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatOY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KramerGO11, author = {Simon Kramer and Rajeev Gor{\'{e}} and Eiji Okamoto}, title = {Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2011}, url = {http://eprint.iacr.org/2011/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KramerGO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BeuchatDFIIKKMOOSSSTVY10, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} implementations of the eta\({}_{\mbox{T}}\) pairing in characteristic three}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {73--87}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.05.001}, doi = {10.1016/J.COMPELECENG.2009.05.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/BeuchatDFIIKKMOOSSSTVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/RomanovO10, author = {Anton Romanov and Eiji Okamoto}, title = {Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study}, journal = {{IEICE} Trans. Commun.}, volume = {93-B}, number = {6}, pages = {1411--1421}, year = {2010}, url = {https://doi.org/10.1587/transcom.E93.B.1411}, doi = {10.1587/TRANSCOM.E93.B.1411}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/RomanovO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KozawaIOYO10, author = {Takashi Kozawa and Yasunori Iwanami and Eiji Okamoto and Ryota Yamada and Naoki Okamoto}, title = {An Evaluation on Throughput Performance for Type {II} Hybrid-ARQ Using Non-binary Rate-Compatible-Punctured {LDPC} Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {11}, pages = {2089--2091}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.2089}, doi = {10.1587/TRANSFUN.E93.A.2089}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KozawaIOYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanobuIO10, author = {Satoshi Nakanobu and Yasunori Iwanami and Eiji Okamoto}, title = {A Comparative Study on Time Domain Sequential Equalizer with {MLD} and {MLSE} Equalizer on {MIMO} Frequency Selective Channels}, journal = {{IEICE} Trans. Commun.}, volume = {93-B}, number = {11}, pages = {3197--3202}, year = {2010}, url = {https://doi.org/10.1587/transcom.E93.B.3197}, doi = {10.1587/TRANSCOM.E93.B.3197}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakanobuIO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SatoOO10, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Strongly unforgeable ID-based signatures without random oracles}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {35--45}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033797}, doi = {10.1504/IJACT.2010.033797}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SatoOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/RomanovTO10, author = {Anton Romanov and Hiroe Tsubaki and Eiji Okamoto}, title = {An Approach to Perform Quantitative Information Security Risk Assessment in {IT} Landscapes}, journal = {J. Inf. Process.}, volume = {18}, pages = {213--226}, year = {2010}, url = {https://doi.org/10.2197/ipsjjip.18.213}, doi = {10.2197/IPSJJIP.18.213}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/RomanovTO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/KramerGO10, author = {Simon Kramer and Rajeev Gor{\'{e}} and Eiji Okamoto}, title = {Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography}, journal = {{SIGACT} News}, volume = {41}, number = {1}, pages = {75--98}, year = {2010}, url = {https://doi.org/10.1145/1753171.1753193}, doi = {10.1145/1753171.1753193}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigact/KramerGO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/TsoYIOO10, author = {Raylin Tso and Xun Yi and Tadahiko Ito and Takeshi Okamoto and Eiji Okamoto}, editor = {Bing Xie and J{\"{u}}rgen Branke and Seyed Masoud Sadjadi and Daqing Zhang and Xingshe Zhou}, title = {Design and Analysis of "Flexible" \emph{k}-out-of-\emph{n} Signatures}, booktitle = {Autonomic and Trusted Computing - 7th International Conference, {ATC} 2010, Xi'an, China, October 26-29, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6407}, pages = {255--267}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16576-4\_19}, doi = {10.1007/978-3-642-16576-4\_19}, timestamp = {Wed, 11 Nov 2020 16:58:37 +0100}, biburl = {https://dblp.org/rec/conf/atc/TsoYIOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangWCOS10, author = {Lihua Wang and Licheng Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_1}, doi = {10.1007/978-3-642-21518-6\_1}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangWCOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/BeuchatOY10, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, editor = {Jinian Bian and Qiang Zhou and Peter Athanas and Yajun Ha and Kang Zhao}, title = {Compact implementations of {BLAKE-32} and {BLAKE-64} on {FPGA}}, booktitle = {Proceedings of the International Conference on Field-Programmable Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing, China}, pages = {170--177}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/FPT.2010.5681776}, doi = {10.1109/FPT.2010.5681776}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpt/BeuchatOY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YamashitaOISTT10, author = {Yoshitoshi Yamashita and Eiji Okamoto and Yasunori Iwanami and Yozo Shoji and Morio Toyoshima and Yoshihisa Takayama}, title = {An Efficient {LDGM} Coding Scheme for Optical Satellite-to-Ground Link Based on a New Channel Model}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683891}, doi = {10.1109/GLOCOM.2010.5683891}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YamashitaOISTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangWMO10, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {383--400}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_27}, doi = {10.1007/978-3-642-17650-0\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangWMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/RahmanHMSO10, author = {Sk. Md. Mizanur Rahman and M. Anwar Hossain and Hussein T. Mouftah and Abdulmotaleb El{-}Saddik and Eiji Okamoto}, title = {A real-time privacy-sensitive data hiding approach based on chaos cryptography}, booktitle = {Proceedings of the 2010 {IEEE} International Conference on Multimedia and Expo, {ICME} 2010, 19-23 July 2010, Singapore}, pages = {72--77}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICME.2010.5583558}, doi = {10.1109/ICME.2010.5583558}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/RahmanHMSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/NakayamaIO10, author = {Kenji Nakayama and Yasunori Iwanami and Eiji Okamoto}, title = {{MIMO} {MFSK} receivers using {FDE} and {MLD} on quasi-static frequency selective fading channels}, booktitle = {Proceedings of the International Symposium on Information Theory and its Applications, {ISITA} 2010, 17-20 October 2010, Taichung, Taiwan}, pages = {31--36}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISITA.2010.5649237}, doi = {10.1109/ISITA.2010.5649237}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/NakayamaIO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/BeuchatGMORT10, author = {Jean{-}Luc Beuchat and Jorge Enrique Gonz{\'{a}}lez{-}D{\'{\i}}az and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Tadanori Teruya}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {21--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_2}, doi = {10.1007/978-3-642-17455-1\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/BeuchatGMORT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/WangWMO10, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {327--346}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_21}, doi = {10.1007/978-3-642-17455-1\_21}, timestamp = {Fri, 17 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pairing/WangWMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/HaradaKOK10, author = {Toshiki Harada and Akira Kanaoka and Eiji Okamoto and Masahiko Kato}, title = {Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using {CVSS}}, booktitle = {Tenth Annual International Symposium on Applications and the Internet, {SAINT} 2010, Seoul, Korea, 19-23 July, 2010, Proceedings}, pages = {367--370}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SAINT.2010.105}, doi = {10.1109/SAINT.2010.105}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/HaradaKOK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AzizIO10, author = {Azlan Abd Aziz and Yasunori Iwanami and Eiji Okamoto}, title = {On the Improvement of Maximum Likelihood Detection in Multiple Relay Systems}, booktitle = {2010 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2010, Proceedings, Sydney, Australia, 18-21 April 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCNC.2010.5506662}, doi = {10.1109/WCNC.2010.5506662}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/AzizIO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RahmanMAEMO10, author = {Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El{-}Khatib and Hussein T. Mouftah and Eiji Okamoto}, title = {Pair-wise Cryptographic Models for Secure Data Exchange in {P2P} Database Management Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2010}, url = {http://eprint.iacr.org/2010/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RahmanMAEMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatOY10, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {Compact Implementations of {BLAKE-32} and {BLAKE-64} on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2010}, url = {http://eprint.iacr.org/2010/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatOY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OguraKUO10, author = {Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto}, title = {Cryptographic Pairings Based on Elliptic Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2010}, url = {http://eprint.iacr.org/2010/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OguraKUO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatGMORT10, author = {Jean{-}Luc Beuchat and Jorge Enrique Gonz{\'{a}}lez{-}D{\'{\i}}az and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Tadanori Teruya}, title = {High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2010}, url = {http://eprint.iacr.org/2010/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatGMORT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatOY10a, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A Compact {FPGA} Implementation of the {SHA-3} Candidate {ECHO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2010}, url = {http://eprint.iacr.org/2010/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatOY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MatsudaKHO09, author = {Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto}, title = {Optimised Versions of the Ate and Twisted Ate Pairings}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {7}, pages = {1660--1667}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1660}, doi = {10.1587/TRANSFUN.E92.A.1660}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MatsudaKHO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SatoOO09, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Sender Authenticated Key Agreements without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1787--1794}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1787}, doi = {10.1587/TRANSFUN.E92.A.1787}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SatoOO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KatsunoWKO09, author = {Yasuharu Katsuno and Yuji Watanabe and Michiharu Kudo and Eiji Okamoto}, title = {A Pluggable Domain Management Approach for Building Practical Distributed Coalitions}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.73}, doi = {10.1109/ARES.2009.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KatsunoWKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BeuchatDEOR09, author = {Jean{-}Luc Beuchat and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Christophe Clavier and Kris Gaj}, title = {Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {225--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_17}, doi = {10.1007/978-3-642-04138-9\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BeuchatDEOR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/RomanovO09, author = {Anton Romanov and Eiji Okamoto}, editor = {Anas Abou El Kalam and Yves Deswarte and Mahmoud Mostafa}, title = {A quantitative approach to assess information security related risks}, booktitle = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009}, pages = {117--122}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CRISIS.2009.5411970}, doi = {10.1109/CRISIS.2009.5411970}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/crisis/RomanovO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/RomanovO09, author = {Anton Romanov and Eiji Okamoto}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {A Framework for Building and Managing Secured {ERP} Landscape}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {490--495}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/RomanovO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SatoOO09, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Strongly Unforgeable ID-Based Signatures without Random Oracles}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {35--46}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_4}, doi = {10.1007/978-3-642-00843-6\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SatoOO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/TsoOO09, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, editor = {Shahram Latifi}, title = {Efficient Short Signatures from Pairing}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {417--422}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.176}, doi = {10.1109/ITNG.2009.176}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/TsoOO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YiTO09, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {ID-Based Group Password-Authenticated Key Exchange}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {192--211}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_13}, doi = {10.1007/978-3-642-04846-3\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YiTO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RomanovO09, author = {Anton Romanov and Eiji Okamoto}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Approach for Designing of Enterprise {IT} Landscapes to Perform Quantitave Information Security Risk Assessment}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {313--318}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RomanovO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatDEOR09, author = {Jean{-}Luc Beuchat and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2009}, url = {http://eprint.iacr.org/2009/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatDEOR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatDEOR09a, author = {Jean{-}Luc Beuchat and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Fast Architectures for the eta\({}_{\mbox{T}}\) Pairing over Small-Characteristic Supersingular Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2009}, url = {http://eprint.iacr.org/2009/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatDEOR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoOO09, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Underlying Assumptions and Designated Verifier Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2009}, url = {http://eprint.iacr.org/2009/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SatoOO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWCOS09, author = {Licheng Wang and Lihua Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao}, title = {New Cryptosystems From CSP-Based Self-Distributive Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2009}, url = {http://eprint.iacr.org/2009/566}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWCOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShiraseTO08, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {Some Efficient Algorithms for the Final Exponentiation of eta\({}^{\mbox{T}}\) Pairing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {221--228}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.221}, doi = {10.1093/IETFEC/E91-A.1.221}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShiraseTO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RahmanNIOMO08, author = {Sk. Md. Mizanur Rahman and Nidal Nasser and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {Anonymous authentication and secure communication protocol for wireless mobile \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {1}, number = {2}, pages = {179--189}, year = {2008}, url = {https://doi.org/10.1002/sec.4}, doi = {10.1002/SEC.4}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RahmanNIOMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BeuchatBDOST08, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi}, title = {Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1454--1468}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.103}, doi = {10.1109/TC.2008.103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BeuchatBDOST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YiFO08, author = {Xun Yi and Mike Faulkner and Eiji Okamoto}, title = {Secure Wireless Sensor Networks}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {497--502}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.99}, doi = {10.1109/ARES.2008.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/YiFO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/KoideTOO08, author = {Atsushi Koide and Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, title = {A Restricted Undeniable Designated Verifier Signature}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {1375--1380}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.134}, doi = {10.1109/APSCC.2008.134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/KoideTOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/KoideTO08, author = {Atsushi Koide and Raylin Tso and Eiji Okamoto}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {A Sanitizing Signature Scheme with Indexing}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {16--21}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.63}, doi = {10.1109/EUC.2008.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/KoideTO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/KoideTO08a, author = {Atsushi Koide and Raylin Tso and Eiji Okamoto}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Convertible Undeniable Partially Blind Signature from Bilinear Pairings}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {77--82}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.64}, doi = {10.1109/EUC.2008.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/KoideTO08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/TsoYOO08, author = {Raylin Tso and Xun Yi and Takeshi Okamoto and Eiji Okamoto}, editor = {Frank R. Kschischang and En{-}Hui Yang}, title = {Efficient convertible Limited Verifier Signatures}, booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT} 2008, Toronto, ON, Canada, July 6-11, 2008}, pages = {230--234}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISIT.2008.4594982}, doi = {10.1109/ISIT.2008.4594982}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/TsoYOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TsoOO08, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {1-out-of-}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {45--55}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_4}, doi = {10.1007/978-3-540-79104-1\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TsoOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShiraseTO08, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {An Efficient Countermeasure against Side Channel Attacks for Pairing Computation}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {290--303}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_21}, doi = {10.1007/978-3-540-79104-1\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShiraseTO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/BeuchatBDOR08, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {A Comparison between Hardware Accelerators for the Modified Tate Pairing over F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\) and F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {297--315}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_20}, doi = {10.1007/978-3-540-85538-5\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/BeuchatBDOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoOO08, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Strongly Unforgeable ID-based Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2008}, url = {http://eprint.iacr.org/2008/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SatoOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDOR08, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\) and F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2008}, url = {http://eprint.iacr.org/2008/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cortez-DuarteRBO08, author = {Nidia Cortez{-}Duarte and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Jean{-}Luc Beuchat and Eiji Okamoto}, title = {A Pipelined Karatsuba-Ofman Multiplier over GF(3\({}^{\mbox{97}}\)) Amenable for Pairing Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2008}, url = {http://eprint.iacr.org/2008/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cortez-DuarteRBO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2008}, url = {http://eprint.iacr.org/2008/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangOMOD07, author = {Lihua Wang and Eiji Okamoto and Ying Miao and Takeshi Okamoto and Hiroshi Doi}, title = {An {ID-SP-M4M} Scheme and Its Security Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {91--100}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.91}, doi = {10.1093/IETFEC/E90-A.1.91}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangOMOD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/TsoYO07, author = {Raylin Tso and Xun Yi and Eiji Okamoto}, editor = {Jie Li and Minyi Guo and Qun Jin and Yongbing Zhang and Liang{-}Jie Zhang and Hai Jin and Masahiro Mambo and Jiro Tanaka and Hiromu Hayashi}, title = {ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments}, booktitle = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan}, pages = {103--110}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/APSCC.2007.42}, doi = {10.1109/APSCC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/TsoYO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/BeuchatMOO07, author = {Jean{-}Luc Beuchat and Takanori Miyoshi and Yoshihito Oyama and Eiji Okamoto}, editor = {Pedro C. Diniz and Eduardo Marques and Koen Bertels and Marcio Merino Fernandes and Jo{\~{a}}o M. P. Cardoso}, title = {Multiplication over F\({}_{\mbox{p\({}^{\mbox{m}}\)}}\) on {FPGA:} {A} Survey}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications, Third International Workshop, {ARC} 2007, Mangaratiba, Brazil, March 27-29, 2007}, series = {Lecture Notes in Computer Science}, volume = {4419}, pages = {214--225}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71431-6\_20}, doi = {10.1007/978-3-540-71431-6\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/BeuchatMOO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BeuchatSTO07, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation}, booktitle = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27 June 2007, Montpellier, France}, pages = {97--104}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARITH.2007.10}, doi = {10.1109/ARITH.2007.