Masaki Inamura
According to our database1,
Masaki Inamura
authored at least 26 papers
between 2006 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
2
1
1
2
1
2
3
1
2
3
3
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Personal Authentication Method based on Human Preference Prediction using Machine Learning.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
2016
Evaluation of Handwriting Characteristic for Two-factor Authentication Interface on Touch-pad Panel.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Proceedings of the ICISSP 2015, 2015
Proceedings of the ICE-B 2015, 2015
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015
2013
Content Approval Systems with Expansions of a New Pair-Connected-Structured Aggregate Signature Scheme.
Int. J. E Entrepreneurship Innov., 2013
2011
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
2009
Anonymous handover mechanism for service mobility in heterogeneous wireless networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
2007
Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy.
Proceedings of the SECRYPT 2007, 2007
Anonymous Prepaid Content Viewing System with Mobile Terminal.
Proceedings of the SECRYPT 2007, 2007
2006
Flexible License Transfer System Using Mobile Terminal.
Proceedings of the SECRYPT 2006, 2006