Eiji Okamoto
Keisuke Asano
Mamoru Okumura
Takumi Abe
Eiji Okamoto
Tetsuya Yamamoto
High-Quality Secure Wireless Transmission Scheme Using Polar Codes and Radio-Wave Encrypted Modulation.
374-383
2023
April
106
IEICE Trans. Commun.
4
https://doi.org/10.1587/transcom.2022ebp3098
https://www.wikidata.org/entity/Q114845788
db/journals/ieicetb/ieicetb106.html#AsanoOAOY23
Kenya Tomita
Mamoru Okumura
Eiji Okamoto
Demonstration of Chaos-Based Radio Encryption Modulation Scheme through Wired Transmission Experiments.
686-695
2023
August
106
IEICE Trans. Commun.
8
https://doi.org/10.1587/transcom.2022ebt0005
https://www.wikidata.org/entity/Q123016640
db/journals/ieicetb/ieicetb106.html#TomitaOO23
Eiji Okamoto
Foreword.
723
2023
September
106
IEICE Trans. Commun.
9
https://doi.org/10.1587/transcom.2022fgf0001
db/journals/ieicetb/ieicetb106.html#Okamoto23
Keisuke Asano
Takumi Abe
Kenta Kato
Eiji Okamoto
Tetsuya Yamamoto
High-Quality and Low-Complexity Polar-Coded Radio-Wave Encrypted Modulation Utilizing Multipurpose Frozen Bits.
987-996
2023
October
106
IEICE Trans. Commun.
10
https://doi.org/10.1587/transcom.2022ebt0007
db/journals/ieicetb/ieicetb106.html#AsanoAKOY23
Eiji Okamoto
Yuma Yamashita
Yohei Satoh
Mitsuhiro Nakadai
Takamasa Itahashi
Shiro Yamakawa
Performance Comparison of Channel Coding Methods for Optical Satellite Data Relay System.
1-6
2023
PIMRC
https://doi.org/10.1109/PIMRC56721.2023.10294033
conf/pimrc/2023
db/conf/pimrc/pimrc2023.html#OkamotoYSNIY23
Kaga Tomoki
Mamoru Okumura
Eiji Okamoto
Tetsuya Yamamoto
Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear Modulation.
638-647
2022
105-B
IEICE Trans. Commun.
5
https://doi.org/10.1587/transcom.2021ebp3092
https://www.wikidata.org/entity/Q114845794
db/journals/ieicetb/ieicetb105.html#TomokiOOY22
Mamoru Okumura
Keisuke Asano
Takumi Abe
Eiji Okamoto
Tetsuya Yamamoto
Performance Improvement of Radio-Wave Encrypted MIMO Communications Using Average LLR Clipping.
931-943
2022
August
105-B
IEICE Trans. Commun.
8
https://doi.org/10.1587/transcom.2021ebt0007
https://www.wikidata.org/entity/Q114845792
db/journals/ieicetb/ieicetb105.html#OkumuraAAOY22
Naoki Ishikawa
Jehad M. Hamamreh
Eiji Okamoto
Chao Xu 0005
Lixia Xiao
Artificially Time-Varying Differential MIMO for Achieving Practical Physical Layer Security.
2180-2194
2021
2
IEEE Open J. Commun. Soc.
https://doi.org/10.1109/OJCOMS.2021.3112486
https://www.wikidata.org/entity/Q114847785
db/journals/ojcs/ojcs2.html#IshikawaHOXX21
Mamoru Okumura
Kaga Tomoki
Eiji Okamoto
Tetsuya Yamamoto
Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security.
1-2
2021
CCNC
https://doi.org/10.1109/CCNC49032.2021.9369489
conf/ccnc/2021
db/conf/ccnc/ccnc2021.html#OkumuraTOY21
Hayato Ishikawa
Eiji Okamoto
Hiraku Okada
Satoshi Makido
Performance improvement of V2I uplink transmission on far vehicles using frequency scheduling-based cooperative V2V relay transmission.
1-6
2020
CCNC
https://doi.org/10.1109/CCNC46108.2020.9045722
conf/ccnc/2020
db/conf/ccnc/ccnc2020.html#IshikawaOOM20
Yoshihiro Masuda
Eiji Okamoto
Tetsuya Yamamoto
Low Complexity Decoding of Downlink Chaos NOMA Scheme with Physical Layer Security.
1-6
2020
CCNC
https://doi.org/10.1109/CCNC46108.2020.9045697
conf/ccnc/2020
db/conf/ccnc/ccnc2020.html#MasudaOY20
Yusaku Shiomitsu
Eiji Okamoto
Manabu Mikami
Hitoshi Yoshino
Poster: Performance analysis of early HARQ retransmission scheme in highway environments.
1-2
2020
VNC
https://doi.org/10.1109/VNC51378.2020.9318354
conf/vnc/2020
db/conf/vnc/vnc2020.html#ShiomitsuOMY20
Eiji Okamoto
Manabu Mikami
Hitoshi Yoshino
Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels.
1458-1466
2019
102-B
IEICE Trans. Commun.
8
https://doi.org/10.1587/transcom.2018TTP0016
http://search.ieice.org/bin/summary.php?id=e102-b_8_1458
db/journals/ieicet/ieicet102b.html#OkamotoMY19
Hayato Ishikawa
Eiji Okamoto
Shouhei Okamoto
Hiraku Okada
Satoshi Makido
Performance Analysis of Uplink V2I Cooperative Transmission Scheme in Practical Road Environments.
98-102
2019
ICOIN
https://doi.org/10.1109/ICOIN.2019.8718122
conf/icoin/2019
db/conf/icoin/icoin2019.html#IshikawaOOOM19
Ryo Hasegawa
Eiji Okamoto
Hiroyuki Tsuji
Amane Miura
Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters.
103-107
2019
ICOIN
https://doi.org/10.1109/ICOIN.2019.8718128
conf/icoin/2019
db/conf/icoin/icoin2019.html#HasegawaOTM19
Yoshihiro Masuda
Eiji Okamoto
Keita Ito
Tetsuya Yamamoto
An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation.
136-140
2019
ICOIN
https://doi.org/10.1109/ICOIN.2019.8718195
conf/icoin/2019
db/conf/icoin/icoin2019.html#MasudaOIY19
Keita Ito
Yoshihiro Masuda
Eiji Okamoto
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding.
262-267
2019
ICOIN
https://doi.org/10.1109/ICOIN.2019.8718168
conf/icoin/2019
db/conf/icoin/icoin2019.html#ItoMO19
Yusaku Shiomitsu
Eiji Okamoto
Manabu Mikami
Hitoshi Yoshino
Poster: Effective frame configuration of 5G URLLC using open-loop HARQ for autonomous driving.
1-2
2019
VNC
https://doi.org/10.1109/VNC48660.2019.9062781
conf/vnc/2019
db/conf/vnc/vnc2019.html#ShiomitsuOMY19
Naoto Horiike
Eiji Okamoto
Tetsuya Yamamoto
A downlink non-orthogonal multiple access scheme having physical layer security.
205
2018
2018
EURASIP J. Wirel. Commun. Netw.
https://doi.org/10.1186/s13638-018-1156-8
db/journals/ejwcn/ejwcn2018.html#HoriikeOY18
Hikaru Tsuchida
Takashi Nishide
Eiji Okamoto
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption.
37-56
2018
8
J. Internet Serv. Inf. Secur.
4
https://doi.org/10.22667/JISIS.2018.11.30.037
db/journals/jisis/jisis8.html#TsuchidaNO18
Kengo Sasaki
Eiji Okamoto
A Study on Indoor Dimming Method Utilizing Outside Light for Power Saving.
1847-1852
2018
APSIPA
https://doi.org/10.23919/APSIPA.2018.8659602
conf/apsipa/2018
db/conf/apsipa/apsipa2018.html#SasakiO18
Naoto Horiike
Hiroki Kitagawa
Eiji Okamoto
Tetsuya Yamamoto
Chaos MIMO-based downlink non-orthogonal multiple access scheme with physical layer security.
1-7
2018
CCNC
https://doi.org/10.1109/CCNC.2018.8319189
conf/ccnc/2018
db/conf/ccnc/ccnc2018.html#HoriikeKOY18
Eiji Okamoto
Naoto Horiike
Tetsuya Yamamoto
Large-Scale Grant-Free Sparse Chaos Code Multiple Access Scheme for 5G IoT.
1-5
2018
VTC Fall
https://doi.org/10.1109/VTCFall.2018.8690973
conf/vtc/2018f
db/conf/vtc/vtc2018f.html#OkamotoHY18
Takeshi Okamoto
Raylin Tso
Michitomo Yamaguchi
Eiji Okamoto
A k-out-of-n Ring Signature with Flexible Participation for Signers.
728
2018
2018
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2018/728
db/journals/iacr/iacr2018.html#OkamotoTYO18
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Card-Based Protocols Using Regular Polygon Cards.
1900-1909
2017
100-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
9
https://doi.org/10.1587/transfun.E100.A.1900
http://search.ieice.org/bin/summary.php?id=e100-a_9_1900
db/journals/ieicet/ieicet100a.html#ShinagawaMSNKNH17
Yukou Kobayashi
Naoto Yanai
Kazuki Yoneyama
Takashi Nishide
Goichiro Hanaoka
Kwangjo Kim
Eiji Okamoto
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
2991-3006
2017
100-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
12
https://doi.org/10.1587/transfun.E100.A.2991
http://search.ieice.org/bin/summary.php?id=e100-a_12_2991
https://www.wikidata.org/entity/Q114594489
db/journals/ieicet/ieicet100a.html#KobayashiYYNHKO17
Sanami Nakagawa
Takashi Nishide
Eiji Okamoto
Keita Emura
Goichiro Hanaoka
Yusuke Sakai 0001
Akihisa Kodate
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
394-406
2017
3
Int. J. Appl. Cryptogr.
4
https://doi.org/10.1504/IJACT.2017.10010348
db/journals/ijact/ijact3.html#NakagawaNOEHSK17
Hiroki Kitagawa
Eiji Okamoto
Performance improvement of non-orthogonal multiple access scheme using code division multiplexing.
2017
13
Int. J. Distributed Sens. Networks
11
https://doi.org/10.1177/1550147717744528
db/journals/ijdsn/ijdsn13.html#KitagawaO17
Nuray At
Jean-Luc Beuchat
Eiji Okamoto
Ismail San
Teppei Yamazaki
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl.
106-120
2017
106
J. Parallel Distributed Comput.
https://doi.org/10.1016/j.jpdc.2017.01.029
db/journals/jpdc/jpdc106.html#AtBOSY17
Naoto Horiike
Eiji Okamoto
Tetsuya Yamamoto
Performance improvement of multi-user chaos MIMO transmission scheme using dirty paper coding.
1-6
2017
APCC
https://doi.org/10.23919/APCC.2017.8303988
conf/apcc/2017
db/conf/apcc/apcc2017.html#HoriikeOY17
Takuya Kitamura
Kazumasa Shinagawa
Takashi Nishide
Eiji Okamoto
One-time Programs with Cloud Storage and Its Application to Electronic Money.
25-30
2017
APKC@AsiaCCS
https://doi.org/10.1145/3055504.3055507
conf/ccs/2017asiapkc
db/conf/ccs/asiapkc2017.html#KitamuraSNO17
Naoto Horiike
Eiji Okamoto
Tetsuya Yamamoto
Performance improvement of chaos MIMO transmission scheme by LDPC code concatenation using symbol MAP detection and STBC.
