2009 |
31 | EE | Chifumi Sato,
Takeshi Okamoto,
Eiji Okamoto:
Strongly Unforgeable ID-Based Signatures without Random Oracles.
ISPEC 2009: 35-46 |
2008 |
30 | EE | Hideyuki Tanaka,
Takeshi Okamoto:
Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography.
II3E 2008: 265-277 |
29 | EE | Raylin Tso,
Takeshi Okamoto,
Eiji Okamoto:
1-out-of-.
ISPEC 2008: 45-55 |
28 | EE | Takeshi Okamoto,
Yoshiteru Ishida:
Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System.
KES (3) 2008: 456-464 |
27 | EE | Sk. Md. Mizanur Rahman,
Nidal Nasser,
Atsuo Inomata,
Takeshi Okamoto,
Masahiro Mambo,
Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks.
Security and Communication Networks 1(2): 179-189 (2008) |
2007 |
26 | | Tsuyoshi Takagi,
Tatsuaki Okamoto,
Eiji Okamoto,
Takeshi Okamoto:
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings
Springer 2007 |
25 | EE | Raylin Tso,
Chunxiang Gu,
Takeshi Okamoto,
Eiji Okamoto:
Efficient ID-Based Digital Signatures with Message Recovery.
CANS 2007: 47-59 |
24 | EE | Raylin Tso,
Juan Manuel González Nieto,
Takeshi Okamoto,
Colin Boyd,
Eiji Okamoto:
Verifier-Key-Flexible Universal Designated-Verifier Signatures.
IMA Int. Conf. 2007: 403-421 |
23 | EE | Raylin Tso,
Takeshi Okamoto,
Eiji Okamoto:
An Improved Signcryption Scheme and Its Variation.
ITNG 2007: 772-778 |
22 | EE | Raylin Tso,
Takeshi Okamoto,
Eiji Okamoto:
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
Inscrypt 2007: 11-24 |
21 | EE | Takeshi Okamoto,
Yoshiteru Ishida:
Framework of an Immunity-Based Anomaly Detection System for User Behavior.
KES (3) 2007: 821-829 |
20 | EE | Lihua Wang,
Eiji Okamoto,
Ying Miao,
Takeshi Okamoto,
Hiroshi Doi:
An ID-SP-M4M Scheme and Its Security Analysis.
IEICE Transactions 90-A(1): 91-100 (2007) |
2006 |
19 | EE | Sk. Md. Mizanur Rahman,
Atsuo Inomata,
Takeshi Okamoto,
Masahiro Mambo,
Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks.
ICUCT 2006: 140-149 |
18 | EE | Takeshi Okamoto,
Yoshiteru Ishida:
Towards an Immunity-Based Anomaly Detection System for Network Traffic.
KES (2) 2006: 123-130 |
17 | EE | Lihua Wang,
Zhenfu Cao,
Takeshi Okamoto,
Ying Miao,
Eiji Okamoto:
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Transactions 89-A(1): 106-114 (2006) |
2005 |
16 | EE | Lihua Wang,
Takeshi Okamoto,
Tsuyoshi Takagi,
Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
CIS (2) 2005: 198-203 |
15 | EE | Raylin Tso,
Takeshi Okamoto,
Eiji Okamoto:
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
CISC 2005: 113-127 |
14 | | Raylin Tso,
Takeshi Okamoto,
Tsuyoshi Takagi,
Eiji Okamoto:
An id-based non-interactive tripartite key agreement protocol with K-resilience.
Communications and Computer Networks 2005: 38-42 |
13 | EE | Takeshi Okamoto,
Atsuo Inomata,
Eiji Okamoto:
A Proposal of Short Proxy Signature using Pairing.
ITCC (1) 2005: 631-635 |
12 | EE | Takeshi Okamoto:
A Worm Filter Based on the Number of Unacknowledged Requests.
KES (2) 2005: 93-99 |
11 | EE | Takeshi Okamoto,
Raylin Tso,
Eiji Okamoto:
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing.
MDAI 2005: 122-133 |
10 | EE | Eiji Okamoto,
Takeshi Okamoto:
Cryptosystems Based on Elliptic Curve Pairing.
MDAI 2005: 13-23 |
9 | EE | Lihua Wang,
Eiji Okamoto,
Ying Miao,
Takeshi Okamoto,
Hiroshi Doi:
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
WCC 2005: 291-303 |
2004 |
8 | EE | Takeshi Okamoto,
Takayuki Watanabe,
Yoshiteru Ishida:
Mechanism for Generating Immunity-Based Agents that Detect Masqueraders.
KES 2004: 534-540 |
2003 |
7 | EE | Takeshi Okamoto,
Hirofumi Katsuno,
Eiji Okamoto:
A Fast Signature Scheme Based on New On-line Computation.
ISC 2003: 111-121 |
6 | EE | Takeshi Okamoto,
Takayuki Watanabe,
Yoshiteru Ishida:
Towards an Immunity-Based System for Detecting Masqueraders.
KES 2003: 488-495 |
2002 |
5 | EE | Takeshi Okamoto,
Mitsuru Tada,
Atsuko Miyaji:
An Improved Fast Signature Scheme without Online Multiplication.
Financial Cryptography 2002: 152-167 |
4 | EE | Takeshi Okamoto,
Yoshiteru Ishida:
An analysis of a model of computer viruses spreading via electronic mail.
Systems and Computers in Japan 33(14): 81-90 (2002) |
2001 |
3 | EE | Takeshi Okamoto,
Mitsuru Tada,
Atsuko Miyaji:
Efficient "on the Fly" Signature Schemes Based on Integer Factoring.
INDOCRYPT 2001: 275-286 |
1999 |
2 | EE | Takeshi Okamoto,
Yoshiteru Ishida:
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents.
ISADS 1999: 328-331 |
1 | EE | Takeshi Okamoto,
Mitsuru Tada,
Eiji Okamoto:
Extended Proxy Signatures for Smart Cards.
ISW 1999: 247-258 |