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/BeuchatSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/TsoGOO07, author = {Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Efficient ID-Based Digital Signatures with Message Recovery}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {47--59}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_4}, doi = {10.1007/978-3-540-76969-9\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/TsoGOO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BeuchatBDO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Arithmetic Operators for Pairing-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {239--255}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_17}, doi = {10.1007/978-3-540-74735-2\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BeuchatBDO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TsoOO08, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {11--24}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_3}, doi = {10.1007/978-3-540-79499-8\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TsoOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MatsudaKHO07, author = {Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto}, editor = {Steven D. Galbraith}, title = {Optimised Versions of the Ate and Twisted Ate Pairings}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {302--312}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_18}, doi = {10.1007/978-3-540-77272-9\_18}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/MatsudaKHO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/TsoNOBO07, author = {Raylin Tso and Juan Manuel Gonz{\'{a}}lez Nieto and Takeshi Okamoto and Colin Boyd and Eiji Okamoto}, editor = {Steven D. Galbraith}, title = {Verifier-Key-Flexible Universal Designated-Verifier Signatures}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {403--421}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_24}, doi = {10.1007/978-3-540-77272-9\_24}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/TsoNOBO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShiraseTO07, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Ed Dawson and Duncan S. Wong}, title = {Some Efficient Algorithms for the Final Exponentiation of \emph{eta} \({}_{\mbox{ \emph{T} }}\) Pairing}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {254--268}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_20}, doi = {10.1007/978-3-540-72163-5\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShiraseTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/TsoOO07, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, editor = {Shahram Latifi}, title = {An Improved Signcryption Scheme and Its Variation}, booktitle = {Fourth International Conference on Information Technology: New Generations {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}}, pages = {772--778}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ITNG.2007.34}, doi = {10.1109/ITNG.2007.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/TsoOO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/TakahashiIO07, author = {Yusuke Takahashi and Yasunori Iwanami and Eiji Okamoto}, title = {A Comparison of Time Domain Equalizers by Block Processing in {SISO} Single Carrier Transmission}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394026}, doi = {10.1109/PIMRC.2007.4394026}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/TakahashiIO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/BeuchatBSTO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Claude Carlet and Berk Sunar}, title = {A Coprocessor for the Final Exponentiation of the \emph{eta} \({}_{\mbox{ \emph{T} }}\) Pairing in Characteristic Three}, booktitle = {Arithmetic of Finite Fields, First International Workshop, {WAIFI} 2007, Madrid, Spain, June 21-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4547}, pages = {25--39}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73074-3\_4}, doi = {10.1007/978-3-540-73074-3\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/BeuchatBSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShiraseKTO07, author = {Masaaki Shirase and Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary Extension Degree}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_1}, doi = {10.1007/978-3-540-77535-5\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2007, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5}, doi = {10.1007/978-3-540-73489-5}, isbn = {978-3-540-73488-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatsudaKHO07, author = {Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto}, title = {Optimised versions of the Ate and Twisted Ate Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2007}, url = {http://eprint.iacr.org/2007/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatsudaKHO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBSTO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Coprocessor for the Final Exponentiation of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2007}, url = {http://eprint.iacr.org/2007/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto}, title = {Arithmetic Operators for Pairing-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2007}, url = {http://eprint.iacr.org/2007/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatSTO07, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Refined Algorithm for the eta\({}_{\mbox{T}}\) Pairing Calculation in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2007}, url = {http://eprint.iacr.org/2007/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDOST07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi}, title = {Algorithms and Arithmetic Operators for Computing the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2007}, url = {http://eprint.iacr.org/2007/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDOST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YiTO07, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, title = {ID-Based Group Password-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2007}, url = {http://eprint.iacr.org/2007/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YiTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangCOMO06, author = {Lihua Wang and Zhenfu Cao and Takeshi Okamoto and Ying Miao and Eiji Okamoto}, title = {Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {106--114}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.106}, doi = {10.1093/IETFEC/E89-A.1.106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangCOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengBDO06, author = {Kun Peng and Colin Boyd and Ed Dawson and Eiji Okamoto}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {A Novel Range Test}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {247--258}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_21}, doi = {10.1007/11780656\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengBDO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KawaharaTO06, author = {Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Efficient Implementation of Tate Pairing on a Mobile Phone Using Java}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {396--405}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_42}, doi = {10.1007/978-3-540-74377-4\_42}, timestamp = {Tue, 19 Nov 2019 12:34:54 +0100}, biburl = {https://dblp.org/rec/conf/cis/KawaharaTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/OkamotoI06, author = {Eiji Okamoto and Yasunori Iwanami}, title = {A trellis-coded chaotic modulation scheme}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {5010--5015}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255460}, doi = {10.1109/ICC.2006.255460}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/OkamotoI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuct/RahmanIOMO06, author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, editor = {Frank Stajano and Hyoung Joong Kim and Jong{-}Suk Chae and Seong{-}Dong Kim}, title = {Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks}, booktitle = {Ubiquitous Convergence Technology, First International Conference, {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4412}, pages = {140--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71789-8\_15}, doi = {10.1007/978-3-540-71789-8\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/icuct/RahmanIOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/RahmanMIO06, author = {Sk. Md. Mizanur Rahman and Masahiro Mambo and Atsuo Inomata and Eiji Okamoto}, title = {An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks}, booktitle = {2006 International Symposium on Applications and the Internet {(SAINT} 2006), 23-27 January 2006, Phoenix, Arizona, {USA}}, pages = {300--306}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SAINT.2006.13}, doi = {10.1109/SAINT.2006.