Search

Your search keyword '"Kazumasa Omote"' showing total 31 results

Search Constraints

Start Over You searched for: Author "Kazumasa Omote" Remove constraint Author: "Kazumasa Omote" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
31 results on '"Kazumasa Omote"'

Search Results

1. Toward the Application of Differential Privacy to Data Collaboration

2. A Scientometrics Analysis of Cybersecurity Using e-CSTI

3. Honeypot Method to Lure Attackers Without Holding Crypto-Assets

4. Toward Achieving Anonymous NFT Trading

5. Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin

6. Blockchain-Based Autonomous Notarization System Using National eID Card

7. An Anonymous Trust-Marking Scheme on Blockchain Systems

8. MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability

9. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

10. An Anonymous Trust-Marking Scheme on Blockchain Systems

12. A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage

13. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions

14. IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet

15. Bitcoin and Blockchain Technology

16. Malware Function Estimation Using API in Initial Behavior

17. D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability

18. Self‐healing wireless sensor networks

19. ND-POR: A POR Based on Network Coding and Dispersal Coding

20. Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes

21. RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks

22. A Combinatorics Proliferation Model with Threshold for Malware Countermeasure

23. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

24. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

25. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

26. An $r$ -Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

27. Determination of Tin in Iron and Steel by Differential Pulse Anodic Stripping Voltammetry at a Rotating Gold Film Electrode

28. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

29. A Two-Step Execution Mechanism for Thin Secure Hypervisors

30. Protection and Recovery of Disk Encryption Key Using Smart Cards

31. Portable ID Management Framework for Security Enhancement of Virtual Machine Monitors

Catalog

Books, media, physical & digital resources