dblp.uni-trier.dewww.uni-trier.de

Takeshi Okamoto Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
31EEChifumi Sato, Takeshi Okamoto, Eiji Okamoto: Strongly Unforgeable ID-Based Signatures without Random Oracles. ISPEC 2009: 35-46
2008
30EEHideyuki Tanaka, Takeshi Okamoto: Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography. II3E 2008: 265-277
29EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: 1-out-of-. ISPEC 2008: 45-55
28EETakeshi Okamoto, Yoshiteru Ishida: Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System. KES (3) 2008: 456-464
27EESk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Security and Communication Networks 1(2): 179-189 (2008)
2007
26 Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings Springer 2007
25EERaylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto: Efficient ID-Based Digital Signatures with Message Recovery. CANS 2007: 47-59
24EERaylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421
23EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: An Improved Signcryption Scheme and Its Variation. ITNG 2007: 772-778
22EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Inscrypt 2007: 11-24
21EETakeshi Okamoto, Yoshiteru Ishida: Framework of an Immunity-Based Anomaly Detection System for User Behavior. KES (3) 2007: 821-829
20EELihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi: An ID-SP-M4M Scheme and Its Security Analysis. IEICE Transactions 90-A(1): 91-100 (2007)
2006
19EESk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto: Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149
18EETakeshi Okamoto, Yoshiteru Ishida: Towards an Immunity-Based Anomaly Detection System for Network Traffic. KES (2) 2006: 123-130
17EELihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto: Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Transactions 89-A(1): 106-114 (2006)
2005
16EELihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203
15EERaylin Tso, Takeshi Okamoto, Eiji Okamoto: Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. CISC 2005: 113-127
14 Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42
13EETakeshi Okamoto, Atsuo Inomata, Eiji Okamoto: A Proposal of Short Proxy Signature using Pairing. ITCC (1) 2005: 631-635
12EETakeshi Okamoto: A Worm Filter Based on the Number of Unacknowledged Requests. KES (2) 2005: 93-99
11EETakeshi Okamoto, Raylin Tso, Eiji Okamoto: One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. MDAI 2005: 122-133
10EEEiji Okamoto, Takeshi Okamoto: Cryptosystems Based on Elliptic Curve Pairing. MDAI 2005: 13-23
9EELihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi: ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. WCC 2005: 291-303
2004
8EETakeshi Okamoto, Takayuki Watanabe, Yoshiteru Ishida: Mechanism for Generating Immunity-Based Agents that Detect Masqueraders. KES 2004: 534-540
2003
7EETakeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto: A Fast Signature Scheme Based on New On-line Computation. ISC 2003: 111-121
6EETakeshi Okamoto, Takayuki Watanabe, Yoshiteru Ishida: Towards an Immunity-Based System for Detecting Masqueraders. KES 2003: 488-495
2002
5EETakeshi Okamoto, Mitsuru Tada, Atsuko Miyaji: An Improved Fast Signature Scheme without Online Multiplication. Financial Cryptography 2002: 152-167
4EETakeshi Okamoto, Yoshiteru Ishida: An analysis of a model of computer viruses spreading via electronic mail. Systems and Computers in Japan 33(14): 81-90 (2002)
2001
3EETakeshi Okamoto, Mitsuru Tada, Atsuko Miyaji: Efficient "on the Fly" Signature Schemes Based on Integer Factoring. INDOCRYPT 2001: 275-286
1999
2EETakeshi Okamoto, Yoshiteru Ishida: A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. ISADS 1999: 328-331
1EETakeshi Okamoto, Mitsuru Tada, Eiji Okamoto: Extended Proxy Signatures for Smart Cards. ISW 1999: 247-258

Coauthor Index

1Colin Boyd [24]
2Zhenfu Cao [17]
3Hiroshi Doi [9] [20]
4Chunxiang Gu [25]
5Atsuo Inomata [13] [19] [27]
6Yoshiteru Ishida [2] [4] [6] [8] [18] [21] [28]
7Hirofumi Katsuno [7]
8Masahiro Mambo [19] [27]
9Ying Miao [9] [17] [20]
10Atsuko Miyaji [3] [5]
11Nidal Nasser [27]
12Juan Manuel González Nieto (Juanma González Nieto) [24]
13Eiji Okamoto [1] [7] [9] [10] [11] [13] [14] [15] [16] [17] [19] [20] [22] [23] [24] [25] [26] [27] [29] [31]
14Tatsuaki Okamoto [26]
15Sk. Md. Mizanur Rahman [19] [27]
16Chifumi Sato [31]
17Mitsuru Tada [1] [3] [5]
18Tsuyoshi Takagi [14] [16] [26]
19Hideyuki Tanaka [30]
20Raylin Tso [11] [14] [15] [22] [23] [24] [25] [29]
21Lihua Wang [9] [16] [17] [20]
22Takayuki Watanabe [6] [8]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)