dblp.uni-trier.dewww.uni-trier.de

Eiji Okamoto

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
71EEChifumi Sato, Takeshi Okamoto, Eiji Okamoto: Strongly Unforgeable ID-Based Signatures without Random Oracles. ISPEC 2009: 35-46
2008
70EEXun Yi, Mike Faulkner, Eiji Okamoto: Secure Wireless Sensor Networks. ARES 2008: 497-502
69EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ISPEC 2008: 290-303
68EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: 1-out-of-. ISPEC 2008: 45-55
67EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez: A Comparison between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m. Pairing 2008: 297-315
66EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi: Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IEEE Trans. Computers 57(11): 1454-1468 (2008)
65EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of etaT Pairing. IEICE Transactions 91-A(1): 221-228 (2008)
64EESk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Security and Communication Networks 1(2): 179-189 (2008)
2007
63 Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings Springer 2007
62EEJean-Luc Beuchat, Takanori Miyoshi, Yoshihito Oyama, Eiji Okamoto: Multiplication over Fpm on FPGA: A Survey. ARC 2007: 214-225
61EERaylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto: Efficient ID-Based Digital Signatures with Message Recovery. CANS 2007: 47-59
60EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto: Arithmetic Operators for Pairing-Based Cryptography. CHES 2007: 239-255
59EEJean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation. IEEE Symposium on Computer Arithmetic 2007: 97-104
58EESeiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto: Optimised Versions of the Ate and Twisted Ate Pairings. IMA Int. Conf. 2007: 302-312
57EERaylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421
56EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. ISPEC 2007: 254-268
55EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: An Improved Signcryption Scheme and Its Variation. ITNG 2007: 772-778
54EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Inscrypt 2007: 11-24
53EEJean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. WAIFI 2007: 25-39
52EEMasaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Universal etaT Pairing Algorithm over Arbitrary Extension Degree. WISA 2007: 1-15
51EELihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi: An ID-SP-M4M Scheme and Its Security Analysis. IEICE Transactions 90-A(1): 91-100 (2007)
2006
50EEKun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258
49EEYuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. CIS 2006: 396-405
48EESk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149
47EESk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto: An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306
46EELihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto: Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Transactions 89-A(1): 106-114 (2006)
2005
45 Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan Springer 2005
44EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
43EELihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203
42EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. CISC 2005: 113-127
41 Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42
40EETakeshi Okamoto, Atsuo Inomata, Eiji Okamoto: A Proposal of Short Proxy Signature using Pairing. ITCC (1) 2005: 631-635
39EETakeshi Okamoto, Raylin Tso, Eiji Okamoto: One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. MDAI 2005: 122-133
38EEEiji Okamoto, Takeshi Okamoto: Cryptosystems Based on Elliptic Curve Pairing. MDAI 2005: 13-23
37EELihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi: ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. WCC 2005: 291-303
2004
36 Javier Lopez, Sihan Qing, Eiji Okamoto: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings Springer 2004
35EEMasakazu Soshi, Mamoru Maekawa, Eiji Okamoto: The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. IEICE Transactions 87-A(1): 190-203 (2004)
2003
34EEJuan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388
33EEAkira Kanaoka, Eiji Okamoto: Multivariate Statistical Analysis of Network Traffic for Intrusion Detection. DEXA Workshops 2003: 472-476
32EERaylin Tso, Ying Miao, Eiji Okamoto: A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. ICISC 2003: 377-385
31EETakeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto: A Fast Signature Scheme Based on New On-line Computation. ISC 2003: 111-121
30EESelwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003)
2002
29EEMarie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto: Modelling Trust Structures for Public Key Infrastructures. ACISP 2002: 56-70
28EEMasahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka: Simple and Secure Mobile Access under the Flexible Organization Management. DEXA Workshops 2002: 456-462
27EEEd Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149
2000
26 Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000
25 Bimal K. Roy, Eiji Okamoto: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings Springer 2000
24 Hiroshi Doi, Masahiro Mambo, Eiji Okamoto: On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. ACISP 2000: 352-367
23 Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji: A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483
22EEXun Yi, Chee Kheong Siew, Xiao Feng Wang, Eiji Okamoto: A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments. Distributed and Parallel Databases 8(1): 85-117 (2000)
1999
21 Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Springer 1999
20EEXiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto: Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302
19 Kazumasa Omote, Eiji Okamoto: User Identification System Based on Biometrics for Keystroke. ICICS 1999: 216-229
18 Josef Pieprzyk, Eiji Okamoto: Verfiable Secret Sharing and Time Capsules. ICISC 1999: 169-183
17EEShigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo: Improvement of Secure Access Control Agent for Distributed Files. ICPP Workshops 1999: 185-
16EETakeshi Okamoto, Mitsuru Tada, Eiji Okamoto: Extended Proxy Signatures for Smart Cards. ISW 1999: 247-258
1998
15 Eiji Okamoto, George I. Davida, Masahiro Mambo: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings Springer 1998
14EEAgus Fanar Syukri, Eiji Okamoto, Masahiro Mambo: A User Identification System Using Signature Written with Mouse. ACISP 1998: 403-414
13 Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto: Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193
12 Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu: A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203
1997
11 Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai: Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282
10 Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo: Proposal of user identification scheme using mouse. ICICS 1997: 144-148
9 Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo: The Application of ID-Based Key Distribution Systems to an Elliptic Curve. ISW 1997: 335-344
8 Tomohiko Uyematsu, Eiji Okamoto: A construction of codes with exponential error bounds on arbitrary discrete memoryless channels. IEEE Transactions on Information Theory 43(3): 992-996 (1997)
1996
7EEMasahiro Mambo, Keisuke Usuda, Eiji Okamoto: Proxy Signatures for Delegating Signing Operation. ACM Conference on Computer and Communications Security 1996: 48-57
6 Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto: How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333
1994
5EEYukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu: Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. CRYPTO 1994: 369-382
1991
4EEKazue Tanaka, Eiji Okamoto: Key distribution system for mail systems using ID-related information directory. Computers & Security 10(1): 25-33 (1991)
1988
3EEEiji Okamoto: Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. EUROCRYPT 1988: 361-373
1987
2EEEiji Okamoto: Key Distribution Systems Based on Identification Information. CRYPTO 1987: 194-202
1985
1EEEiji Okamoto, K. Nakamura: Lifetimes of Keys in Cryptographic Key Management Systems. CRYPTO 1985: 246-259

