Search

Your search keyword '"Kazumasa Omote"' showing total 46 results

Search Constraints

Start Over You searched for: Author "Kazumasa Omote" Remove constraint Author: "Kazumasa Omote" Topic business Remove constraint Topic: business
46 results on '"Kazumasa Omote"'

Search Results

1. An Anonymous Trust-Marking Scheme on Blockchain Systems

2. A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine Learning

3. Robust Detection Model for Portable Execution Malware

4. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions

5. Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives

6. Empirical Study of Software Adoption Process in the Bitcoin Network

7. IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet

8. A New Method of Assigning Trust to User Addresses in Bitcoin

9. Profiling of Malicious Users Targeting Ethereum’s RPC Port Using Simple Honeypots

10. Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network

11. Detecting Malicious Websites by Query Templates

12. Bitcoin and Blockchain Technology

13. Malware Function Estimation Using API in Initial Behavior

14. Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack

15. Early Detection of Remote Access Trojan by Software Network Behavior

16. A RAT Detection Method Based on Network Behavior of the Communication's Early Stage

17. D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability

18. Self‐healing wireless sensor networks

19. ND-POR: A POR Based on Network Coding and Dispersal Coding

20. ELAR

21. Methods for Restricting Message Space in Public-Key Encryption

22. POR-2P: Network Coding-Based POR for Data Provision-Payment System

23. A Combinatorics Proliferation Model with Threshold for Malware Countermeasure

24. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

25. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

26. DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability

27. Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data

28. A New Efficient and Secure POR Scheme Based on Network Coding

29. How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs

30. Self-healing Schemes Suitable for Various WSNs

31. Group Signatures with Message-Dependent Opening

32. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs

33. Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks

34. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption

35. An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System

36. Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks

37. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation

38. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication

39. BitVisor

40. A Two-Step Execution Mechanism for Thin Secure Hypervisors

41. A Selectable k-Times Relaxed Anonymous Authentication Scheme

42. Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers

43. Protection and Recovery of Disk Encryption Key Using Smart Cards

44. Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model

45. User Identification System Based on Biometrics for Keystroke

46. Towards Restricting Plaintext Space in Public Key Encryption

Catalog

Books, media, physical & digital resources