Takeshi Okamoto

Orcid: 0000-0002-1898-6248

According to our database1, Takeshi Okamoto authored at least 73 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Prevention of DoS Attacks on Use-After-Free Vulnerabilities in Mosquitto.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

2021
Identification of toolchains used to build IoT malware with statically linked libraries.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

2020
Identification of library functions statically linked to Linux malware without symbols.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

2019
A Performance Evaluation of Resilient Server with a Self-Repair Network Model.
Mob. Networks Appl., 2019

An EAF guard driver to prevent shellcode from removing guard pages.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

2018
A k-out-of-n Ring Signature with Flexible Participation for Signers.
IACR Cryptol. ePrint Arch., 2018

An artificial immunity-enhancing module for internet servers against cyberattacks.
Artif. Life Robotics, 2018

Implementation and evaluation of an immunity-enhancing module for ISC BIND9.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

2017
400Gbit/s/ch Field Demonstration of Modulation Format Adaptation Based on Pilot-Aided OSNR Estimation Using Real-Time DSP.
IEICE Trans. Commun., 2017

Performance evaluation of an immunity-enhancing module for server applications.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

2016
A cyber attack-resilient server inspired by biological diversity.
Artif. Life Robotics, 2016

Toward an artificial immune server against cyber attacks.
Artif. Life Robotics, 2016

Increasing the Diversity of Resilient Server Using Multiple Virtualization Engines.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016

Toward an Artificial Immune Server against Cyber Attacks: Enhancement of Protection against DoS Attacks.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016

A Cyber Attack-Resilient Server Using Hybrid Virtualization.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016

2015
CAPTCHA System by Differentiating the Awkwardness of Objects.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015

2014
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net.
Proceedings of the Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice, 2014

2012
Transmission of a 127 Gb/s PM-QPSK Signal Over a 3350 km SMF-Only Line With Chromatic Dispersion Compensation Using Real-Time DSP [Invited].
JOCN, 2012

2011
Immunity-Based Diagnosis for a Motherboard.
Sensors, 2011

Towards an immunity-based anomaly detection system for network traffic.
Int. J. Knowl. Based Intell. Eng. Syst., 2011

An artificial intelligence membrane to detect network intrusion.
Artif. Life Robotics, 2011

A Vulnerability Remediation Support System Using a Peer-to-Peer Network.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011

2010
Strongly unforgeable ID-based signatures without random oracles.
Int. J. Appl. Cryptogr., 2010

FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010

Evaluations for immunity-based anomaly detection with dynamic updating of profiles.
Artif. Life Robotics, 2010

Evaluations of Immunity-Based Diagnosis for a Motherboard.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

Design and Analysis of "Flexible" <i>k</i>-out-of-<i>n</i> Signatures.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
An Immunity-Based Anomaly Detection System with Sensor Agents.
Sensors, 2009

Towards an immunity-based system for detecting masqueraders.
Int. J. Knowl. Based Intell. Eng. Syst., 2009

Sender Authenticated Key Agreements without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Underlying Assumptions and Designated Verifier Signatures.
IACR Cryptol. ePrint Arch., 2009

Efficient Short Signatures from Pairing.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Anonymous authentication and secure communication protocol for wireless mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

1-out-of-.
Proceedings of the Information Security Practice and Experience, 2008

Efficient convertible Limited Verifier Signatures.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

A Restricted Undeniable Designated Verifier Signature.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
An ID-SP-M4M Scheme and Its Security Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Framework of an Immunity-Based Anomaly Detection System for User Behavior.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

An Improved Signcryption Scheme and Its Variation.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Verifier-Key-Flexible Universal Designated-Verifier Signatures.
Proceedings of the Cryptography and Coding, 2007

ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Efficient ID-Based Digital Signatures with Message Recovery.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
Inf. Media Technol., 2006

How to Verify the Threshold <i>t</i> of Shamir's (<i>t</i>, <i>n</i>)-Threshold Scheme.
Inf. Media Technol., 2006

Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority.
IACR Cryptol. ePrint Arch., 2006

An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.
IACR Cryptol. ePrint Arch., 2006

Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks.
IACR Cryptol. ePrint Arch., 2006

2005
On Designatedly Verified (Non-interactive) Watermarking Schemes.
IACR Cryptol. ePrint Arch., 2005

ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
Proceedings of the Coding and Cryptography, International Workshop, 2005

One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

Cryptosystems Based on Elliptic Curve Pairing.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

A Worm Filter Based on the Number of Unacknowledged Requests.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Proposal of Short Proxy Signature using Pairing.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An id-based non-interactive tripartite key agreement protocol with K-resilience.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

2004
Mechanism for Generating Immunity-Based Agents that Detect Masqueraders.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Anonymous traceable disclosure scheme using pairing over elliptic curve.
Proceedings of the 3rd International Conference on Information Security, 2004

Transformation-free proxy cryptosystems and their applications to electronic commerce.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Towards an Immunity-Based System for Detecting Masqueraders.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

A Fast Signature Scheme Based on New On-line Computation.
Proceedings of the Information Security, 6th International Conference, 2003

2002
An analysis of a model of computer viruses spreading via electronic mail.
Syst. Comput. Jpn., 2002

An Improved Fast Signature Scheme without Online Multiplication.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Efficient "on the Fly" Signature Schemes Based on Integer Factoring.
Proceedings of the Progress in Cryptology, 2001

1999
Extended Proxy Signatures for Smart Cards.
Proceedings of the Information Security, Second International Workshop, 1999

A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999


  Loading...