dblp.uni-trier.dewww.uni-trier.de

Eiji Okamoto Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
78EEJean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez: Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. CHES 2009: 225-239
77EEChifumi Sato, Takeshi Okamoto, Eiji Okamoto: Strongly Unforgeable ID-Based Signatures without Random Oracles. ISPEC 2009: 35-46
76EEXun Yi, Raylin Tso, Eiji Okamoto: ID-Based Group Password-Authenticated Key Exchange. IWSEC 2009: 192-211
75 Anton Romanov, Eiji Okamoto: An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment. SECRYPT 2009: 313-318
74EESeiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto: Optimised Versions of the Ate and Twisted Ate Pairings. IEICE Transactions 92-A(7): 1660-1667 (2009)
2008
73EEXun Yi, Mike Faulkner, Eiji Okamoto: Secure Wireless Sensor Networks. ARES 2008: 497-502
72EEAtsushi Koide, Raylin Tso, Eiji Okamoto: A Sanitizing Signature Scheme with Indexing. EUC (2) 2008: 16-21
71EEAtsushi Koide, Raylin Tso, Eiji Okamoto: Convertible Undeniable Partially Blind Signature from Bilinear Pairings. EUC (2) 2008: 77-82
70EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ISPEC 2008: 290-303
69EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: 1-out-of-. ISPEC 2008: 45-55
68EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez: A Comparison between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m. Pairing 2008: 297-315
67EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi: Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IEEE Trans. Computers 57(11): 1454-1468 (2008)
66EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of etaT Pairing. IEICE Transactions 91-A(1): 221-228 (2008)
65EESk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Security and Communication Networks 1(2): 179-189 (2008)
2007
64 Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings Springer 2007
63EEJean-Luc Beuchat, Takanori Miyoshi, Yoshihito Oyama, Eiji Okamoto: Multiplication over Fpm on FPGA: A Survey. ARC 2007: 214-225
62EERaylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto: Efficient ID-Based Digital Signatures with Message Recovery. CANS 2007: 47-59
61EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto: Arithmetic Operators for Pairing-Based Cryptography. CHES 2007: 239-255
60EEJean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation. IEEE Symposium on Computer Arithmetic 2007: 97-104
59EESeiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto: Optimised Versions of the Ate and Twisted Ate Pairings. IMA Int. Conf. 2007: 302-312
58EERaylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421
57EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. ISPEC 2007: 254-268
56EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: An Improved Signcryption Scheme and Its Variation. ITNG 2007: 772-778
55EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Inscrypt 2007: 11-24
54EEJean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. WAIFI 2007: 25-39
53EEMasaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Universal etaT Pairing Algorithm over Arbitrary Extension Degree. WISA 2007: 1-15
52EELihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi: An ID-SP-M4M Scheme and Its Security Analysis. IEICE Transactions 90-A(1): 91-100 (2007)
2006
51EEKun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258
50EEYuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. CIS 2006: 396-405
49EESk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149
48EESk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto: An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306
47EELihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto: Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Transactions 89-A(1): 106-114 (2006)
2005
46 Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan Springer 2005
45EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
44EELihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203
43EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. CISC 2005: 113-127
42 Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42
41EETakeshi Okamoto, Atsuo Inomata, Eiji Okamoto: A Proposal of Short Proxy Signature using Pairing. ITCC (1) 2005: 631-635
40EETakeshi Okamoto, Raylin Tso, Eiji Okamoto: One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. MDAI 2005: 122-133
39EEEiji Okamoto, Takeshi Okamoto: Cryptosystems Based on Elliptic Curve Pairing. MDAI 2005: 13-23
38EELihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi: ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. WCC 2005: 291-303
37EEJavier Lopez, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson: Specification and design of advanced authentication and authorization services. Computer Standards & Interfaces 27(5): 467-478 (2005)
2004
36 Javier Lopez, Sihan Qing, Eiji Okamoto: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings Springer 2004
35EEMasakazu Soshi, Mamoru Maekawa, Eiji Okamoto: The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. IEICE Transactions 87-A(1): 190-203 (2004)
2003
34EEJuan Manuel González Nieto, Ed Dawson, Eiji Okamoto: Privacy and Trusted Computing. DEXA Workshops 2003: 383-388
33EEAkira Kanaoka, Eiji Okamoto: Multivariate Statistical Analysis of Network Traffic for Intrusion Detection. DEXA Workshops 2003: 472-476
32EERaylin Tso, Ying Miao, Eiji Okamoto: A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. ICISC 2003: 377-385
31EETakeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto: A Fast Signature Scheme Based on New On-line Computation. ISC 2003: 111-121
30EESelwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003)
2002
29EEMarie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto: Modelling Trust Structures for Public Key Infrastructures. ACISP 2002: 56-70
28EEMasahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka: Simple and Secure Mobile Access under the Flexible Organization Management. DEXA Workshops 2002: 456-462
27EEEd Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto: A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ISC 2002: 136-149
2000
26 Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Springer 2000
25 Bimal K. Roy, Eiji Okamoto: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings Springer 2000
24 Hiroshi Doi, Masahiro Mambo, Eiji Okamoto: On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. ACISP 2000: 352-367
23 Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji: A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483
22EEXun Yi, Chee Kheong Siew, Xiao Feng Wang, Eiji Okamoto: A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments. Distributed and Parallel Databases 8(1): 85-117 (2000)
1999
21 Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Springer 1999
20EEXiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto: Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302
19 Kazumasa Omote, Eiji Okamoto: User Identification System Based on Biometrics for Keystroke. ICICS 1999: 216-229
18 Josef Pieprzyk, Eiji Okamoto: Verfiable Secret Sharing and Time Capsules. ICISC 1999: 169-183
17EEShigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo: Improvement of Secure Access Control Agent for Distributed Files. ICPP Workshops 1999: 185-
16EETakeshi Okamoto, Mitsuru Tada, Eiji Okamoto: Extended Proxy Signatures for Smart Cards. ISW 1999: 247-258
1998
15 Eiji Okamoto, George I. Davida, Masahiro Mambo: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings Springer 1998
14EEAgus Fanar Syukri, Eiji Okamoto, Masahiro Mambo: A User Identification System Using Signature Written with Mouse. ACISP 1998: 403-414
13 Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto: Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193
12 Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu: A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203
1997
11 Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai: Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282
10 Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo: Proposal of user identification scheme using mouse. ICICS 1997: 144-148
9 Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo: The Application of ID-Based Key Distribution Systems to an Elliptic Curve. ISW 1997: 335-344
8 Tomohiko Uyematsu, Eiji Okamoto: A construction of codes with exponential error bounds on arbitrary discrete memoryless channels. IEEE Transactions on Information Theory 43(3): 992-996 (1997)
1996
7EEMasahiro Mambo, Keisuke Usuda, Eiji Okamoto: Proxy Signatures for Delegating Signing Operation. ACM Conference on Computer and Communications Security 1996: 48-57
6EEMasahiro Mambo, Kouichi Sakurai, Eiji Okamoto: How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333
1994
5EEYukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu: Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. CRYPTO 1994: 369-382
1991
4EEKazue Tanaka, Eiji Okamoto: Key distribution system for mail systems using ID-related information directory. Computers & Security 10(1): 25-33 (1991)
1988
3EEEiji Okamoto: Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. EUROCRYPT 1988: 361-373
1987
2EEEiji Okamoto: Key Distribution Systems Based on Identification Information. CRYPTO 1987: 194-202
1985
1EEEiji Okamoto, K. Nakamura: Lifetimes of Keys in Cryptographic Key Management Systems. CRYPTO 1985: 246-259

