A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, A Nomura, K Omote, M Soshi Information Security Practice and Experience: 5th International Conference …, 2009 | 391 | 2009 |
Bitvisor: a thin hypervisor for enforcing i/o device security T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ... Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009 | 344 | 2009 |
Device and method for worm detection, and computer product K Omote, S Torii US Patent App. 10/812,622, 2005 | 278 | 2005 |
A practical English auction with one-time registration K Omote, A Miyaji Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001 | 88 | 2001 |
Group signatures with message-dependent opening Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 71 | 2013 |
Generic constructions of secure‐channel free searchable encryption with adaptive security K Emura, A Miyaji, MS Rahman, K Omote Security and communication networks 8 (8), 1547-1560, 2015 | 50 | 2015 |
Malware function classification using apis in initial behavior N Kawaguchi, K Omote 2015 10th Asia Joint Conference on Information Security, 138-144, 2015 | 49 | 2015 |
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, K Omote, A Nomura, M Soshi International Journal of Applied Cryptography 2 (1), 46-59, 2010 | 48 | 2010 |
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root K Omote, A Miyaji Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003 | 47 | 2003 |
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics K Emura, A Miyaji, K Omote Information and Media Technologies 4 (4), 1060-1075, 2009 | 45 | 2009 |
An approach to detect remote access trojan in the early stage of communication D Jiang, K Omote 2015 IEEE 29th international conference on advanced information networking …, 2015 | 42 | 2015 |
Network intrusion detection based on semi-supervised variational auto-encoder G Osada, K Omote, T Nishide Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 36 | 2017 |
An anonymous auction protocol with a single non-trusted center using binary trees K Omote, A Miyaji Information Security: Third International Workshop, ISW 2000 Wollongong …, 2000 | 31 | 2000 |
Recording medium recording a network shutdown control program, and network shutdown device M Komura, K Omote, Y Higashikado, M Mitomo, B Noda, S Torii US Patent 7,564,837, 2009 | 29 | 2009 |
A timed-release proxy re-encryption scheme K Emura, A Miyaji, K Omote IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011 | 27 | 2011 |
Secure and anonymous communication technique: Formal model and its prototype implementation K Emura, A Kanaoka, S Ohta, K Omote, T Takahashi IEEE Transactions on Emerging Topics in Computing 4 (1), 88-101, 2015 | 26 | 2015 |
A host-based detection method of remote access trojan in the early stage D Adachi, K Omote Information Security Practice and Experience: 12th International Conference …, 2016 | 20 | 2016 |
Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ... 2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230, 2008 | 20 | 2008 |
An-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users K Emura, A Miyaji, K Omote Journal of Applied Mathematics 2014, 2014 | 18 | 2014 |
A practical English auction with simple revocation K Omote, A Miyaji IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2002 | 18 | 2002 |