200-205
2017
ICOIN
https://doi.org/10.1109/ICOIN.2017.7899504
conf/icoin/2017
db/conf/icoin/icoin2017.html#HoriikeOY17
Hiroki Kitagawa
Eiji Okamoto
Performance improvement of non-orthogonal multiple access scheme using code division multiplexing.
327-331
2017
ICOIN
https://doi.org/10.1109/ICOIN.2017.7899453
conf/icoin/2017
db/conf/icoin/icoin2017.html#KitagawaO17
Tomohiro Akiyoshi
Eiji Okamoto
Hiroyuki Tsuji
Amane Miura
Performance improvement of satellite/terrestrial integrated mobile communication system using unmanned aerial vehicle cooperative communications.
417-422
2017
ICOIN
https://doi.org/10.1109/ICOIN.2017.7899525
conf/icoin/2017
db/conf/icoin/icoin2017.html#AkiyoshiOTM17
Eiji Okamoto
Hiraku Okada
Yoshinao Ishii
Satoshi Makido
Performance Improvement of Low-Latency V2I Uplink Using Superposed Cooperative V2V Transmission.
1-5
2017
VTC Fall
https://doi.org/10.1109/VTCFall.2017.8288284
conf/vtc/2017f
db/conf/vtc/vtc2017f.html#OkamotoOIM17
Eiji Okamoto
Naoto Horiike
Tetsuya Yamamoto
Sparse chaos code multiple access scheme achieving larger capacity and physical layer security.
604-610
2017
WPMC
https://doi.org/10.1109/WPMC.2017.8301884
conf/wpmc/2017
db/conf/wpmc/wpmc2017.html#OkamotoHY17
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Secure Computation Protocols Using Polarizing Cards.
1122-1131
2016
99-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
6
https://doi.org/10.1587/transfun.E99.A.1122
http://search.ieice.org/bin/summary.php?id=e99-a_6_1122
db/journals/ieicet/ieicet99a.html#ShinagawaMSNKNH16
Hidekazu Murata
Eiji Okamoto
Manabu Mikami
Akihiro Okazaki
Satoshi Suyama
Takamichi Inoue
Jun Mashino
Tetsuya Yamamoto
Makoto Taromaru
Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan.
1638-1647
2016
99-B
IEICE Trans. Commun.
8
https://doi.org/10.1587/transcom.2015CCI0004
http://search.ieice.org/bin/summary.php?id=e99-b_8_1638
db/journals/ieicet/ieicet99b.html#MurataOMOSIMYT16
Eiji Okamoto
Hiroyuki Tsuji
Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites.
2146-2155
2016
99-B
IEICE Trans. Commun.
10
https://doi.org/10.1587/transcom.2016ATP0011
http://search.ieice.org/bin/summary.php?id=e99-b_10_2146
db/journals/ieicet/ieicet99b.html#OkamotoT16a
Nobuaki Kitajima
Naoto Yanai
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions.
275-291
2016
24
J. Inf. Process.
2
https://doi.org/10.2197/ipsjjip.24.275
db/journals/jip/jip24.html#KitajimaYNHO16
Keisuke Hasegawa
Naoki Kanayama
Takashi Nishide
Eiji Okamoto
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability.
764-771
2016
24
J. Inf. Process.
5
https://doi.org/10.2197/ipsjjip.24.764
https://www.wikidata.org/entity/Q113421154
db/journals/jip/jip24.html#HasegawaKNO16
Kazumasa Shinagawa
Koji Nuida
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Size-Hiding Computation for Multiple Parties.
937-966
2016
ASIACRYPT (2)
https://doi.org/10.1007/978-3-662-53890-6_31
conf/asiacrypt/2016-2
db/conf/asiacrypt/asiacrypt2016-2.html#ShinagawaNNHO16
Hikaru Tsuchida
Takashi Nishide
Eiji Okamoto
Kwangjo Kim
Revocable Decentralized Multi-Authority Functional Encryption.
248-265
2016
INDOCRYPT
https://doi.org/10.1007/978-3-319-49890-4_14
conf/indocrypt/2016
db/conf/indocrypt/indocrypt2016.html#TsuchidaNOK16
Kazumasa Shinagawa
Koji Nuida
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Committed AND protocol using three cards with more handy shuffle.
700-702
2016
ISITA
https://ieeexplore.ieee.org/document/7840515/
conf/isita/2016
db/conf/isita/isita2016.html#ShinagawaNNHO16
Eiji Okamoto
Keisuke Kunitomo
Hidenori Akita
Takuma Kyo
A Cooperative V2I Uplink Transmission Scheme Utilizing V2V Network Coding.
1-5
2016
VTC Spring
https://doi.org/10.1109/VTCSpring.2016.7504059
conf/vtc/2016s
db/conf/vtc/vtc2016s.html#OkamotoKAK16
Sihan Qing
Eiji Okamoto
Kwangjo Kim
Dongmei Liu
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
ICICS
Springer
2016
Lecture Notes in Computer Science
9543
978-3-319-29813-9
https://doi.org/10.1007/978-3-319-29814-6
db/conf/icics/icics2015.html
Eiji Okamoto
Yuma Inaba
A Chaos MIMO Transmission Scheme Using Turbo Principle for Secure Channel-Coded Transmission.
1482-1491
2015
98-B
IEICE Trans. Commun.
8
https://doi.org/10.1587/transcom.E98.B.1482
http://search.ieice.org/bin/summary.php?id=e98-b_8_1482
db/journals/ieicet/ieicet98b.html#OkamotoI15
Manato Horiba
Eiji Okamoto
Toshiko Shinohara
Katsuhiko Matsumura
An Accurate Indoor-Localization Scheme with NLOS Detection and Elimination Exploiting Stochastic Characteristics.
1758-1767
2015
98-B
IEICE Trans. Commun.
9
https://doi.org/10.1587/transcom.E98.B.1758
http://search.ieice.org/bin/summary.php?id=e98-b_9_1758
db/journals/ieicet/ieicet98b.html#HoribaOSM15
Nasato Goto
Akira Kanaoka
Masayuki Okada
Eiji Okamoto
METRO: Measurement of End-to-End Route Trust.
613-622
2015
23
J. Inf. Process.
5
https://doi.org/10.2197/ipsjjip.23.613
db/journals/jip/jip23.html#GotoKOO15
Hidekazu Murata
Eiji Okamoto
Manabu Mikami
Akihiro Okazaki
Satoshi Suyama
Takamichi Inoue
Jun Mashino
Tetsuya Yamamoto
Makoto Taromaru
R&D activities for 5G in IEICE technical committee on radio communication systems.
250-256
2015
APCC
https://doi.org/10.1109/APCC.2015.7412520
conf/apcc/2015
db/conf/apcc/apcc2015.html#MurataOMOSIMYT15
Yu Liu
Nasato Goto
Akira Kanaoka
Eiji Okamoto
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation.
77-84
2015
AsiaJCIS
https://doi.org/10.1109/AsiaJCIS.2015.32
https://doi.ieeecomputersociety.org/10.1109/AsiaJCIS.2015.32
conf/asiajcis/2015
db/conf/asiajcis/asiajcis2015.html#LiuGKO15
Nobuaki Kitajima
Naoto Yanai
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Constructions of Fail-Stop Signatures for Multi-signer Setting.
112-123
2015
AsiaJCIS
https://doi.org/10.1109/AsiaJCIS.2015.26
https://doi.ieeecomputersociety.org/10.1109/AsiaJCIS.2015.26
conf/asiajcis/2015
db/conf/asiajcis/asiajcis2015.html#KitajimaYNHO15
Keisuke Hasegawa
Naoki Kanayama
Takashi Nishide
Eiji Okamoto
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability.
1-4
2015
ICITCS
https://doi.org/10.1109/ICITCS.2015.7293020
https://doi.ieeecomputersociety.org/10.1109/ICITCS.2015.7293020
conf/icitcs/2015
db/conf/icitcs/icitcs2015.html#HasegawaKNO15
Yusuke Kanbara
Tadanori Teruya
Naoki Kanayama
Takashi Nishide
Eiji Okamoto
Software Implementation of a Pairing Function for Public Key Cryptosystems.
1-5
2015
ICITCS
https://doi.org/10.1109/ICITCS.2015.7293019
https://doi.ieeecomputersociety.org/10.1109/ICITCS.2015.7293019
conf/icitcs/2015
db/conf/icitcs/icitcs2015.html#KanbaraTKNO15
Manato Horiba
Eiji Okamoto
Toshiko Shinohara
Katsuhiko Matsumura
An improved NLOS detection scheme using stochastic characteristics for indoor localization.
478-482
2015
ICOIN
https://doi.org/10.1109/ICOIN.2015.7057951
https://doi.ieeecomputersociety.org/10.1109/ICOIN.2015.7057951
conf/icoin/2015
db/conf/icoin/icoin2015.html#HoribaOSM15
Naoto Yanai
Masahiro Mambo
Kazuma Tanaka
Takashi Nishide
Eiji Okamoto
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs.
32-48
2015
INTRUST
https://doi.org/10.1007/978-3-319-31550-8_3
conf/intrust/2015
db/conf/intrust/intrust2015.html#YanaiMTNO15
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Secure Multi-Party Computation Using Polarizing Cards.
281-297
2015
IWSEC
https://doi.org/10.1007/978-3-319-22425-1_17
conf/iwsec/2015
db/conf/iwsec/iwsec2015.html#ShinagawaMSNKNH15
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
127-146
2015
ProvSec
https://doi.org/10.1007/978-3-319-26059-4_7
conf/provsec/2015
db/conf/provsec/provsec2015.html#ShinagawaMSNKNH15
Yukou Kobayashi
Naoto Yanai
Kazuki Yoneyama
Takashi Nishide
Goichiro Hanaoka
Kwangjo Kim
Eiji Okamoto
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
39-52
2015
SECRYPT
https://doi.org/10.5220/0005539300390052
conf/secrypt/2015
db/conf/secrypt/secrypt2015.html#KobayashiYYNHKO15
Eiji Okamoto
An Improved Proportional Fair Scheduling in Downlink Non-Orthogonal Multiple Access System.
1-5
2015
VTC Fall
https://doi.org/10.1109/VTCFall.2015.7390839
conf/vtc/2015f
db/conf/vtc/vtc2015f.html#Okamoto15
Naoki Kanayama
Yang Liu
Eiji Okamoto
Kazutaka Saito
Tadanori Teruya
Shigenori Uchiyama
Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials.
300-302
2014
97-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
https://doi.org/10.1587/transfun.E97.A.300
http://search.ieice.org/bin/summary.php?id=e97-a_1_300
db/journals/ieicet/ieicet97a.html#KanayamaLOSTU14
Naoto Yanai
Eikoh Chida
Masahiro Mambo
Eiji Okamoto
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles.
366-375
2014
22
J. Inf. Process.
2
https://doi.org/10.2197/ipsjjip.22.366
db/journals/jip/jip22.html#YanaiCMO14
Masayuki Okada
Nasato Goto
Akira Kanaoka
Eiji Okamoto
Transparent Probabilistic Packet Marking.
609-616
2014
22
J. Inf. Process.
4
https://doi.org/10.2197/ipsjjip.22.609
db/journals/jip/jip22.html#OkadaGKO14
Yang Liu
Naoki Kanayama
Kazutaka Saito
Tadanori Teruya
Shigenori Uchiyama
Eiji Okamoto
Computing fixed argument pairings with the elliptic net algorithm.