Coauthor Index

1Jean-Luc Beuchat [54] [60] [61] [63] [67] [68] [78]
2Colin Boyd [51] [58]
3Nicolas Brisebarre [54] [61] [67] [68]
4Mike Burmester [23]
5Zhenfu Cao [47]
6Robert S. Coulter [29]
7George I. Davida [15]
8Ed Dawson [27] [29] [30] [34] [37] [45] [51]
9Yvo Desmedt [23]
10Jérémie Detrey [61] [67] [68] [78]
11Hiroshi Doi [23] [24] [38] [52]
12Nicolas Estibals [78]
13Mike Faulkner [73]
14Chunxiang Gu [62]
15Kenichi Hayashi [10]
16Marie Henderson [29]
17Florian Hess [59] [74]
18D. Frank Hsu [12]
19Atsuo Inomata [41] [48] [49] [65]
20Akira Kanaoka [33]
21Naoki Kanayama [59] [74]
22Hirofumi Katsuno [31]
23Yuto Kawahara [50] [53]
24Shigeki Kitazawa [17]
25Atsushi Koide [71] [72]
26Kwok-Yan Lam [12] [13] [20] [21]
27Javier Lopez [27] [30] [36] [37] [45]
28Mamoru Maekawa [35]
29Masahiro Mambo [6] [7] [9] [10] [11] [14] [15] [17] [23] [24] [28] [48] [49] [65]
30Seiichi Matsuda [59] [74]
31Ying Miao [32] [38] [47] [52]
32Takanori Miyoshi [63]
33José A. Montenegro [27] [37]
34K. Nakamura [1]
35Nidal Nasser [65]
36Juan Manuel González Nieto (Juanma González Nieto) [34] [45] [58]
37Takeshi Okamoto [16] [31] [38] [39] [40] [41] [42] [43] [44] [47] [49] [52] [55] [56] [58] [62] [64] [65] [69] [77]
38Tatsuaki Okamoto [64]
39Kazumasa Omote [19]
40Yoshihito Oyama [63]
41Kun Peng [45] [51]
42Josef Pieprzyk [18] [26]
43Sihan Qing [36] [46]
44Sk. Md. Mizanur Rahman [48] [49] [65]
45Francisco Rodríguez-Henríquez [68] [78]
46Anton Romanov [75]
47Bimal K. Roy [25]
48Selwyn Russell [30]
49Hisao Sakazaki [9]
50Kouichi Sakurai [6] [11]
51Ryôichi Sasaki [46]
52Chifumi Sato [77]
53Jennifer Seberry (Jennifer Seberry Wallis) [26]
54Yasushi Sengoku [28]
55Masaaki Shirase [53] [54] [57] [60] [66] [67] [70]
56Chee Kheong Siew [22]
57Masakazu Soshi [35]
58Agus Fanar Syukri [14]
59Mitsuru Tada [16] [23]
60Tsuyoshi Takagi [42] [44] [50] [53] [54] [57] [60] [64] [66] [67] [70]
61Kazue Tanaka [4]
62Takashi Tanaka [28]
63Raylin Tso [32] [40] [42] [43] [55] [56] [58] [62] [69] [71] [72] [76]
64Yukiyasu Tsunoo [5]
65Keisuke Usuda [7]
66Tomohiko Uyematsu [5] [8]
67José Luis Vivas [37]
68Lihua Wang [38] [44] [47] [52]
69Xiao Feng Wang [12] [13] [20] [22]
70Chaoping Xing [21]
71Xun Yi [12] [13] [17] [20] [22] [73] [76]
72Yuko Yoshifuji [23]
73Hiroshi Yoshiura [46]
74C. Q. Zhang [20]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)