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/RahmanMIO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsoGOO06, author = {Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto}, title = {An Efficient ID-based Digital Signature with Message Recovery Based on Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2006}, url = {http://eprint.iacr.org/2006/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsoGOO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawaharaTO06, author = {Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, title = {Efficient Implementation of Tate Pairing on a Mobile Phone using Java}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2006}, url = {http://eprint.iacr.org/2006/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawaharaTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatSTO06, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {An Algorithm for the {\(\eta\)}\({}_{\mbox{T}}\) Pairing Calculation in Characteristic Three and its Hardware Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2006}, url = {http://eprint.iacr.org/2006/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatSTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RahmanIOMO06, author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2006}, url = {http://eprint.iacr.org/2006/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RahmanIOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangOMO06, author = {Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2006}, url = {http://eprint.iacr.org/2006/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangOMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiraseTO06, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {Some Efficient Algorithms for the Final Exponentiation of {\(\eta\)}\({}_{\mbox{T}}\) Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2006}, url = {http://eprint.iacr.org/2006/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiraseTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LopezMVOD05, author = {Javier L{\'{o}}pez and Jos{\'{e}} A. Montenegro and Jos{\'{e}} Luis Vivas and Eiji Okamoto and Ed Dawson}, title = {Specification and design of advanced authentication and authorization services}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {5}, pages = {467--478}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2005.01.005}, doi = {10.1016/J.CSI.2005.01.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LopezMVOD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PengDNOL05, author = {Kun Peng and Ed Dawson and Juanma Gonz{\'{a}}lez Nieto and Eiji Okamoto and Javier L{\'{o}}pez}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A Novel Method to Maintain Privacy in Mobile Agent Applications}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {247--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_21}, doi = {10.1007/11599371\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PengDNOL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccn/TsoOTO05, author = {Raylin Tso and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto}, editor = {M. Y. Sanadidi}, title = {An id-based non-interactive tripartite key agreement protocol with K-resilience}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communications and Computer Networks, October 24-26, 2005, Marina del Rey, CA, {USA}}, pages = {38--42}, publisher = {{IASTED/ACTA} Press}, year = {2005}, timestamp = {Thu, 25 Jan 2007 13:10:45 +0100}, biburl = {https://dblp.org/rec/conf/ccn/TsoOTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangOTO05, author = {Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {198--203}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_30}, doi = {10.1007/11596981\_30}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangOTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TsoOO05, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, editor = {Dengguo Feng and Dongdai Lin and Moti Yung}, title = {Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms}, booktitle = {Information Security and Cryptology, First {SKLOIS} Conference, {CISC} 2005, Beijing, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3822}, pages = {113--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599548\_10}, doi = {10.1007/11599548\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TsoOO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/OkamotoIO05, author = {Takeshi Okamoto and Atsuo Inomata and Eiji Okamoto}, title = {A Proposal of Short Proxy Signature using Pairing}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {631--635}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.27}, doi = {10.1109/ITCC.2005.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/OkamotoIO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdai/OkamotoO05, author = {Eiji Okamoto and Takeshi Okamoto}, editor = {Vicen{\c{c}} Torra and Yasuo Narukawa and Sadaaki Miyamoto}, title = {Cryptosystems Based on Elliptic Curve Pairing}, booktitle = {Modeling Decisions for Artificial Intelligence, Second International Conference, {MDAI} 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3558}, pages = {13--23}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11526018\_3}, doi = {10.1007/11526018\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/mdai/OkamotoO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdai/OkamotoTO05, author = {Takeshi Okamoto and Raylin Tso and Eiji Okamoto}, editor = {Vicen{\c{c}} Torra and Yasuo Narukawa and Sadaaki Miyamoto}, title = {One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing}, booktitle = {Modeling Decisions for Artificial Intelligence, Second International Conference, {MDAI} 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3558}, pages = {122--133}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11526018\_13}, doi = {10.1007/11526018\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mdai/OkamotoTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcc/WangOMOD05, author = {Lihua Wang and Eiji Okamoto and Ying Miao and Takeshi Okamoto and Hiroshi Doi}, editor = {{\O}yvind Ytrehus}, title = {ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps}, booktitle = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3969}, pages = {291--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11779360\_23}, doi = {10.1007/11779360\_23}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcc/WangOMOD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2005, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b135818}, doi = {10.1007/B135818}, isbn = {0-387-25658-X}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekharOO05, author = {Malapati Raja Sekhar and Takeshi Okamoto and Eiji Okamoto}, title = {On Designatedly Verified (Non-interactive) Watermarking Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2005}, url = {http://eprint.iacr.org/2005/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekharOO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsoMOO05, author = {Raylin Tso and Ying Miao and Takeshi Okamoto and Eiji Okamoto}, title = {A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2005}, url = {http://eprint.iacr.org/2005/239}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TsoMOO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SoshiMO04, author = {Masakazu Soshi and Mamoru Maekawa and Eiji Okamoto}, title = {The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {190--203}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_190\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SoshiMO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ItoOIO04, author = {Tadahiko Ito and Takeshi Okamoto and Atsuo Inomata and Eiji Okamoto}, editor = {John R. White and Huanye Sheng}, title = {Anonymous traceable disclosure scheme using pairing over elliptic curve}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {48--52}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046301}, doi = {10.1145/1046290.1046301}, timestamp = {Tue, 15 Feb 2022 16:17:26 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ItoOIO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/0001COMO04, author = {Lihua Wang and Zhenfu Cao and Eiji Okamoto and Ying Miao and Takeshi Okamoto}, editor = {John R. White and Huanye Sheng}, title = {Transformation-free proxy cryptosystems and their applications to electronic commerce}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {92--98}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046310}, doi = {10.1145/1046290.1046310}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/0001COMO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2004, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b101042}, doi = {10.1007/B101042}, isbn = {3-540-23563-9}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/RussellDOL03, author = {Selwyn Russell and Ed Dawson and Eiji Okamoto and Javier L{\'{o}}pez}, title = {Virtual certificates and synthetic certificates: new paradigms for improving public key validation}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1826--1838}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00078-1}, doi = {10.1016/S0140-3664(03)00078-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/RussellDOL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasII/DengO03, author = {Tian{-}Bo Deng and Eiji Okamoto}, title = {SVD-based design of fractional-delay 2-D digital filters exploiting specification symmetries}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {50}, number = {8}, pages = {470--480}, year = {2003}, url = {https://doi.org/10.1109/TCSII.2003.814809}, doi = {10.1109/TCSII.2003.814809}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcasII/DengO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/NietoDO03, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Ed Dawson and Eiji Okamoto}, title = {Privacy and Trusted Computing}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {383--388}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232052}, doi = {10.1109/DEXA.2003.1232052}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/NietoDO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/KanaokaO03, author = {Akira Kanaoka and Eiji Okamoto}, title = {Multivariate Statistical Analysis of Network Traffic for Intrusion Detection}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {472--476}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232068}, doi = {10.1109/DEXA.2003.1232068}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/KanaokaO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TsoMO03, author = {Raylin Tso and Ying Miao and Eiji Okamoto}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {377--385}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_28}, doi = {10.1007/978-3-540-24691-6\_28}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/TsoMO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/OkamotoKO03, author = {Takeshi Okamoto and Hirofumi Katsuno and Eiji Okamoto}, editor = {Colin Boyd and Wenbo Mao}, title = {A Fast Signature Scheme Based on New On-line Computation}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {111--121}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_9}, doi = {10.1007/10958513\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/OkamotoKO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkamotoLI02, author = {Eiji Okamoto and Huan{-}Bang Li and Tetsushi Ikegami}, title = {A Pilot-Symbol-Assisted Fading and Frequency-Offset Compensation Method Using {FFT}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {7}, pages = {1656--1664}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_7\_1656}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkamotoLI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/OkamotoO02, author = {Eiji Okamoto and Hiroyo Ogawa}, title = {A block-coded modulation method for one-way multimode data transmission}, journal = {{IEEE} Trans. Commun.}, volume = {50}, number = {12}, pages = {2124--2135}, year = {2002}, url = {https://doi.org/10.1109/TCOMM.2002.806493}, doi = {10.1109/TCOMM.2002.806493}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/OkamotoO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HendersonCDO02, author = {Marie Henderson and Robert S. Coulter and Ed Dawson and Eiji Okamoto}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Modelling Trust Structures for Public Key Infrastructures}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {56--70}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_5}, doi = {10.1007/3-540-45450-0\_5}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HendersonCDO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/MamboOST02, author = {Masahiro Mambo and Eiji Okamoto and Yasushi Sengoku and Takashi Tanaka}, title = {Simple and Secure Mobile Access under the Flexible Organization Management}, booktitle = {13th International Workshop on Database and Expert Systems Applications {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France}, pages = {456--462}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DEXA.2002.1045940}, doi = {10.1109/DEXA.2002.1045940}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/MamboOST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DawsonLMO02, author = {Ed Dawson and Javier L{\'{o}}pez and Jos{\'{e}} A. Montenegro and Eiji Okamoto}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {A New Design of Privilege Management Infrastructure for Organizations Using Outsourced {PKI}}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {136--149}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_10}, doi = {10.1007/3-540-45811-5\_10}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DawsonLMO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Okamoto02, author = {Eiji Okamoto}, title = {Cryptosystems based on polynomials over finite fields}, booktitle = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW} 2002, 20-25 October 2002, Bangalore, India}, pages = {74--77}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ITW.2002.1115420}, doi = {10.1109/ITW.2002.1115420}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Okamoto02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/X01, author = {Dieter Gollmann and Catherine A. Meadows and Eiji Okamoto}, title = {Editorial}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {1}, pages = {1--2}, year = {2001}, url = {https://doi.org/10.1007/s102070100004}, doi = {10.1007/S102070100004}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/X01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/OkamotoO01, author = {Eiji Okamoto and Hiroyo Ogawa}, title = {One-way multimode transmission using block-coded modulation for mobile communications}, booktitle = {Proceedings of the 54th {IEEE} Vehicular Technology Conference, {VTC} Fall 2001, 7-11 October 2001, Atlantic City, New Jersey, {USA}}, pages = {136--140}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/VTC.2001.956571}, doi = {10.1109/VTC.2001.956571}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/OkamotoO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/YiSWO00, author = {Xun Yi and Chee Kheong Siew and Xiao Feng Wang and Eiji Okamoto}, title = {A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments}, journal = {Distributed Parallel Databases}, volume = {8}, number = {1}, pages = {85--117}, year = {2000}, url = {https://doi.org/10.1023/A:1008735301014}, doi = {10.1023/A:1008735301014}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/YiSWO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DoiMO00, author = {Hiroshi Doi and Masahiro Mambo and Eiji Okamoto}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {On the Security of the RSA-Based Multisignature Scheme for Various Group Structures}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {352--367}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_29}, doi = {10.1007/10718964\_29}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DoiMO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00, author = {Mike Burmester and Yvo Desmedt and Hiroshi Doi and Masahiro Mambo and Eiji Okamoto and Mitsuru Tada and Yuko Yoshifuji}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Structured ElGamal-Type Multisignature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {466--483}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_31}, doi = {10.1007/978-3-540-46588-1\_31}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2000, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5}, doi = {10.1007/3-540-44495-5}, isbn = {3-540-41452-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2000, editor = {Josef Pieprzyk and Eiji Okamoto and Jennifer Seberry}, title = {Information Security, Third International Workshop, {ISW} 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1975}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44456-4}, doi = {10.1007/3-540-44456-4}, isbn = {3-540-41416-9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cia/WangLYZO99, author = {Xiao Feng Wang and Kwok{-}Yan Lam and Xun Yi and C. Q. Zhang and Eiji Okamoto}, editor = {Matthias Klusch and Onn Shehory and Gerhard Wei{\ss}}, title = {Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce}, booktitle = {Cooperative Information Agents III, Third International Workshop, CIA' 99, Uppsala, Sweden, July 31 - August 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1652}, pages = {291--302}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48414-0\_20}, doi = {10.1007/3-540-48414-0\_20}, timestamp = {Tue, 08 Mar 2022 10:12:49 +0100}, biburl = {https://dblp.org/rec/conf/cia/WangLYZO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/YiKSOH99, author = {Xun Yi and Shigeki Kitazawa and Hisao Sakazaki and Eiji Okamoto and D. Frank Hsu}, editor = {Sanguthevar Rajasekaran and Panos M. Pardalos and D. Frank Hsu}, title = {An agent-based architecture for securing mobile {IP}}, booktitle = {Mobile Networks and Computing, Proceedings of a {DIMACS} Workshop, Piscataway, New Jersey, USA, March 25-27, 1999}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {52}, pages = {303--314}, publisher = {{DIMACS/AMS}}, year = {1999}, url = {https://doi.org/10.1090/dimacs/052/19}, doi = {10.1090/DIMACS/052/19}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/YiKSOH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OmoteO99, author = {Kazumasa Omote and Eiji Okamoto}, editor = {Vijay Varadharajan and Yi Mu}, title = {User Identification System Based on Biometrics for Keystroke}, booktitle = {Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1726}, pages = {216--229}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-47942-0\_18}, doi = {10.1007/978-3-540-47942-0\_18}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/OmoteO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PieprzykO99, author = {Josef Pieprzyk and Eiji Okamoto}, editor = {JooSeok Song}, title = {Verfiable Secret Sharing and Time Capsules}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {169--183}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_14}, doi = {10.1007/10719994\_14}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PieprzykO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/KitazawaYOM99, author = {Shigeki Kitazawa and Xun Yi and Eiji Okamoto and Masahiro Mambo}, title = {Improvement of Secure Access Control Agent for Distributed Files}, booktitle = {Proceedings of the 1999 International Conference on Parallel Processing Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999}, pages = {185--191}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICPPW.1999.800060}, doi = {10.1109/ICPPW.1999.800060}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/KitazawaYOM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/OkamotoTO99, author = {Takeshi Okamoto and Mitsuru Tada and Eiji Okamoto}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {Extended Proxy Signatures for Smart Cards}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {247--258}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_21}, doi = {10.1007/3-540-47790-X\_21}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/OkamotoTO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/YiKOWLT99, author = {Xun Yi and S. Kitazawa and Eiji Okamoto and Xiao Feng Wang and Kwok{-}Yan Lam and S. Tu}, editor = {Ping Wah Wong and Edward J. Delp III}, title = {Agent-based copyright protection architecture for online electronic publishing}, booktitle = {Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 23, 1999}, series = {{SPIE} Proceedings}, volume = {3657}, pages = {484--493}, publisher = {{SPIE}}, year = {1999}, url = {https://doi.org/10.1117/12.344698}, doi = {10.1117/12.344698}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/YiKOWLT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/OkamotoLTW99, author = {Eiji Okamoto and Huan{-}Bang Li and Masato Tanaka and Hiromitsu Wakana}, title = {A class-coded modulation method using orthogonal wavelets}, booktitle = {1999 {IEEE} Wireless Communications and Networking Conference, {WCNC} 1999, September 21-24, 1999, New Orleans, Louisiana, {USA}}, pages = {1158--1161}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/WCNC.1999.796898}, doi = {10.1109/WCNC.1999.796898}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/OkamotoLTW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/1999, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/b72231}, doi = {10.1007/B72231}, isbn = {3-540-66666-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/YiOL98, author = {Xun Yi and Eiji Okamoto and Kwok{-}Yan Lam}, title = {An optimized protocol for mobile network authentication and security}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {2}, number = {3}, pages = {37--39}, year = {1998}, url = {https://doi.org/10.1145/1321387.1321391}, doi = {10.1145/1321387.1321391}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/YiOL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SyukriOM98, author = {Agus Fanar Syukri and Eiji Okamoto and Masahiro Mambo}, editor = {Colin Boyd and Ed Dawson}, title = {A User Identification System Using Signature Written with Mouse}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {403--414}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053751}, doi = {10.1007/BFB0053751}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SyukriOM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dai/WangYLO98, author = {Xiao Feng Wang and Xun Yi and Kwok{-}Yan Lam and Eiji Okamoto}, editor = {Chengqi Zhang and Dickson Lukose}, title = {Secure Information Gathering Agent for Internet Trading}, booktitle = {Multi-Agent Systems: Theories, Languages, and Applications, 4th Australian Workshop on Distributed Artificial Intelligence, Brisbane, Queensland, Australia, July 13, 1998, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1544}, pages = {183--193}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10693067\_13}, doi = {10.1007/10693067\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/dai/WangYLO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/YiWLOH98, author = {Xun Yi and Xiao Feng Wang and Kwok{-}Yan Lam and Eiji Okamoto and D. Frank Hsu}, title = {A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading}, booktitle = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS} 1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings}, pages = {197--203}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/RELDIS.1998.740495}, doi = {10.1109/RELDIS.1998.740495}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/YiWLOH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/1997, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0030404}, doi = {10.1007/BFB0030404}, isbn = {3-540-64382-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/UyematsuO97, author = {Tomohiko Uyematsu and Eiji Okamoto}, title = {A construction of codes with exponential error bounds on arbitrary discrete memoryless channels}, journal = {{IEEE} Trans. Inf. Theory}, volume = {43}, number = {3}, pages = {992--996}, year = {1997}, url = {https://doi.org/10.1109/18.568709}, doi = {10.1109/18.568709}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/UyematsuO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MamboOS97, author = {Masahiro Mambo and Eiji Okamoto and Kouichi Sakurai}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Protection of Data and Delegated Keys in Digital Distribution}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {271--282}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027934}, doi = {10.1007/BFB0027934}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MamboOS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HayashiOM97, author = {Kenichi Hayashi and Eiji Okamoto and Masahiro Mambo}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Proposal of user identification scheme using mouse}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {144--148}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028470}, doi = {10.1007/BFB0028470}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/HayashiOM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SakazakiOM97, author = {Hisao Sakazaki and Eiji Okamoto and Masahiro Mambo}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {The Application of ID-Based Key Distribution Systems to an Elliptic Curve}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {335--344}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030434}, doi = {10.1007/BFB0030434}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/SakazakiOM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MamboMO97, author = {Masahiro Mambo and Takanori Murayama and Eiji Okamoto}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {A tentative approach to constructing tamper-resistant software}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {23--33}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283736}, doi = {10.1145/283699.283736}, timestamp = {Thu, 09 Sep 2021 18:23:55 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MamboMO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MamboSO96, author = {Masahiro Mambo and Kouichi Sakurai and Eiji Okamoto}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {322--333}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034858}, doi = {10.1007/BFB0034858}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MamboSO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MamboUO96, author = {Masahiro Mambo and Keisuke Usuda and Eiji Okamoto}, editor = {Li Gong and Jacques Stearn}, title = {Proxy Signatures for Delegating Signing Operation}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {48--57}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238185}, doi = {10.1145/238168.238185}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MamboUO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/OkamotoLI96, author = {Eiji Okamoto and Huan{-}Bang Li and Tetsushi Ikegami}, title = {Rayleigh fading compensation for {QAM} by using {FFT}}, booktitle = {The 7th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 1996, Taipei, Taiwan, October 15-18, 1996}, pages = {1079--1082}, year = {1996}, url = {https://doi.org/10.1109/PIMRC.1996.568448}, doi = {10.1109/PIMRC.1996.568448}, timestamp = {Thu, 28 May 2020 11:01:18 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/OkamotoLI96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoUM95, author = {Eiji Okamoto and Tomohiko Uyematsu and Masahiro Mambo}, title = {Permutation Cipher Scheme Using Polynomials over a Field}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {78-D}, number = {2}, pages = {138--142}, year = {1995}, url = {http://search.ieice.org/bin/summary.php?id=e78-d\_2\_138}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoUM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TsunooOU94, author = {Yukiyasu Tsunoo and Eiji Okamoto and Tomohiko Uyematsu}, editor = {Yvo Desmedt}, title = {Ciphertext Only Attack for One-way Function of the {MAP} Using One Ciphertext}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {369--382}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_34}, doi = {10.1007/3-540-48658-5\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TsunooOU94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TanakaO91, author = {Kazue Tanaka and Eiji Okamoto}, title = {Key distribution system for mail systems using ID-related information directory}, journal = {Comput. Secur.}, volume = {10}, number = {1}, pages = {25--33}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90052-F}, doi = {10.1016/0167-4048(91)90052-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TanakaO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/OkamotoT90, author = {Eiji Okamoto and Kazue Tanaka}, title = {Proposal for Cryptographic Key Distribution System Based on Identification Information}, journal = {Syst. Comput. Jpn.}, volume = {21}, number = {4}, pages = {76--84}, year = {1990}, url = {https://doi.org/10.1002/scj.4690210408}, doi = {10.1002/SCJ.4690210408}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/OkamotoT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/OkamotoT89, author = {Eiji Okamoto and Kazue Tanaka}, title = {Identity-based information security management system for personal computer networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {7}, number = {2}, pages = {290--294}, year = {1989}, url = {https://doi.org/10.1109/49.17700}, doi = {10.1109/49.17700}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/OkamotoT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/OkamotoT89a, author = {Eiji Okamoto and Kazue Tanaka}, title = {Key distribution system based on identification information}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {7}, number = {4}, pages = {481--485}, year = {1989}, url = {https://doi.org/10.1109/49.17711}, doi = {10.1109/49.17711}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/OkamotoT89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Okamoto88, author = {Eiji Okamoto}, editor = {Christoph G. G{\"{u}}nther}, title = {Substantial Number of Cryptographic Keys and Its Application to Encryption Designs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {361--373}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_34}, doi = {10.1007/3-540-45961-8\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Okamoto88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Okamoto87, author = {Eiji Okamoto}, editor = {Carl Pomerance}, title = {Key Distribution Systems Based on Identification Information}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {194--202}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_15}, doi = {10.1007/3-540-48184-2\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Okamoto87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoN85, author = {Eiji Okamoto and K. Nakamura}, editor = {Hugh C. Williams}, title = {Lifetimes of Keys in Cryptographic Key Management Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {246--259}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_19}, doi = {10.1007/3-540-39799-X\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoN85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.