69-72
2014
6
JSIAM Lett.
https://doi.org/10.14495/jsiaml.6.69
db/journals/jsiaml/jsiaml6.html#LiuKSTUO14
Simon Kramer 0001
Rajeev Goré
Eiji Okamoto
Computer-aided decision-making with trust relations and trust domains (cryptographic applications).
19-54
2014
24
J. Log. Comput.
1
https://doi.org/10.1093/logcom/exs013
db/journals/logcom/logcom24.html#KramerGO14
Nuray At
Jean-Luc Beuchat
Eiji Okamoto
Ismail San
Teppei Yamazaki
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA.
485-498
2014
61-I
IEEE Trans. Circuits Syst. I Regul. Pap.
2
https://doi.org/10.1109/TCSI.2013.2278385
db/journals/tcas/tcasI61.html#AtBOSY14
Nasato Goto
Akira Kanaoka
Masayuki Okada
Eiji Okamoto
METRO: Measurement of End-to-End Route Trust.
31-38
2014
AsiaJCIS
https://doi.org/10.1109/AsiaJCIS.2014.16
https://doi.ieeecomputersociety.org/10.1109/AsiaJCIS.2014.16
conf/asiajcis/2014
db/conf/asiajcis/asiajcis2014.html#GotoKOO14
Eiji Okamoto
Manato Horiba
Keita Nakashima
Toshiko Shinohara
Katsuhiko Matsumura
Particle swarm optimization-based low-complexity three-dimensional UWB localization scheme.
120-124
2014
ICUFN
https://doi.org/10.1109/ICUFN.2014.6876763
conf/icufn/2014
db/conf/icufn/icufn2014.html#OkamotoHNSM14
Naoto Yanai
Masahiro Mambo
Eiji Okamoto
A CDH-based ordered multisignature scheme in the standard model with better efficiency.
236-240
2014
ISITA
https://ieeexplore.ieee.org/document/6979839/
conf/isita/2014
db/conf/isita/isita2014.html#YanaiMO14
Takashi Yamakawa
Nobuaki Kitajima
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
A Short Fail-Stop Signature Scheme from Factoring.
309-316
2014
ProvSec
https://doi.org/10.1007/978-3-319-12475-9_22
conf/provsec/2014
db/conf/provsec/provsec2014.html#YamakawaKNHO14
Sanami Nakagawa
Keita Emura
Goichiro Hanaoka
Akihisa Kodate
Takashi Nishide
Eiji Okamoto
Yusuke Sakai 0001
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures.
565-574
2014
TrustCom
https://doi.org/10.1109/TrustCom.2014.72
https://doi.ieeecomputersociety.org/10.1109/TrustCom.2014.72
conf/trustcom/2014
db/conf/trustcom/trustcom2014.html#NakagawaEHKNOS14
Yuta Koshimizu
Eiji Okamoto
An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding.
2119-2130
2013
96-B
IEICE Trans. Commun.
8
https://doi.org/10.1587/transcom.E96.B.2119
http://search.ieice.org/bin/summary.php?id=e96-b_8_2119
db/journals/ieicet/ieicet96b.html#KoshimizuO13
Ichita Higurashi
Akira Kanaoka
Masahiko Kato
Eiji Okamoto
Detection of Unexpected Services and Communication Paths in Networked Systems.
632-639
2013
21
J. Inf. Process.
4
https://doi.org/10.2197/ipsjjip.21.632
db/journals/jip/jip21.html#HigurashiKKO13
Xun Yi
Eiji Okamoto
Practical Internet voting system.
378-387
2013
36
J. Netw. Comput. Appl.
1
https://doi.org/10.1016/j.jnca.2012.05.005
db/journals/jnca/jnca36.html#YiO13
Masayuki Okada
Nasato Goto
Akira Kanaoka
Eiji Okamoto
A Device for Transparent Probabilistic Packet Marking.
242-247
2013
COMPSAC Workshops
https://doi.org/10.1109/COMPSACW.2013.33
conf/compsac/2013w
db/conf/compsac/compsac2013w.html#OkadaGKO13
Yoshinori Mitamura
Tetsuya Yano
Eiji Okamoto
A magnetic fluid seal for rotary blood pumps: Image and computational analyses of behaviors of magnetic fluids.
663-666
2013
EMBC
https://doi.org/10.1109/EMBC.2013.6609587
https://www.wikidata.org/entity/Q35012965
conf/embc/2013
db/conf/embc/embc2013.html#MitamuraYO13
Eiji Okamoto
Sakiko Kikuchi
Yoshinori Mitamura
Evaluation of titanium mesh electrode using for transcutaneous intrabody communication by tissue-electrode impedance.
667-670
2013
EMBC
https://doi.org/10.1109/EMBC.2013.6609588
https://www.wikidata.org/entity/Q45910327
conf/embc/2013
db/conf/embc/embc2013.html#OkamotoKM13
Naoto Yanai
Masahiro Mambo
Eiji Okamoto
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles.
367-377
2013
ISC
https://doi.org/10.1007/978-3-319-27659-5_26
conf/isw/2013
db/conf/isw/isc2013.html#YanaiMO13
Akihisa Tanaka
Eiji Okamoto
Hiroyuki Tsuji
Yoshiyuki Fujino
Interference-aware weighting scheme for satellite/terrestrial integrated mobile communication system.
1803-1808
2013
IWCMC
https://doi.org/10.1109/IWCMC.2013.6583830
conf/iwcmc/2013
db/conf/iwcmc/iwcmc2013.html#TanakaOTF13
Yusuke Niwa
Akira Kanaoka
Eiji Okamoto
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure.
105-112
2013
NBiS
https://doi.org/10.1109/NBiS.2013.19
https://doi.ieeecomputersociety.org/10.1109/NBiS.2013.19
conf/nbis/2013
db/conf/nbis/nbis2013.html#NiwaKO13
Tadanori Teruya
Kazutaka Saito
Naoki Kanayama
Yuto Kawahara
Tetsutaro Kobayashi
Eiji Okamoto
Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three.
97-112
2013
Pairing
https://doi.org/10.1007/978-3-319-04873-4_6
conf/pairing/2013
db/conf/pairing/pairing2013.html#TeruyaSKKKO13
Nuray At
Jean-Luc Beuchat
Eiji Okamoto
Ismail San
Teppei Yamazaki
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA.
113
2013
2013
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2013/113
db/journals/iacr/iacr2013.html#AtBOSY13
Lihua Wang 0001
Licheng Wang
Masahiro Mambo
Eiji Okamoto
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
70-88
2012
95-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
https://doi.org/10.1587/transfun.E95.A.70
http://search.ieice.org/bin/summary.php?id=e95-a_1_70
db/journals/ieicet/ieicet95a.html#WangWMO12
Naoki Ogura
Shigenori Uchiyama
Naoki Kanayama
Eiji Okamoto
A Note on the Pairing Computation Using Normalized Miller Functions.
196-203
2012
95-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
https://doi.org/10.1587/transfun.E95.A.196
http://search.ieice.org/bin/summary.php?id=e95-a_1_196
db/journals/ieicet/ieicet95a.html#OguraUKO12
Yoshitoshi Yamashita
Eiji Okamoto
Yasunori Iwanami
Yozo Shoji
Morio Toyoshima
Yoshihisa Takayama
A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective Coding Scheme.
254-262
2012
95-B
IEICE Trans. Commun.
1
https://doi.org/10.1587/transcom.E95.B.254
http://search.ieice.org/bin/summary.php?id=e95-b_1_254
db/journals/ieicet/ieicet95b.html#YamashitaOISTT12
Eiji Okamoto
A Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security.
1384-1392
2012
95-B
IEICE Trans. Commun.
4
https://doi.org/10.1587/transcom.E95.B.1384
http://search.ieice.org/bin/summary.php?id=e95-b_4_1384
db/journals/ieicet/ieicet95b.html#Okamoto12
Kazutaka Fukuda
Eiji Okamoto
Performance Improvement of IMR-Based NLOS Detection in Indoor Ultra Wide-Band TOA Localization.
1658-1666
2012
95-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
10
https://doi.org/10.1587/transfun.E95.A.1658
http://search.ieice.org/bin/summary.php?id=e95-a_10_1658
db/journals/ieicet/ieicet95a.html#FukudaO12
Naoto Yanai
Raylin Tso
Masahiro Mambo
Eiji Okamoto
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
30-54
2012
3
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
1/2
https://doi.org/10.22667/JOWUA.2012.03.31.030
db/journals/jowua/jowua3.html#YanaiTMO12
Sk. Md. Mizanur Rahman
M. Anwar Hossain 0001
Hussein T. Mouftah
Abdulmotaleb El-Saddik
Eiji Okamoto
Chaos-cryptography based privacy preservation technique for video surveillance.
145-155
2012
18
Multim. Syst.
2
https://doi.org/10.1007/s00530-011-0246-9
https://www.wikidata.org/entity/Q61655342
db/journals/mms/mms18.html#RahmanHMEO12
Naoki Kanayama
Eiji Okamoto
Approach to Pairing Inversions Without Solving Miller Inversion.
1248-1253
2012
58
IEEE Trans. Inf. Theory
2
https://doi.org/10.1109/TIT.2011.2173714
db/journals/tit/tit58.html#KanayamaO12
Kazutaka Fukuda
Eiji Okamoto
Performance improvement of TOA localization using IMR-based NLOS detection in sensor networks.
13-18
2012
ICOIN
https://doi.org/10.1109/ICOIN.2012.6164341
https://doi.ieeecomputersociety.org/10.1109/ICOIN.2012.6164341
conf/icoin/2012
db/conf/icoin/icoin2012.html#FukudaO12
Eiji Okamoto
A secure cooperative relay transmission using chaos MIMO scheme.
374-378
2012
ICUFN
https://doi.org/10.1109/ICUFN.2012.6261731
conf/icufn/2012
db/conf/icufn/icufn2012.html#Okamoto12
Ichita Higurashi
Akira Kanaoka
Masahiko Kato
Eiji Okamoto
Discovery of Unexpected Services and Communication Paths in Networked Systems.
169-178
2012
SafeConfig
https://doi.org/10.1007/978-3-319-01433-3_10
conf/safeconfig/2012
db/conf/safeconfig/safeconfig2012.html#HigurashiKKO12
Masahiko Kato
Takumi Matsunami
Akira Kanaoka
Hiroshi Koide
Eiji Okamoto
Tracing Advanced Persistent Threats in Networked Systems.
179-187
2012
SafeConfig
https://doi.org/10.1007/978-3-319-01433-3_11
conf/safeconfig/2012
db/conf/safeconfig/safeconfig2012.html#KatoMKKO12
Xun Yi
Raylin Tso
Eiji Okamoto
Identity-based Password-Authenticated Key Exchange for Client/Server Model.
45-54
2012
SECRYPT
conf/secrypt/2012
db/conf/secrypt/secrypt2012.html#YiTO12
Yuta Koshimizu
Eiji Okamoto
An Effective Channel Estimation Scheme for Bi-Directional Two-Timeslot OFDM Relay Transmission Using Analog Network Coding.
1-5
2012
VTC Spring
https://doi.org/10.1109/VETECS.2012.6239996
conf/vtc/2012s
db/conf/vtc/vtc2012s.html#KoshimizuO12
Nuray At
Jean-Luc Beuchat
Eiji Okamoto
Ismail San
Teppei Yamazaki
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl.
535
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/535
db/journals/iacr/iacr2012.html#AtBOSY12
Naoki Kanayama
Tadanori Teruya
Eiji Okamoto
Scalar Multiplication on Pairing Friendly Elliptic Curves.
