33 著者名表示.
発行日 | タイトル |
著者 |
2000 | An anonymous auction protocol with a single non-trusted center using binary trees | Omote, Kazumasa; Miyaji, Atsuko |
2001 | A Practical English Auction with One-time Registration | Omote, Kazumasa; Miyaji, Atsuko |
Aug-2001 | An Anonymous Sealed-bid Auction with a Feature of Entertainment | Omote, Kazumasa; Miyaji, Atsuko |
May-2002 | A Practical English Auction with Simple Revocation | OMOTE, Kazumasa; MIYAJI, Atsuko |
Aug-2002 | A Second-price Sealed-bid Auction with Public Verifiability | Omote, Kazumasa; Miyaji, Atsuko |
2003 | A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root | Omote, Kazumasa; Miyaji, Atsuko |
Apr-2008 | Protection and Recovery of Disk Encryption Key Using Smart Cards | Omote, Kazumasa; Kato, Kazuhiko |
Dec-2008 | Simple Certificateless Signature with Smart Cards | Omote, Kazumasa; Miyaji, Atsuko; Kato, Kazuhiko |
2009 | A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Omote, Kazumasa; Soshi, Masakazu |
2009 | A Selectable k-Times Relaxed Anonymous Authentication Scheme | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
Mar-2009 | A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
Mar-2009 | A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
Jun-2009 | A Two-Step Execution Mechanism for Thin Secure Hypervisors | Hirano, Manabu; Shinagawa, Takahiro; Eiraku, Hideki; Hasegawa, Shoichi; Omote, Kazumasa; Tanimoto, Kouichi; Horie, Takashi; Mune, Seiji; Kato, Kazuhiko; Okuda, Takeshi; Kawai, Eiji; Yamaguchi, Suguru |
2-Sep-2009 | A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
2010 | A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication | Emura, Keita; Miyaji, Atsuko ; Omote, Kazumasa |
2010 | An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation | Emura, Keita; Miyaji, Atsuko ; Omote, Kazumasa |
15-Mar-2010 | A Combinatorics Proliferation Model with Threshold for Malware Countermeasure | Omote, Kazumasa; Shimoyama, Takeshi; Torii, Satoru |
1-May-2010 | Practical and Secure Recovery of Disk Encryption Key Using Smart Cards | OMOTE, Kazumasa; KATO, Kazuhiko |
2-Jul-2010 | A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu |
Dec-2010 | RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks | Ito, Hisashige; Miyaji, Atsuko ; Omote, Kazumasa |
2011 | Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks | Miyaji, Atsuko; Omote, Kazumasa |
1-Aug-2011 | A Timed-Release Proxy Re-Encryption Scheme | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
1-Oct-2011 | Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes | Miyaji, Atsuko; Omote, Kazumasa |
8-Oct-2011 | POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks | Iida, Tatsuro; Miyaji, Atsuko; Omote, Kazumasa |
12-Oct-2011 | Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
2012 | Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks | Izawa, Kazuya; Miyaji, Atsuko; Omote, Kazumasa |
Mar-2012 | An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs | Iida, Tatsuro; Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
15-Jul-2012 | A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
3-Jun-2013 | センサネットワークのセキュアで効率的なデータ集約技術に関する研究 | 面, 和成; Omote, Kazumasa |
1-Jun-2014 | An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
2015 | MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability | Omote, Kazumasa; Thao, Tran Phuong |
8-Apr-2015 | Self-healing wireless sensor networks | Miyaji, Atsuko; Omote, Kazumasa |
1-Jun-2016 | 準同型認証子による効率の良いデータ認証手法に関する研究 | 面, 和成; Omote, Kazumasa |