Coauthor Index

1Jean-Luc Beuchat [53] [59] [60] [62] [66] [67]
2Colin Boyd [50] [57]
3Nicolas Brisebarre [53] [60] [66] [67]
4Mike Burmester [23]
5Zhenfu Cao [46]
6Robert S. Coulter [29]
7George I. Davida [15]
8Ed Dawson [27] [29] [30] [34] [44] [50]
9Yvo Desmedt [23]
10Jérémie Detrey [60] [66] [67]
11Hiroshi Doi [23] [24] [37] [51]
12Mike Faulkner [70]
13Chunxiang Gu [61]
14Kenichi Hayashi [10]
15Marie Henderson [29]
16Florian Hess [58]
17D. Frank Hsu [12]
18Atsuo Inomata [40] [47] [48] [64]
19Akira Kanaoka [33]
20Naoki Kanayama [58]
21Hirofumi Katsuno [31]
22Yuto Kawahara [49] [52]
23Shigeki Kitazawa [17]
24Kwok-Yan Lam [12] [13] [20] [21]
25Javier Lopez [27] [30] [36] [44]
26Mamoru Maekawa [35]
27Masahiro Mambo [6] [7] [9] [10] [11] [14] [15] [17] [23] [24] [28] [47] [48] [64]
28Seiichi Matsuda [58]
29Ying Miao [32] [37] [46] [51]
30Takanori Miyoshi [62]
31José A. Montenegro [27]
32K. Nakamura [1]
33Nidal Nasser [64]
34Juan Manuel González Nieto (Juanma González Nieto) [34] [44] [57]
35Takeshi Okamoto [16] [31] [37] [38] [39] [40] [41] [42] [43] [46] [48] [51] [54] [55] [57] [61] [63] [64] [68] [71]
36Tatsuaki Okamoto [63]
37Kazumasa Omote [19]
38Yoshihito Oyama [62]
39Kun Peng [44] [50]
40Josef Pieprzyk [18] [26]
41Sihan Qing [36] [45]
42Sk. Md. Mizanur Rahman [47] [48] [64]
43Francisco Rodríguez-Henríquez [67]
44Bimal K. Roy [25]
45Selwyn Russell [30]
46Hisao Sakazaki [9]
47Kouichi Sakurai [6] [11]
48Ryôichi Sasaki [45]
49Chifumi Sato [71]
50Jennifer Seberry (Jennifer Seberry Wallis) [26]
51Yasushi Sengoku [28]
52Masaaki Shirase [52] [53] [56] [59] [65] [66] [69]
53Chee Kheong Siew [22]
54Masakazu Soshi [35]
55Agus Fanar Syukri [14]
56Mitsuru Tada [16] [23]
57Tsuyoshi Takagi [41] [43] [49] [52] [53] [56] [59] [63] [65] [66] [69]
58Kazue Tanaka [4]
59Takashi Tanaka [28]
60Raylin Tso [32] [39] [41] [42] [54] [55] [57] [61] [68]
61Yukiyasu Tsunoo [5]
62Keisuke Usuda [7]
63Tomohiko Uyematsu [5] [8]
64Lihua Wang [37] [43] [46] [51]
65Xiao Feng Wang [12] [13] [20] [22]
66Chaoping Xing [21]
67Xun Yi [12] [13] [17] [20] [22] [70]
68Yuko Yoshifuji [23]
69Hiroshi Yoshiura [45]
70C. Q. Zhang [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)