1285-1292
2011
94-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
6
https://doi.org/10.1587/transfun.E94.A.1285
http://search.ieice.org/bin/summary.php?id=e94-a_6_1285
db/journals/ieicet/ieicet94a.html#KanayamaTO11
Yasuhiro Fuwa
Eiji Okamoto
Yasunori Iwanami
An Effective Downlink Resource Allocation Scheme Based on MIMO-OFDMA-CDM in Cellular System.
3550-3558
2011
94-B
IEICE Trans. Commun.
12
https://doi.org/10.1587/transcom.E94.B.3550
http://search.ieice.org/bin/summary.php?id=e94-b_12_3550
db/journals/ieicet/ieicet94b.html#FuwaOI11
Jean-Luc Beuchat
Eiji Okamoto
Teppei Yamazaki
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO.
101-121
2011
1
J. Cryptogr. Eng.
2
https://doi.org/10.1007/s13389-011-0009-8
db/journals/jce/jce1.html#BeuchatOY11
Jean-Luc Beuchat
Jérémie Detrey
Nicolas Estibals
Eiji Okamoto
Francisco Rodríguez-Henríquez
Fast Architectures for the \eta_T Pairing over Small-Characteristic Supersingular Elliptic Curves.
266-281
2011
60
IEEE Trans. Computers
2
https://doi.org/10.1109/TC.2010.163
http://doi.ieeecomputersociety.org/10.1109/TC.2010.163
db/journals/tc/tc60.html#BeuchatDEOR11
Xun Yi
Eiji Okamoto
Practical Remote End-to-End Voting Scheme.
386-400
2011
EGOVIS
https://doi.org/10.1007/978-3-642-22961-9_30
conf/egov/2011
db/conf/egov/egovis2011.html#YiO11
Masayuki Okada
Yasuharu Katsuno
Akira Kanaoka
Eiji Okamoto
32-bit as Number Based IP Traceback.
628-633
2011
IMIS
https://doi.org/10.1109/IMIS.2011.95
https://doi.ieeecomputersociety.org/10.1109/IMIS.2011.95
conf/imis/2011
db/conf/imis/imis2011.html#OkadaKKO11
Naoto Yanai
Raylin Tso
Masahiro Mambo
Eiji Okamoto
Certificateless Ordered Sequential Aggregate Signature Scheme.
662-667
2011
INCoS
https://doi.org/10.1109/INCoS.2011.60
https://doi.ieeecomputersociety.org/10.1109/INCoS.2011.60
conf/incos/2011
db/conf/incos/incos2011.html#YanaiTMO11
Naoki Ogura
Naoki Kanayama
Shigenori Uchiyama
Eiji Okamoto
Cryptographic Pairings Based on Elliptic Nets.
65-78
2011
IWSEC
https://doi.org/10.1007/978-3-642-25141-2_5
conf/iwsec/2011
db/conf/iwsec/iwsec2011.html#OguraKUO11
Alberto Moreno
Eiji Okamoto
BlueSnarf Revisited: OBEX FTP Service Directory Traversal.
155-166
2011
Networking Workshops
https://doi.org/10.1007/978-3-642-23041-7_16
conf/networking/2011w
db/conf/networking/networking2011w.html#MorenoO11
Sk. Md. Mizanur Rahman
Md. Mehedi Masud
Carlisle Adams
Khalil El-Khatib
Hussein T. Mouftah
Eiji Okamoto
Cryptographic security models for eHealth P2P database management systems network.
164-173
2011
PST
https://doi.org/10.1109/PST.2011.5971979
conf/pst/2011
db/conf/pst/pst2011.html#RahmanMAEMO11
Xun Yi
Raylin Tso
Eiji Okamoto
Three-party Password-authenticated Key Exchange without Random Oracles.
15-24
2011
SECRYPT
conf/secrypt/2011
db/conf/secrypt/secrypt2011.html#YiTO11
Eiji Okamoto
A Chaos MIMO Transmission Scheme for Secure Communications on Physical Layer.
1-5
2011
VTC Spring
https://doi.org/10.1109/VETECS.2011.5956601
conf/vtc/2011s
db/conf/vtc/vtc2011s.html#Okamoto11
Eiji Okamoto
Hiroyuki Tsuji
Yoshiyuki Fujino
Performance improvement of OFDMA cellular system using code division multiplexing in satellite/terrestrial integrated mobile communication system.
1-5
2011
WPMC
https://ieeexplore.ieee.org/document/6081539/
conf/wpmc/2011
db/conf/wpmc/wpmc2011.html#OkamotoTF11
Yuya Takahashi
Yasunori Iwanami
Eiji Okamoto
A comparative study on MIMO MLSE turbo equalizer on frequency selective channels.
1-5
2011
WPMC
https://ieeexplore.ieee.org/document/6081455/
conf/wpmc/2011
db/conf/wpmc/wpmc2011.html#TakahashiIO11
Jean-Luc Beuchat
Eiji Okamoto
Teppei Yamazaki
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO.
78
2011
2011
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2011/078
db/journals/iacr/iacr2011.html#BeuchatOY11
Simon Kramer 0001
Rajeev Goré
Eiji Okamoto
Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications.
235
2011
2011
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2011/235
db/journals/iacr/iacr2011.html#KramerGO11
Jean-Luc Beuchat
Hiroshi Doi
Kaoru Fujita
Atsuo Inomata
Piseth Ith
Akira Kanaoka
Masayoshi Katouno
Masahiro Mambo
Eiji Okamoto
Takeshi Okamoto
Takaaki Shiga
Masaaki Shirase
Ryuji Soga
Tsuyoshi Takagi
Ananda Vithanage
Hiroyasu Yamamoto
FPGA and ASIC implementations of the etaT pairing in characteristic three.
73-87
2010
36
Comput. Electr. Eng.
1
https://doi.org/10.1016/j.compeleceng.2009.05.001
db/journals/cee/cee36.html#BeuchatDFIIKKMOOSSSTVY10
Anton Romanov
Eiji Okamoto
Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study.
1411-1421
2010
93-B
IEICE Trans. Commun.
6
https://doi.org/10.1587/transcom.E93.B.1411
http://search.ieice.org/bin/summary.php?id=e93-b_6_1411
db/journals/ieicet/ieicet93b.html#RomanovO10
Takashi Kozawa
Yasunori Iwanami
Eiji Okamoto
Ryota Yamada
Naoki Okamoto
An Evaluation on Throughput Performance for Type II Hybrid-ARQ Using Non-binary Rate-Compatible-Punctured LDPC Codes.
2089-2091
2010
93-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
11
https://doi.org/10.1587/transfun.E93.A.2089
http://search.ieice.org/bin/summary.php?id=e93-a_11_2089
db/journals/ieicet/ieicet93a.html#KozawaIOYO10
Satoshi Nakanobu
Yasunori Iwanami
Eiji Okamoto
A Comparative Study on Time Domain Sequential Equalizer with MLD and MLSE Equalizer on MIMO Frequency Selective Channels.
3197-3202
2010
93-B
IEICE Trans. Commun.
11
https://doi.org/10.1587/transcom.E93.B.3197
http://search.ieice.org/bin/summary.php?id=e93-b_11_3197
db/journals/ieicet/ieicet93b.html#NakanobuIO10
Chifumi Sato
Takeshi Okamoto
Eiji Okamoto
Strongly unforgeable ID-based signatures without random oracles.
35-45
2010
2
Int. J. Appl. Cryptogr.
1
https://doi.org/10.1504/IJACT.2010.033797
db/journals/ijact/ijact2.html#SatoOO10
Anton Romanov
Hiroe Tsubaki
Eiji Okamoto
An Approach to Perform Quantitative Information Security Risk Assessment in IT Landscapes.
213-226
2010
18
J. Inf. Process.
https://doi.org/10.2197/ipsjjip.18.213
db/journals/jip/jip18.html#RomanovTO10
Simon Kramer 0001
Rajeev Goré
Eiji Okamoto
Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography.
75-98
2010
41
SIGACT News
1
https://doi.org/10.1145/1753171.1753193
db/journals/sigact/sigact41.html#KramerGO10
Raylin Tso
Xun Yi
Tadahiko Ito
Takeshi Okamoto
Eiji Okamoto
Design and Analysis of "Flexible" k-out-of-n Signatures.
255-267
2010
ATC
https://doi.org/10.1007/978-3-642-16576-4_19
conf/atc/2010
db/conf/atc/atc2010.html#TsoYIOO10
Lihua Wang 0001
Licheng Wang
Zhenfu Cao
Eiji Okamoto
Jun Shao 0001
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
1-17
2010
Inscrypt
https://doi.org/10.1007/978-3-642-21518-6_1
conf/cisc/2010
db/conf/cisc/inscrypt2010.html#WangWCOS10
Jean-Luc Beuchat
Eiji Okamoto
Teppei Yamazaki
Compact implementations of BLAKE-32 and BLAKE-64 on FPGA.
170-177
2010
FPT
https://doi.org/10.1109/FPT.2010.5681776
conf/fpt/2010
db/conf/fpt/fpt2010.html#BeuchatOY10
Yoshitoshi Yamashita
Eiji Okamoto
Yasunori Iwanami
Yozo Shoji
Morio Toyoshima
Yoshihisa Takayama
An Efficient LDGM Coding Scheme for Optical Satellite-to-Ground Link Based on a New Channel Model.
1-6
2010
GLOBECOM
https://doi.org/10.1109/GLOCOM.2010.5683891
conf/globecom/2010
db/conf/globecom/globecom2010.html#YamashitaOISTT10
Lihua Wang 0001
Licheng Wang
Masahiro Mambo
Eiji Okamoto
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
383-400
2010
ICICS
https://doi.org/10.1007/978-3-642-17650-0_27
conf/icics/2010
db/conf/icics/icics2010.html#WangWMO10
Sk. Md. Mizanur Rahman
M. Anwar Hossain 0001
Hussein T. Mouftah
Abdulmotaleb El-Saddik
Eiji Okamoto
A real-time privacy-sensitive data hiding approach based on chaos cryptography.
72-77
2010
ICME
https://doi.org/10.1109/ICME.2010.5583558
https://doi.ieeecomputersociety.org/10.1109/ICME.2010.5583558
https://www.wikidata.org/entity/Q61655590
conf/icmcs/2010
db/conf/icmcs/icme2010.html#RahmanHMSO10
Kenji Nakayama
Yasunori Iwanami
Eiji Okamoto
MIMO MFSK receivers using FDE and MLD on quasi-static frequency selective fading channels.
31-36
2010
ISITA
https://doi.org/10.1109/ISITA.2010.5649237
conf/isita/2010
db/conf/isita/isita2010.html#NakayamaIO10
Jean-Luc Beuchat
Jorge Enrique González-Díaz
Shigeo Mitsunari
Eiji Okamoto
Francisco Rodríguez-Henríquez
Tadanori Teruya
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves.
21-39
2010
Pairing
https://doi.org/10.1007/978-3-642-17455-1_2
conf/pairing/2010
db/conf/pairing/pairing2010.html#BeuchatGMORT10
Lihua Wang 0001
Licheng Wang
Masahiro Mambo
Eiji Okamoto
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks.
327-346
2010
Pairing
https://doi.org/10.1007/978-3-642-17455-1_21
conf/pairing/2010
db/conf/pairing/pairing2010.html#WangWMO10
Toshiki Harada
Akira Kanaoka
Eiji Okamoto
Masahiko Kato
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS.
