Kazumasa Omote
Orcid: 0000-0002-1371-4454
According to our database1,
Kazumasa Omote
authored at least 125 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Correction to: An intrinsic evaluator for embedding methods in malicious URL detection.
Int. J. Inf. Sec., February, 2025
Int. J. Inf. Sec., February, 2025
2024
J. Medical Syst., December, 2024
EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities.
J. Inf. Process., 2024
Reducing Security Fatigue in Visually Impaired University Students through Problem Posing.
J. Inf. Process., 2024
J. Inf. Process., 2024
IEICE Trans. Inf. Syst., 2024
IEEE Access, 2024
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
2023
IEICE Trans. Inf. Syst., September, 2023
CoRR, 2023
Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the International Conference on Information Networking, 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the 2023 6th International Conference on Blockchain Technology and Applications, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the Blockchain - ICBC 2023, 2023
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023
Proceedings of the IEEE International Conference on Blockchain, 2023
Proceedings of the IEEE International Conference on Blockchain, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin.
IEEE Access, 2022
IEEE Access, 2022
Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the International Symposium on Networks, Computers and Communications, 2022
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
A study of the privacy perspective on principal component analysis via a realistic attack model.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
IEEE Trans. Big Data, 2021
Secur. Commun. Networks, 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine Learning.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
Investigation and Analysis of Features in Decentralized Network Management of Minor Cryptocurrencies.
Proceedings of the Advanced Information Networking and Applications, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020
2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016
D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability.
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Generic constructions of secure-channel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015
MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability.
Int. J. Distributed Sens. Networks, 2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
J. Appl. Math., 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Internet and Distributed Computing Systems, 2013
How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
IEICE Trans. Inf. Syst., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
Proceedings of the Information Security, 14th International Conference, 2011
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
J. Inf. Process., 2010
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010
IEICE Trans. Inf. Syst., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Proceedings of the Provable Security - 4th International Conference, 2010
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Proceedings of the Provable Security - 4th International Conference, 2010
RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
2009
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.
J. Inf. Process., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Second-price Sealed-bid Auction with the Discriminant of the p<sub>0</sub>-th Root.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security, Third International Workshop, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999