Search

Your search keyword '"Kazumasa Omote"' showing total 30 results

Search Constraints

Start Over You searched for: Author "Kazumasa Omote" Remove constraint Author: "Kazumasa Omote" Search Limiters Full Text Remove constraint Search Limiters: Full Text
30 results on '"Kazumasa Omote"'

Search Results

1. Toward the Application of Differential Privacy to Data Collaboration

2. A Scientometrics Analysis of Cybersecurity Using e-CSTI

3. Honeypot Method to Lure Attackers Without Holding Crypto-Assets

4. Toward Achieving Anonymous NFT Trading

5. Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin

6. Blockchain-Based Autonomous Notarization System Using National eID Card

7. An Anonymous Trust-Marking Scheme on Blockchain Systems

8. MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability

9. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

10. An Anonymous Trust-Marking Scheme on Blockchain Systems

11. A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage

13. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions

14. IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet

15. Bitcoin and Blockchain Technology

16. Malware Function Estimation Using API in Initial Behavior

17. D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability

18. Self‐healing wireless sensor networks

19. ND-POR: A POR Based on Network Coding and Dispersal Coding

20. Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes

21. RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks

22. A Combinatorics Proliferation Model with Threshold for Malware Countermeasure

23. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

24. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

25. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

26. An $r$ -Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

27. Determination of Tin in Iron and Steel by Differential Pulse Anodic Stripping Voltammetry at a Rotating Gold Film Electrode

28. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

29. A Two-Step Execution Mechanism for Thin Secure Hypervisors

30. Protection and Recovery of Disk Encryption Key Using Smart Cards

Catalog

Books, media, physical & digital resources