367-370
2010
SAINT
https://doi.org/10.1109/SAINT.2010.105
https://doi.ieeecomputersociety.org/10.1109/SAINT.2010.105
conf/saint/2010
db/conf/saint/saint2010.html#HaradaKOK10
Azlan Abd Aziz
Yasunori Iwanami
Eiji Okamoto
On the Improvement of Maximum Likelihood Detection in Multiple Relay Systems.
1-6
2010
WCNC
https://doi.org/10.1109/WCNC.2010.5506662
conf/wcnc/2010
db/conf/wcnc/wcnc2010.html#AzizIO10
Sk. Md. Mizanur Rahman
Mehedi Masud
Carlisle Adams
Khalil El-Khatib
Hussein T. Mouftah
Eiji Okamoto
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems.
85
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/085
db/journals/iacr/iacr2010.html#RahmanMAEMO10
Jean-Luc Beuchat
Eiji Okamoto
Teppei Yamazaki
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA.
173
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/173
db/journals/iacr/iacr2010.html#BeuchatOY10
Naoki Ogura
Naoki Kanayama
Shigenori Uchiyama
Eiji Okamoto
Cryptographic Pairings Based on Elliptic Nets.
353
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/353
db/journals/iacr/iacr2010.html#OguraKUO10
Jean-Luc Beuchat
Jorge Enrique González-Díaz
Shigeo Mitsunari
Eiji Okamoto
Francisco Rodríguez-Henríquez
Tadanori Teruya
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves.
354
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/354
db/journals/iacr/iacr2010.html#BeuchatGMORT10
Jean-Luc Beuchat
Eiji Okamoto
Teppei Yamazaki
A Compact FPGA Implementation of the SHA-3 Candidate ECHO.
364
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/364
db/journals/iacr/iacr2010.html#BeuchatOY10a
Seiichi Matsuda
Naoki Kanayama
Florian Hess
Eiji Okamoto
Optimised Versions of the Ate and Twisted Ate Pairings.
1660-1667
2009
92-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
7
https://doi.org/10.1587/transfun.E92.A.1660
http://search.ieice.org/bin/summary.php?id=e92-a_7_1660&category=A&year=2009&lang=E&abst=
db/journals/ieicet/ieicet92a.html#MatsudaKHO09
Chifumi Sato
Takeshi Okamoto
Eiji Okamoto
Sender Authenticated Key Agreements without Random Oracles.
1787-1794
2009
92-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
8
https://doi.org/10.1587/transfun.E92.A.1787
http://search.ieice.org/bin/summary.php?id=e92-a_8_1787
db/journals/ieicet/ieicet92a.html#SatoOO09
Yasuharu Katsuno
Yuji Watanabe
Michiharu Kudo
Eiji Okamoto
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions.
1-8
2009
ARES
https://doi.org/10.1109/ARES.2009.73
https://doi.ieeecomputersociety.org/10.1109/ARES.2009.73
conf/IEEEares/2009
db/conf/IEEEares/ares2009.html#KatsunoWKO09
Jean-Luc Beuchat
Jérémie Detrey
Nicolas Estibals
Eiji Okamoto
Francisco Rodríguez-Henríquez
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers.
225-239
2009
CHES
https://doi.org/10.1007/978-3-642-04138-9_17
conf/ches/2009
db/conf/ches/ches2009.html#BeuchatDEOR09
Anton Romanov
Eiji Okamoto
A quantitative approach to assess information security related risks.
117-122
2009
CRiSIS
https://doi.org/10.1109/CRISIS.2009.5411970
conf/crisis/2009
db/conf/crisis/crisis2009.html#RomanovO09
Anton Romanov
Eiji Okamoto
A Framework for Building and Managing Secured ERP Landscape.
490-495
2009
Security and Management
conf/csreaSAM/2009
db/conf/csreaSAM/csreaSAM2009.html#RomanovO09
Chifumi Sato
Takeshi Okamoto
Eiji Okamoto
Strongly Unforgeable ID-Based Signatures without Random Oracles.
35-46
2009
ISPEC
https://doi.org/10.1007/978-3-642-00843-6_4
conf/ispec/2009
db/conf/ispec/ispec2009.html#SatoOO09
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
Efficient Short Signatures from Pairing.
417-422
2009
ITNG
https://doi.org/10.1109/ITNG.2009.176
https://doi.ieeecomputersociety.org/10.1109/ITNG.2009.176
conf/itng/2009
db/conf/itng/itng2009.html#TsoOO09
Xun Yi
Raylin Tso
Eiji Okamoto
ID-Based Group Password-Authenticated Key Exchange.
192-211
2009
IWSEC
https://doi.org/10.1007/978-3-642-04846-3_13
conf/iwsec/2009
db/conf/iwsec/iwsec2009.html#YiTO09
Anton Romanov
Eiji Okamoto
An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment.
313-318
2009
SECRYPT
conf/secrypt/2009
db/conf/secrypt/secrypt2009.html#RomanovO09
Jean-Luc Beuchat
Jérémie Detrey
Nicolas Estibals
Eiji Okamoto
Francisco Rodríguez-Henríquez
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers.
122
2009
2009
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2009/122
db/journals/iacr/iacr2009.html#BeuchatDEOR09
Jean-Luc Beuchat
Jérémie Detrey
Nicolas Estibals
Eiji Okamoto
Francisco Rodríguez-Henríquez
Fast Architectures for the etaT Pairing over Small-Characteristic Supersingular Elliptic Curves.
398
2009
2009
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2009/398
db/journals/iacr/iacr2009.html#BeuchatDEOR09a
Chifumi Sato
Takeshi Okamoto
Eiji Okamoto
Underlying Assumptions and Designated Verifier Signatures.
499
2009
2009
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2009/499
db/journals/iacr/iacr2009.html#SatoOO09
Licheng Wang
Lihua Wang 0001
Zhenfu Cao
Eiji Okamoto
Jun Shao 0001
New Cryptosystems From CSP-Based Self-Distributive Systems.
566
2009
2009
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2009/566
db/journals/iacr/iacr2009.html#WangWCOS09
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
Some Efficient Algorithms for the Final Exponentiation of etaT Pairing.
221-228
2008
91-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
https://doi.org/10.1093/ietfec/e91-a.1.221
db/journals/ieicet/ieicet91a.html#ShiraseTO08
Sk. Md. Mizanur Rahman
Nidal Nasser
Atsuo Inomata
Takeshi Okamoto
Masahiro Mambo
Eiji Okamoto
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks.
179-189
2008
1
Secur. Commun. Networks
2
https://doi.org/10.1002/sec.4
db/journals/scn/scn1.html#RahmanNIOMO08
Jean-Luc Beuchat
Nicolas Brisebarre
Jérémie Detrey
Eiji Okamoto
Masaaki Shirase
Tsuyoshi Takagi
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three.
1454-1468
2008
57
IEEE Trans. Computers
11
https://doi.org/10.1109/TC.2008.103
http://doi.ieeecomputersociety.org/10.1109/TC.2008.103
db/journals/tc/tc57.html#BeuchatBDOST08
Xun Yi
Mike Faulkner
Eiji Okamoto
Secure Wireless Sensor Networks.
497-502
2008
ARES
https://doi.org/10.1109/ARES.2008.99
https://doi.ieeecomputersociety.org/10.1109/ARES.2008.99
conf/IEEEares/2008
db/conf/IEEEares/ares2008.html#YiFO08
Atsushi Koide
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
A Restricted Undeniable Designated Verifier Signature.
1375-1380
2008
APSCC
https://doi.org/10.1109/APSCC.2008.134
https://doi.ieeecomputersociety.org/10.1109/APSCC.2008.134
conf/apscc/2008
db/conf/apscc/apscc2008.html#KoideTOO08
Atsushi Koide
Raylin Tso
Eiji Okamoto
A Sanitizing Signature Scheme with Indexing.
16-21
2008
EUC (2)
https://doi.org/10.1109/EUC.2008.63
https://doi.ieeecomputersociety.org/10.1109/EUC.2008.63
conf/euc/2008-2
db/conf/euc/euc2008-2.html#KoideTO08
Atsushi Koide
Raylin Tso
Eiji Okamoto
Convertible Undeniable Partially Blind Signature from Bilinear Pairings.
77-82
2008
EUC (2)
https://doi.org/10.1109/EUC.2008.64
https://doi.ieeecomputersociety.org/10.1109/EUC.2008.64
conf/euc/2008-2
db/conf/euc/euc2008-2.html#KoideTO08a
Raylin Tso
Xun Yi
Takeshi Okamoto
Eiji Okamoto
Efficient convertible Limited Verifier Signatures.
230-234
2008
ISIT
https://doi.org/10.1109/ISIT.2008.4594982
conf/isit/2008
db/conf/isit/isit2008.html#TsoYOO08
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
1-out-of-.
45-55
2008
ISPEC
https://doi.org/10.1007/978-3-540-79104-1_4
conf/ispec/2008
db/conf/ispec/ispec2008.html#TsoOO08
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation.
290-303
2008
ISPEC
https://doi.org/10.1007/978-3-540-79104-1_21
conf/ispec/2008
db/conf/ispec/ispec2008.html#ShiraseTO08
Jean-Luc Beuchat
Nicolas Brisebarre
Jérémie Detrey
Eiji Okamoto
Francisco Rodríguez-Henríquez
A Comparison between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m.
297-315
2008
Pairing
https://doi.org/10.1007/978-3-540-85538-5_20
conf/pairing/2008
db/conf/pairing/pairing2008.html#BeuchatBDOR08
Chifumi Sato
Takeshi Okamoto
Eiji Okamoto
Strongly Unforgeable ID-based Signatures Without Random Oracles.
95
2008
2008
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2008/095
db/journals/iacr/iacr2008.html#SatoOO08
Jean-Luc Beuchat
Nicolas Brisebarre
Jérémie Detrey
Eiji Okamoto
Francisco Rodríguez-Henríquez
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m.
115
2008
2008
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2008/115
db/journals/iacr/iacr2008.html#BeuchatBDOR08
Nidia Cortez-Duarte
Francisco Rodríguez-Henríquez
Jean-Luc Beuchat
Eiji Okamoto
A Pipelined Karatsuba-Ofman Multiplier over GF(397) Amenable for Pairing Computation.
127
2008
2008
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2008/127
db/journals/iacr/iacr2008.html#Cortez-DuarteRBO08
Jean-Luc Beuchat
Hiroshi Doi
Kaoru Fujita
Atsuo Inomata
Piseth Ith
Akira Kanaoka
Masayoshi Katouno
Masahiro Mambo
Eiji Okamoto
Takeshi Okamoto
Takaaki Shiga
Masaaki Shirase
Ryuji Soga
Tsuyoshi Takagi
Ananda Vithanage
Hiroyasu Yamamoto
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three.
280
2008
2008
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2008/280
db/journals/iacr/iacr2008.html#BeuchatDFIIKKMOOSSSTVY08
Lihua Wang 0001
Eiji Okamoto
Ying Miao 0001
Takeshi Okamoto
Hiroshi Doi
An ID-SP-M4M Scheme and Its Security Analysis.
91-100
2007
90-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
https://doi.org/10.1093/ietfec/e90-a.1.91
https://www.wikidata.org/entity/Q114999619
db/journals/ieicet/ieicet90a.html#WangOMOD07
Raylin Tso
Xun Yi
Eiji Okamoto
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments.
103-110
2007
APSCC
https://doi.org/10.1109/APSCC.2007.42
https://doi.ieeecomputersociety.org/10.1109/APSCC.2007.42
conf/apscc/2007
db/conf/apscc/apscc2007.html#TsoYO07
Jean-Luc Beuchat
Takanori Miyoshi
Yoshihito Oyama
Eiji Okamoto
Multiplication over Fpm on FPGA: A Survey.
