231 results on '"Kazumasa Omote"'
Search Results
52. Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots.
53. IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet.
54. Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
55. Does Blockchain Qualify as Secret-free Immutable Storage?
56. Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network.
57. Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
58. Threat Analysis of Poisoning Attack Against Ethereum Blockchain.
59. Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain.
60. Detecting Malicious Websites by Query Templates.
61. Early Detection of Remote Access Trojan by Software Network Behavior.
62. Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor.
63. Risk Analysis for Abusing Blockchain Poisoning.
64. Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
65. Accuracy and Privacy Evaluations of Collaborative Data Analysis.
66. Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder.
67. An Anonymous Trust-Marking Scheme on Blockchain Systems.
68. A Host-Based Detection Method of Remote Access Trojan in the Early Stage.
69. ELAR: extremely lightweight auditing and repairing for cloud security.
70. Privacy-Preserving Profile Matching Protocol Considering Conditions.
71. Malware Function Estimation Using API in Initial Behavior.
72. POR-2P: Network Coding-Based POR for Data Provision-Payment System.
73. An Approach to Detect Remote Access Trojan in the Early Stage of Communication.
74. DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability.
75. SW-SSS: Slepian-Wolf Coding-Based Secret Sharing Scheme.
76. Malware Function Classification Using APIs in Initial Behavior.
77. An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode.
78. Analysis and Risk Consideration of Worldwide Cyber Incidents Related to Cryptoassets
79. A RAT Detection Method Based on Network Behavior of the Communication's Early Stage.
80. D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability.
81. Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
82. A New Efficient and Secure POR Scheme Based on Network Coding.
83. Verifiable Functional Encryption using Intel SGX.
84. A study on robustness of malware detection model
85. ND-POR: A POR Based on Network Coding and Dispersal Coding.
86. Self-healing wireless sensor networks.
87. Generic constructions of secure-channel free searchable encryption with adaptive security.
88. How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs.
89. Self-healing Schemes Suitable for Various WSNs.
90. Improvement of multi-user searchable encrypted data scheme.
91. An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs.
92. Group Signatures with Message-Dependent Opening.
93. Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks.
94. A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
95. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
96. Towards Restricting Plaintext Space in Public Key Encryption.
97. POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks.
98. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
99. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
100. An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.