Takeshi Okamoto
Orcid: 0000-0002-1898-6248
According to our database1,
Takeshi Okamoto
authored at least 73 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
2021
Identification of toolchains used to build IoT malware with statically linked libraries.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
2020
Identification of library functions statically linked to Linux malware without symbols.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
2019
Mob. Networks Appl., 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Artif. Life Robotics, 2018
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
2017
400Gbit/s/ch Field Demonstration of Modulation Format Adaptation Based on Pilot-Aided OSNR Estimation Using Real-Time DSP.
IEICE Trans. Commun., 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
2016
Artif. Life Robotics, 2016
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016
Toward an Artificial Immune Server against Cyber Attacks: Enhancement of Protection against DoS Attacks.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016
2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015
2014
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net.
Proceedings of the Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice, 2014
2012
Transmission of a 127 Gb/s PM-QPSK Signal Over a 3350 km SMF-Only Line With Chromatic Dispersion Compensation Using Real-Time DSP [Invited].
JOCN, 2012
2011
Int. J. Knowl. Based Intell. Eng. Syst., 2011
Artif. Life Robotics, 2011
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011
2010
Int. J. Appl. Cryptogr., 2010
FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010
Artif. Life Robotics, 2010
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010
2009
Int. J. Knowl. Based Intell. Eng. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
Anonymous authentication and secure communication protocol for wireless mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Cryptography and Coding, 2007
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
Inf. Media Technol., 2006
How to Verify the Threshold <i>t</i> of Shamir's (<i>t</i>, <i>n</i>)-Threshold Scheme.
Inf. Media Technol., 2006
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
2005
IACR Cryptol. ePrint Arch., 2005
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
Proceedings of the Coding and Cryptography, International Workshop, 2005
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
An id-based non-interactive tripartite key agreement protocol with K-resilience.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005
2004
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Transformation-free proxy cryptosystems and their applications to electronic commerce.
Proceedings of the 3rd International Conference on Information Security, 2004
2003
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Syst. Comput. Jpn., 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
1999
Proceedings of the Information Security, Second International Workshop, 1999
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents.
Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems, 1999