214-225
2007
conf/arc/2007
ARC
https://doi.org/10.1007/978-3-540-71431-6_20
db/conf/arc/arc2007.html#BeuchatMOO07
Jean-Luc Beuchat
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation.
97-104
2007
conf/arith/2007
IEEE Symposium on Computer Arithmetic
https://doi.org/10.1109/ARITH.2007.10
https://doi.ieeecomputersociety.org/10.1109/ARITH.2007.10
db/conf/arith/arith2007.html#BeuchatSTO07
Raylin Tso
Chunxiang Gu
Takeshi Okamoto
Eiji Okamoto
Efficient ID-Based Digital Signatures with Message Recovery.
47-59
2007
conf/cans/2007
CANS
https://doi.org/10.1007/978-3-540-76969-9_4
db/conf/cans/cans2007.html#TsoGOO07
Jean-Luc Beuchat
Nicolas Brisebarre
Jérémie Detrey
Eiji Okamoto
Arithmetic Operators for Pairing-Based Cryptography.
239-255
2007
conf/ches/2007
CHES
https://doi.org/10.1007/978-3-540-74735-2_17
db/conf/ches/ches2007.html#BeuchatBDO07
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
11-24
2007
Inscrypt
https://doi.org/10.1007/978-3-540-79499-8_3
conf/cisc/2008
db/conf/cisc/inscrypt2008.html#TsoOO08
Seiichi Matsuda
Naoki Kanayama
Florian Hess
Eiji Okamoto
Optimised Versions of the Ate and Twisted Ate Pairings.
302-312
2007
conf/ima/2007
IMACC
https://doi.org/10.1007/978-3-540-77272-9_18
db/conf/ima/ima2007.html#MatsudaKHO07
Raylin Tso
Juan Manuel González Nieto
Takeshi Okamoto
Colin Boyd
Eiji Okamoto
Verifier-Key-Flexible Universal Designated-Verifier Signatures.
403-421
2007
conf/ima/2007
IMACC
https://doi.org/10.1007/978-3-540-77272-9_24
db/conf/ima/ima2007.html#TsoNOBO07
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing.
254-268
2007
conf/ispec/2007
ISPEC
https://doi.org/10.1007/978-3-540-72163-5_20
db/conf/ispec/ispec2007.html#ShiraseTO07
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
An Improved Signcryption Scheme and Its Variation.
772-778
2007
conf/itng/2007
ITNG
https://doi.org/10.1109/ITNG.2007.34
https://doi.ieeecomputersociety.org/10.1109/ITNG.2007.34
db/conf/itng/itng2007.html#TsoOO07
Yusuke Takahashi
Yasunori Iwanami
Eiji Okamoto
A Comparison of Time Domain Equalizers by Block Processing in SISO Single Carrier Transmission.
1-5
2007
PIMRC
https://doi.org/10.1109/PIMRC.2007.4394026
conf/pimrc/2007
db/conf/pimrc/pimrc2007.html#TakahashiIO07
Jean-Luc Beuchat
Nicolas Brisebarre
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three.
25-39
2007
conf/waifi/2007
WAIFI
https://doi.org/10.1007/978-3-540-73074-3_4
db/conf/waifi/waifi2007.html#BeuchatBSTO07
Masaaki Shirase
Yuto Kawahara
Tsuyoshi Takagi
Eiji Okamoto
Universal etaT Pairing Algorithm over Arbitrary Extension Degree.
1-15
2007
conf/wisa/2007
WISA
https://doi.org/10.1007/978-3-540-77535-5_1
db/conf/wisa/wisa2007.html#ShiraseKTO07
Tsuyoshi Takagi
Tatsuaki Okamoto
Eiji Okamoto
Takeshi Okamoto
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings
Pairing
Lecture Notes in Computer Science
4575
Springer
2007
978-3-540-73488-8
https://doi.org/10.1007/978-3-540-73489-5
db/conf/pairing/pairing2007.html
Seiichi Matsuda
Naoki Kanayama
Florian Hess
Eiji Okamoto
Optimised versions of the Ate and Twisted Ate Pairings.
13
2007
2007
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2007/013
db/journals/iacr/iacr2007.html#MatsudaKHO07
Jean-Luc Beuchat
Nicolas Brisebarre
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
A Coprocessor for the Final Exponentiation of the etaT Pairing in Characteristic Three.
45
2007
2007
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2007/045
db/journals/iacr/iacr2007.html#BeuchatBSTO07
Jean-Luc Beuchat
Nicolas Brisebarre
Jérémie Detrey
Eiji Okamoto
Arithmetic Operators for Pairing-Based Cryptography.
91
2007
2007
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2007/091
db/journals/iacr/iacr2007.html#BeuchatBDO07
Jean-Luc Beuchat
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
A Refined Algorithm for the etaT Pairing Calculation in Characteristic Three.
311
2007
2007
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2007/311
db/journals/iacr/iacr2007.html#BeuchatSTO07
Jean-Luc Beuchat
Nicolas Brisebarre
Jérémie Detrey
Eiji Okamoto
Masaaki Shirase
Tsuyoshi Takagi
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three.
417
2007
2007
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2007/417
db/journals/iacr/iacr2007.html#BeuchatBDOST07
Xun Yi
Raylin Tso
Eiji Okamoto
ID-Based Group Password-Authenticated Key Exchange.
469
2007
2007
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2007/469
db/journals/iacr/iacr2007.html#YiTO07
Lihua Wang 0001
Zhenfu Cao
Takeshi Okamoto
Ying Miao 0001
Eiji Okamoto
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
106-114
2006
89-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
https://doi.org/10.1093/ietfec/e89-a.1.106
https://www.wikidata.org/entity/Q114999654
db/journals/ieicet/ieicet89a.html#WangCOMO06
Kun Peng
Colin Boyd
Ed Dawson
Eiji Okamoto
A Novel Range Test.
247-258
2006
conf/acisp/2006
ACISP
https://doi.org/10.1007/11780656_21
db/conf/acisp/acisp2006.html#PengBDO06
Yuto Kawahara
Tsuyoshi Takagi
Eiji Okamoto
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java.
396-405
2006
conf/cis/2006
CIS
https://doi.org/10.1007/978-3-540-74377-4_42
db/conf/cis/cis2006.html#KawaharaTO06
Eiji Okamoto
Yasunori Iwanami
A trellis-coded chaotic modulation scheme.
5010-5015
2006
ICC
https://doi.org/10.1109/ICC.2006.255460
conf/icc/2006
db/conf/icc/icc2006.html#OkamotoI06
Sk. Md. Mizanur Rahman
Atsuo Inomata
Takeshi Okamoto
Masahiro Mambo
Eiji Okamoto
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks.
140-149
2006
conf/icuct/2006
ICUCT
https://doi.org/10.1007/978-3-540-71789-8_15
db/conf/icuct/icuct2006.html#RahmanIOMO06
Sk. Md. Mizanur Rahman
Masahiro Mambo
Atsuo Inomata
Eiji Okamoto
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks.
300-306
2006
conf/saint/2006
SAINT
https://doi.org/10.1109/SAINT.2006.13
https://doi.ieeecomputersociety.org/10.1109/SAINT.2006.13
db/conf/saint/saint2006.html#RahmanMIO06
Raylin Tso
Chunxiang Gu
Takeshi Okamoto
Eiji Okamoto
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.
195
2006
2006
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2006/195
db/journals/iacr/iacr2006.html#TsoGOO06
Yuto Kawahara
Tsuyoshi Takagi
Eiji Okamoto
Efficient Implementation of Tate Pairing on a Mobile Phone using Java.
299
2006
2006
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2006/299
db/journals/iacr/iacr2006.html#KawaharaTO06
Jean-Luc Beuchat
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
An Algorithm for the ηT Pairing Calculation in Characteristic Three and its Hardware Implementation.
327
2006
2006
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2006/327
db/journals/iacr/iacr2006.html#BeuchatSTO06
Sk. Md. Mizanur Rahman
Atsuo Inomata
Takeshi Okamoto
Masahiro Mambo
Eiji Okamoto
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks.
328
2006
2006
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2006/328
db/journals/iacr/iacr2006.html#RahmanIOMO06
Lihua Wang 0001
Takeshi Okamoto
Masahiro Mambo
Eiji Okamoto
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority.
344
2006
2006
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2006/344
db/journals/iacr/iacr2006.html#WangOMO06
Masaaki Shirase
Tsuyoshi Takagi
Eiji Okamoto
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing.
431
2006
2006
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2006/431
db/journals/iacr/iacr2006.html#ShiraseTO06
Javier López 0001
José A. Montenegro
José Luis Vivas
Eiji Okamoto
Ed Dawson
Specification and design of advanced authentication and authorization services.
467-478
2005
27
Comput. Stand. Interfaces
5
https://doi.org/10.1016/j.csi.2005.01.005
https://www.wikidata.org/entity/Q62038168
db/journals/csi/csi27.html#LopezMVOD05
Kun Peng
Ed Dawson
Juanma González Nieto
Eiji Okamoto
Javier López 0001
A Novel Method to Maintain Privacy in Mobile Agent Applications.
247-260
2005
conf/cans/2005
CANS
https://doi.org/10.1007/11599371_21
db/conf/cans/cans2005.html#PengDNOL05
Raylin Tso
Takeshi Okamoto
Tsuyoshi Takagi
Eiji Okamoto
An id-based non-interactive tripartite key agreement protocol with K-resilience.
38-42
2005
conf/ccn/2005
Communications and Computer Networks
db/conf/ccn/ccn2005.html#TsoOTO05
Lihua Wang 0001
Takeshi Okamoto
Tsuyoshi Takagi
Eiji Okamoto
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
198-203
2005
conf/cis/2005-2
CIS (2)
https://doi.org/10.1007/11596981_30
db/conf/cis/cis2005-2.html#WangOTO05
Raylin Tso
Takeshi Okamoto
Eiji Okamoto
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
113-127
2005
conf/cisc/2005
CISC
https://doi.org/10.1007/11599548_10
db/conf/cisc/cisc2005.html#TsoOO05
Takeshi Okamoto
Atsuo Inomata
Eiji Okamoto
A Proposal of Short Proxy Signature using Pairing.
631-635
2005
conf/itcc/2005-1
ITCC (1)
https://doi.org/10.1109/ITCC.2005.27
https://doi.ieeecomputersociety.org/10.1109/ITCC.2005.27
db/conf/itcc/itcc2005-1.html#OkamotoIO05
Eiji Okamoto
Takeshi Okamoto
Cryptosystems Based on Elliptic Curve Pairing.
13-23
2005
conf/mdai/2005
MDAI
https://doi.org/10.1007/11526018_3
db/conf/mdai/mdai2005.html#OkamotoO05
Takeshi Okamoto
Raylin Tso
Eiji Okamoto
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing.
122-133
2005
conf/mdai/2005
MDAI
https://doi.org/10.1007/11526018_13
db/conf/mdai/mdai2005.html#OkamotoTO05
Lihua Wang 0001
Eiji Okamoto
Ying Miao 0001
Takeshi Okamoto
Hiroshi Doi
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
291-303
2005
conf/wcc/2005
WCC
https://doi.org/10.1007/11779360_23
db/conf/wcc/wcc2005.html#WangOMOD05
Ryôichi Sasaki
Sihan Qing
Eiji Okamoto
Hiroshi Yoshiura
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan
0-387-25658-X
SEC
Springer
IFIP
181
https://doi.org/10.1007/b135818
2005
db/conf/sec/sec2005.html
Malapati Raja Sekhar
Takeshi Okamoto
Eiji Okamoto
On Designatedly Verified (Non-interactive) Watermarking Schemes.
