Search

Your search keyword '"Kazumasa Omote"' showing total 36 results

Search Constraints

Start Over You searched for: Author "Kazumasa Omote" Remove constraint Author: "Kazumasa Omote" Publisher ieee Remove constraint Publisher: ieee
36 results on '"Kazumasa Omote"'

Search Results

1. Toward the Application of Differential Privacy to Data Collaboration

2. A Scientometrics Analysis of Cybersecurity Using e-CSTI

3. Honeypot Method to Lure Attackers Without Holding Crypto-Assets

4. Toward Achieving Anonymous NFT Trading

5. Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin

6. Blockchain-Based Autonomous Notarization System Using National eID Card

7. An Anonymous Trust-Marking Scheme on Blockchain Systems

16. An Anonymous Trust-Marking Scheme on Blockchain Systems

21. Risk Analysis for Abusing Blockchain Poisoning

22. A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine Learning

23. A Privacy-Preserving Enforced Bill Collection System using Smart Contracts

24. Robust Detection Model for Portable Execution Malware

25. Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives

26. A New Method of Assigning Trust to User Addresses in Bitcoin

27. Profiling of Malicious Users Targeting Ethereum’s RPC Port Using Simple Honeypots

28. Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network

29. An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode

30. An Approach to Detect Remote Access Trojan in the Early Stage of Communication

31. A New Efficient and Secure POR Scheme Based on Network Coding

32. How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs

33. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

34. A Two-Step Execution Mechanism for Thin Secure Hypervisors

35. Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers

36. Protection and Recovery of Disk Encryption Key Using Smart Cards

Catalog

Books, media, physical & digital resources