120
2005
2005
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2005/120
db/journals/iacr/iacr2005.html#SekharOO05
Raylin Tso
Ying Miao 0001
Takeshi Okamoto
Eiji Okamoto
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
239
2005
2005
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2005/239
db/journals/iacr/iacr2005.html#TsoMOO05
Masakazu Soshi
Mamoru Maekawa
Eiji Okamoto
The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem.
190-203
http://search.ieice.org/bin/summary.php?id=e87-a_1_190&category=D&year=2004&lang=E&abst=
2004
87-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
1
db/journals/ieicet/ieicet87a.html#SoshiMO04
Tadahiko Ito
Takeshi Okamoto
Atsuo Inomata
Eiji Okamoto
Anonymous traceable disclosure scheme using pairing over elliptic curve.
48-52
2004
InfoSecu
https://doi.org/10.1145/1046290.1046301
conf/infosecu/2004
db/conf/infosecu/infosecu2004.html#ItoOIO04
Lihua Wang 0001
Zhenfu Cao
Eiji Okamoto
Ying Miao 0001
Takeshi Okamoto
Transformation-free proxy cryptosystems and their applications to electronic commerce.
92-98
2004
InfoSecu
https://doi.org/10.1145/1046290.1046310
conf/infosecu/2004
db/conf/infosecu/infosecu2004.html#0001COMO04
Javier López 0001
Sihan Qing
Eiji Okamoto
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings
3269
3-540-23563-9
ICICS
Lecture Notes in Computer Science
Springer
2004
https://doi.org/10.1007/b101042
db/conf/icics/icics2004.html
Selwyn Russell
Ed Dawson
Eiji Okamoto
Javier López 0001
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
1826-1838
2003
26
Comput. Commun.
16
https://doi.org/10.1016/S0140-3664(03)00078-1
db/journals/comcom/comcom26.html#RussellDOL03
Tian-Bo Deng
Eiji Okamoto
SVD-based design of fractional-delay 2-D digital filters exploiting specification symmetries.
470-480
2003
50
IEEE Trans. Circuits Syst. II Express Briefs
8
https://doi.org/10.1109/TCSII.2003.814809
db/journals/tcasII/tcasII50.html#DengO03
Juan Manuel González Nieto
Ed Dawson
Eiji Okamoto
Privacy and Trusted Computing.
383-388
2003
conf/dexaw/2003
DEXA Workshops
https://doi.org/10.1109/DEXA.2003.1232052
https://doi.ieeecomputersociety.org/10.1109/DEXA.2003.1232052
db/conf/dexaw/dexaw2003.html#NietoDO03
Akira Kanaoka
Eiji Okamoto
Multivariate Statistical Analysis of Network Traffic for Intrusion Detection.
472-476
2003
conf/dexaw/2003
DEXA Workshops
https://doi.org/10.1109/DEXA.2003.1232068
https://doi.ieeecomputersociety.org/10.1109/DEXA.2003.1232068
db/conf/dexaw/dexaw2003.html#KanaokaO03
Raylin Tso
Ying Miao 0001
Eiji Okamoto
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.
377-385
https://doi.org/10.1007/978-3-540-24691-6_28
2003
conf/icisc/2003
ICISC
db/conf/icisc/icisc2003.html#TsoMO03
Takeshi Okamoto
Hirofumi Katsuno
Eiji Okamoto
A Fast Signature Scheme Based on New On-line Computation.
111-121
https://doi.org/10.1007/10958513_9
2003
conf/isw/2003
ISC
db/conf/isw/isc2003.html#OkamotoKO03
Eiji Okamoto
Huan-Bang Li
Tetsushi Ikegami
A Pilot-Symbol-Assisted Fading and Frequency-Offset Compensation Method Using FFT.
1656-1664
2002
85-A
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
7
http://search.ieice.org/bin/summary.php?id=e85-a_7_1656
db/journals/ieiceta/ieiceta85.html#OkamotoLI02
Eiji Okamoto
Hiroyo Ogawa
A block-coded modulation method for one-way multimode data transmission.
2124-2135
2002
50
IEEE Trans. Commun.
12
https://doi.org/10.1109/TCOMM.2002.806493
db/journals/tcom/tcom50.html#OkamotoO02
Marie Henderson
Robert S. Coulter
Ed Dawson
Eiji Okamoto
Modelling Trust Structures for Public Key Infrastructures.
56-70
2002
conf/acisp/2002
ACISP
https://doi.org/10.1007/3-540-45450-0_5
db/conf/acisp/acisp2002.html#HendersonCDO02
Masahiro Mambo
Eiji Okamoto
Yasushi Sengoku
Takashi Tanaka
Simple and Secure Mobile Access under the Flexible Organization Management.
456-462
2002
conf/dexaw/2002
DEXA Workshops
https://doi.org/10.1109/DEXA.2002.1045940
https://doi.ieeecomputersociety.org/10.1109/DEXA.2002.1045940
db/conf/dexaw/dexaw2002.html#MamboOST02
Ed Dawson
Javier López 0001
José A. Montenegro
Eiji Okamoto
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
136-149
2002
conf/isw/2002
ISC
https://doi.org/10.1007/3-540-45811-5_10
db/conf/isw/isc2002.html#DawsonLMO02
Eiji Okamoto
Cryptosystems based on polynomials over finite fields.
74-77
2002
ITW
https://doi.org/10.1109/ITW.2002.1115420
conf/itw/2002
db/conf/itw/itw2002.html#Okamoto02
Dieter Gollmann
Catherine A. Meadows
Eiji Okamoto
Editorial.
1-2
2001
1
Int. J. Inf. Sec.
1
https://doi.org/10.1007/s102070100004
db/journals/ijisec/ijisec1.html#X01
Eiji Okamoto
Hiroyo Ogawa
One-way multimode transmission using block-coded modulation for mobile communications.
136-140
2001
VTC Fall
https://doi.org/10.1109/VTC.2001.956571
conf/vtc/2001f
db/conf/vtc/vtc2001f.html#OkamotoO01
Xun Yi
Chee Kheong Siew
Xiao Feng Wang
Eiji Okamoto
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments.
85-117
2000
8
Distributed Parallel Databases
1
db/journals/dpd/dpd8.html#YiSWO00
https://doi.org/10.1023/A:1008735301014
DPD/8/P085.pdf
Hiroshi Doi
Masahiro Mambo
Eiji Okamoto
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.
352-367
2000
conf/acisp/2000
ACISP
db/conf/acisp/acisp2000.html#DoiMO00
https://doi.org/10.1007/10718964_29
Mike Burmester
Yvo Desmedt
Hiroshi Doi
Masahiro Mambo
Eiji Okamoto
Mitsuru Tada
Yuko Yoshifuji
A Structured ElGamal-Type Multisignature Scheme.
466-483
2000
conf/pkc/2000
Public Key Cryptography
db/conf/pkc/pkc2000.html#BurmesterDDMOTY00
https://doi.org/10.1007/978-3-540-46588-1_31
Bimal K. Roy
Eiji Okamoto
Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings
INDOCRYPT
Lecture Notes in Computer Science
1977
Springer
2000
3-540-41452-5
https://doi.org/10.1007/3-540-44495-5
db/conf/indocrypt/indocrypt2000.html
Josef Pieprzyk
Eiji Okamoto
Jennifer Seberry
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings
ISW
Lecture Notes in Computer Science
1975
Springer
2000
3-540-41416-9
https://doi.org/10.1007/3-540-44456-4
https://www.wikidata.org/entity/Q62559315
db/conf/isw/isw2000.html
Xiao Feng Wang
Kwok-Yan Lam
Xun Yi
C. Q. Zhang
Eiji Okamoto
Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
291-302
https://doi.org/10.1007/3-540-48414-0_20
1999
conf/cia/1999
CIA
db/conf/cia/cia99.html#WangLYZO99
Xun Yi
Shigeki Kitazawa
Hisao Sakazaki
Eiji Okamoto
D. Frank Hsu
An agent-based architecture for securing mobile IP.
303-314
1999
Mobile Networks and Computing
conf/dimacs/dimacs52
db/conf/dimacs/dimacs52.html#YiKSOH99
https://doi.org/10.1090/dimacs/052/19
Kazumasa Omote
Eiji Okamoto
User Identification System Based on Biometrics for Keystroke.
216-229
1999
conf/icics/1999
ICICS
db/conf/icics/icics1999.html#OmoteO99
https://doi.org/10.1007/978-3-540-47942-0_18
Josef Pieprzyk
Eiji Okamoto
Verfiable Secret Sharing and Time Capsules.
169-183
1999
conf/icisc/1999
ICISC
db/conf/icisc/icisc1999.html#PieprzykO99
https://doi.org/10.1007/10719994_14
https://www.wikidata.org/entity/Q59485080
Shigeki Kitazawa
Xun Yi
Eiji Okamoto
Masahiro Mambo
Improvement of Secure Access Control Agent for Distributed Files.
185-191
1999
conf/icppw/1999
ICPP Workshops
https://doi.org/10.1109/ICPPW.1999.800060
https://doi.ieeecomputersociety.org/10.1109/ICPPW.1999.800060
db/conf/icppw/icppw1999.html#KitazawaYOM99
Takeshi Okamoto
Mitsuru Tada
Eiji Okamoto
Extended Proxy Signatures for Smart Cards.
247-258
1999
conf/isw/1999
ISW
https://doi.org/10.1007/3-540-47790-X_21
db/conf/isw/isw1999.html#OkamotoTO99
Xun Yi
S. Kitazawa
Eiji Okamoto
Xiao Feng Wang
Kwok-Yan Lam
S. Tu
Agent-based copyright protection architecture for online electronic publishing.
484-493
1999
Security and Watermarking of Multimedia Contents
https://doi.org/10.1117/12.344698
conf/sswmc/1999
db/conf/sswmc/swmc1999.html#YiKOWLT99
Eiji Okamoto
Huan-Bang Li
Masato Tanaka
Hiromitsu Wakana
A class-coded modulation method using orthogonal wavelets.
1158-1161
1999
WCNC
https://doi.org/10.1109/WCNC.1999.796898
conf/wcnc/1999
db/conf/wcnc/wcnc1999.html#OkamotoLTW99
Kwok-Yan Lam
Eiji Okamoto
Chaoping Xing
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings
ASIACRYPT
Lecture Notes in Computer Science
1716
Springer
1999
3-540-66666-4
https://doi.org/10.1007/b72231
db/conf/asiacrypt/asiacrypt99.html
Xun Yi
Eiji Okamoto
Kwok-Yan Lam
An optimized protocol for mobile network authentication and security.
37-39
1998
2
ACM SIGMOBILE Mob. Comput. Commun. Rev.
3
https://doi.org/10.1145/1321387.1321391
db/journals/sigmobile/sigmobile2.html#YiOL98
Agus Fanar Syukri
Eiji Okamoto
Masahiro Mambo
A User Identification System Using Signature Written with Mouse.
403-414
1998
conf/acisp/1998
ACISP
https://doi.org/10.1007/BFb0053751
db/conf/acisp/acisp1998.html#SyukriOM98
Xiao Feng Wang
Xun Yi
Kwok-Yan Lam
Eiji Okamoto
Secure Information Gathering Agent for Internet Trading.
183-193
1998
conf/dai/1998
DAI
db/conf/dai/dai1998.html#WangYLO98
https://doi.org/10.1007/10693067_13
Xun Yi
Xiao Feng Wang
Kwok-Yan Lam
Eiji Okamoto
D. Frank Hsu
A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
197-203
1998
conf/srds/1998
SRDS
db/conf/srds/srds98.html#YiWLOH98
https://doi.org/10.1109/RELDIS.1998.740495
https://doi.ieeecomputersociety.org/10.1109/RELDIS.1998.740495
Eiji Okamoto
George I. Davida
Masahiro Mambo
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings
ISW
Lecture Notes in Computer Science
1396
Springer
1998
3-540-64382-6
https://doi.org/10.1007/BFb0030404
db/conf/isw/isw1997.html
Tomohiko Uyematsu
Eiji Okamoto
A construction of codes with exponential error bounds on arbitrary discrete memoryless channels.
992-996
1997
43
IEEE Trans. Inf. Theory
3
db/journals/tit/tit43.html#UyematsuO97
https://doi.org/10.1109/18.568709
Masahiro Mambo
Eiji Okamoto
Kouichi Sakurai
Protection of Data and Delegated Keys in Digital Distribution.
271-282
1997
conf/acisp/1997
ACISP
db/conf/acisp/acisp1997.html#MamboOS97
https://doi.org/10.1007/BFb0027934
Kenichi Hayashi
Eiji Okamoto
Masahiro Mambo
Proposal of user identification scheme using mouse.
144-148
1997
conf/icics/1997
ICICS
db/conf/icics/icics1997.html#HayashiOM97
https://doi.org/10.1007/BFb0028470
Hisao Sakazaki
Eiji Okamoto
Masahiro Mambo
The Application of ID-Based Key Distribution Systems to an Elliptic Curve.
335-344
1997
conf/isw/1997
ISW
db/conf/isw/isw1997.html#SakazakiOM97
https://doi.org/10.1007/BFb0030434
Masahiro Mambo
Takanori Murayama
Eiji Okamoto
A tentative approach to constructing tamper-resistant software.
23-33
1997
NSPW
https://doi.org/10.1145/283699.283736
conf/nspw/1997
db/conf/nspw/nspw1997.html#MamboMO97
Masahiro Mambo
Kouichi Sakurai
Eiji Okamoto
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
322-333
1996
conf/asiacrypt/1996
ASIACRYPT
db/conf/asiacrypt/asiacrypt96.html#MamboSO96
https://doi.org/10.1007/BFb0034858
Masahiro Mambo
Keisuke Usuda
Eiji Okamoto
Proxy Signatures for Delegating Signing Operation.
48-57
1996
conf/ccs/1996
CCS
https://doi.org/10.1145/238168.238185
db/conf/ccs/ccs1996.html#MamboUO96
Eiji Okamoto
Huan-Bang Li
Tetsushi Ikegami
Rayleigh fading compensation for QAM by using FFT.
1079-1082
1996
PIMRC
https://doi.org/10.1109/PIMRC.1996.568448
conf/pimrc/1996
db/conf/pimrc/pimrc1996.html#OkamotoLI96
Eiji Okamoto
Tomohiko Uyematsu
Masahiro Mambo
Permutation Cipher Scheme Using Polynomials over a Field.
138-142
1995
78-D
IEICE Trans. Inf. Syst.
2
http://search.ieice.org/bin/summary.php?id=e78-d_2_138
db/journals/ieicet/ieicet78d.html#OkamotoUM95
Yukiyasu Tsunoo
Eiji Okamoto
Tomohiko Uyematsu
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext.
369-382
https://doi.org/10.1007/3-540-48658-5_34
1994
conf/crypto/1994
CRYPTO
db/conf/crypto/crypto94.html#TsunooOU94
Kazue Tanaka
Eiji Okamoto
Key distribution system for mail systems using ID-related information directory.
25-33
1991
10
Comput. Secur.
1
https://doi.org/10.1016/0167-4048(91)90052-F
https://www.wikidata.org/entity/Q115118628
db/journals/compsec/compsec10.html#TanakaO91
Eiji Okamoto
Kazue Tanaka
Proposal for Cryptographic Key Distribution System Based on Identification Information.
76-84
1990
21
Syst. Comput. Jpn.
4
https://doi.org/10.1002/scj.4690210408
db/journals/scjapan/scjapan21.html#OkamotoT90
Eiji Okamoto
Kazue Tanaka
Identity-based information security management system for personal computer networks.
290-294
1989
7
IEEE J. Sel. Areas Commun.
2
https://doi.org/10.1109/49.17700
https://www.wikidata.org/entity/Q114991865
db/journals/jsac/jsac7.html#OkamotoT89
Eiji Okamoto
Kazue Tanaka
Key distribution system based on identification information.
481-485
1989
7
IEEE J. Sel. Areas Commun.
4
https://doi.org/10.1109/49.17711
db/journals/jsac/jsac7.html#OkamotoT89a
Eiji Okamoto
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs.
361-373
https://doi.org/10.1007/3-540-45961-8_34
1988
conf/eurocrypt/88
EUROCRYPT
db/conf/eurocrypt/eurocrypt88.html#Okamoto88
Eiji Okamoto
Key Distribution Systems Based on Identification Information.
194-202
https://doi.org/10.1007/3-540-48184-2_15
1987
conf/crypto/1987
CRYPTO
db/conf/crypto/crypto87.html#Okamoto87
Eiji Okamoto
K. Nakamura
Lifetimes of Keys in Cryptographic Key Management Systems.
246-259
https://doi.org/10.1007/3-540-39799-X_19
1985
conf/crypto/1985
CRYPTO
db/conf/crypto/crypto85.html#OkamotoN85
Takumi Abe
Carlisle M. AdamsCarlisle Adams
Hidenori Akita
Tomohiro Akiyoshi
Keisuke Asano
Nuray At
Azlan Abd Aziz
Jean-Luc Beuchat
Colin Boyd
Nicolas Brisebarre
Mike Burmester
Zhenfu Cao
Eikoh Chida
Nidia Cortez-Duarte
Robert S. Coulter
George I. Davida
Ed Dawson
Tian-Bo Deng
Yvo Desmedt
Jérémie Detrey
Hiroshi Doi
Khalil El-Khatib
Abdulmotaleb El-Saddik
Keita Emura
Nicolas Estibals
Michael FaulknerMike Faulkner
Yoshiyuki Fujino
Kaoru Fujita
Kazutaka Fukuda
Yasuhiro Fuwa
Dieter Gollmann
Jorge Enrique González-Díaz
Rajeev Goré
Nasato Goto
Chunxiang Gu
Jehad M. Hamamreh
Goichiro Hanaoka
Toshiki Harada
Keisuke Hasegawa
Ryo Hasegawa
Kenichi Hayashi
Marie Henderson
Florian Hess
Ichita Higurashi
Manato Horiba
Naoto Horiike
M. Anwar Hossain 0001
D. Frank Hsu
Tetsushi Ikegami
Yuma Inaba
Atsuo Inomata
Takamichi Inoue
Yoshinao Ishii
Hayato Ishikawa
Naoki Ishikawa
Takamasa Itahashi
Piseth Ith
Keita Ito
Tadahiko Ito
Yasunori Iwanami
Akira Kanaoka
Naoki Kanayama
Yusuke Kanbara
Kenta Kato
Masahiko Kato
Masayoshi Katouno
Hirofumi Katsuno
Yasuharu Katsuno
Yuto Kawahara
Sakiko Kikuchi
Kwangjo Kim
Hiroki Kitagawa
Nobuaki Kitajima
Takuya Kitamura
S. Kitazawa
Shigeki Kitazawa
Tetsutaro Kobayashi
Yukou Kobayashi
Akihisa Kodate
Atsushi Koide
Hiroshi Koide
Yuta Koshimizu
Takashi Kozawa
Simon Kramer 0001
Michiharu Kudo
Keisuke Kunitomo
Takuma Kyo
Kwok-Yan Lam
Huan-Bang Li
Dongmei Liu
Yang Liu
Yu Liu
Javier López 0001
Mamoru Maekawa
Satoshi Makido
Masahiro Mambo
Jun Mashino
Mehedi MasudMd. Mehedi Masud
Yoshihiro Masuda
Seiichi Matsuda
Katsuhiko Matsumura
Takumi Matsunami
Catherine Meadows 0001Catherine A. Meadows
Ying Miao 0001
Manabu Mikami
Yoshinori Mitamura
Shigeo Mitsunari
Amane Miura
Takanori Miyoshi
Takaaki Mizuki
José A. Montenegro
Alberto Moreno-CondeAlberto Moreno
Hussein T. Mouftah
Hidekazu Murata
Takanori Murayama
Mitsuhiro Nakadai
Sanami Nakagawa
K. Nakamura
Satoshi Nakanobu
Keita Nakashima
Kenji Nakayama
Nidal Nasser
Juan Manuel González NietoJuanma González Nieto
Takashi Nishide
Yusuke Niwa
Koji Nuida
Hiroyo Ogawa
Naoki Ogura
Hiraku Okada
Masayuki Okada
Naoki Okamoto
Shouhei Okamoto
Takeshi Okamoto
Tatsuaki Okamoto
Akihiro Okazaki
Mamoru Okumura
Kazumasa Omote
Yoshihito Oyama
Kun Peng
Josef Pieprzyk
Sihan Qing
Sk. Md. Mizanur Rahman
Francisco Rodríguez-Henríquez
Anton Romanov
Bimal K. Roy
Selwyn Russell
Kazutaka Saito
Yusuke Sakai 0001
Hisao Sakazaki
Kouichi Sakurai
Ismail San
Kengo Sasaki
Ryôichi Sasaki
Chifumi Sato
Yohei Satoh
Jacob C. N. Schuldt
Jennifer Seberry
Malapati Raja Sekhar
Yasushi Sengoku
Jun Shao 0001
Takaaki Shiga
Kazumasa Shinagawa
Toshiko Shinohara
Yusaku Shiomitsu
Masaaki Shirase
Yozo Shoji
Chee Kheong Siew
Ryuji Soga
Masakazu Soshi
Satoshi Suyama
Agus Fanar Syukri
Mitsuru Tada
Tsuyoshi Takagi
Yusuke Takahashi
Yuya Takahashi
Yoshihisa Takayama
Akihisa Tanaka
Kazue Tanaka
Kazuma Tanaka
Masato Tanaka
Takashi Tanaka
Makoto Taromaru
Tadanori Teruya
Kenya Tomita
Kaga Tomoki
Morio Toyoshima
Raylin Tso
Hiroe Tsubaki
Hikaru Tsuchida
Hiroyuki Tsuji
Yukiyasu Tsunoo
S. Tu
Shigenori Uchiyama
Keisuke Usuda
Tomohiko Uyematsu
Ananda Vithanage
José Luis Vivas
Hiromitsu Wakana
Licheng Wang
Lihua Wang 0001
Xiao Feng Wang
Yuji Watanabe
Lixia Xiao
Chaoping Xing
Chao Xu 0005
Ryota Yamada
Michitomo Yamaguchi
Shiro Yamakawa
Takashi Yamakawa
Hiroyasu Yamamoto
Tetsuya Yamamoto
Yoshitoshi Yamashita
Yuma Yamashita
Teppei Yamazaki
Naoto Yanai
Tetsuya Yano
Xun Yi
Kazuki Yoneyama
Yuko Yoshifuji
Hitoshi Yoshino
Hiroshi Yoshiura
C. Q. Zhang