The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Takeshi Okamoto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
    Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:198-203 [Conf]
  2. Raylin Tso, Takeshi Okamoto, Eiji Okamoto
    Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:113-127 [Conf]
  3. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
    An Improved Fast Signature Scheme without Online Multiplication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:152-167 [Conf]
  4. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
    Efficient "on the Fly" Signature Schemes Based on Integer Factoring. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:275-286 [Conf]
  5. Takeshi Okamoto, Yoshiteru Ishida
    A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. [Citation Graph (0, 0)][DBLP]
    ISADS, 1999, pp:328-331 [Conf]
  6. Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
    A Fast Signature Scheme Based on New On-line Computation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:111-121 [Conf]
  7. Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto
    Extended Proxy Signatures for Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:247-258 [Conf]
  8. Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
    A Proposal of Short Proxy Signature using Pairing. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:631-635 [Conf]
  9. Raylin Tso, Takeshi Okamoto, Eiji Okamoto
    An Improved Signcryption Scheme and Its Variation. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:772-778 [Conf]
  10. Takeshi Okamoto
    A Worm Filter Based on the Number of Unacknowledged Requests. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:93-99 [Conf]
  11. Takeshi Okamoto, Yoshiteru Ishida
    Towards an Immunity-Based Anomaly Detection System for Network Traffic. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:123-130 [Conf]
  12. Takeshi Okamoto, Takayuki Watanabe, Yoshiteru Ishida
    Towards an Immunity-Based System for Detecting Masqueraders. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:488-495 [Conf]
  13. Takeshi Okamoto, Takayuki Watanabe, Yoshiteru Ishida
    Mechanism for Generating Immunity-Based Agents that Detect Masqueraders. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:534-540 [Conf]
  14. Eiji Okamoto, Takeshi Okamoto
    Cryptosystems Based on Elliptic Curve Pairing. [Citation Graph (0, 0)][DBLP]
    MDAI, 2005, pp:13-23 [Conf]
  15. Takeshi Okamoto, Raylin Tso, Eiji Okamoto
    One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. [Citation Graph (0, 0)][DBLP]
    MDAI, 2005, pp:122-133 [Conf]
  16. Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
    An id-based non-interactive tripartite key agreement protocol with K-resilience. [Citation Graph (0, 0)][DBLP]
    Communications and Computer Networks, 2005, pp:38-42 [Conf]
  17. Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi
    ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:291-303 [Conf]
  18. Takeshi Okamoto, Yoshiteru Ishida
    An analysis of a model of computer viruses spreading via electronic mail. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2002, v:33, n:14, pp:81-90 [Journal]
  19. Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
    Efficient ID-Based Digital Signatures with Message Recovery. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:47-59 [Conf]
  20. Takeshi Okamoto, Yoshiteru Ishida
    Framework of an Immunity-Based Anomaly Detection System for User Behavior. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:821-829 [Conf]
  21. Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
    Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICUCT, 2006, pp:140-149 [Conf]

  22. ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. [Citation Graph (, )][DBLP]


  23. Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography. [Citation Graph (, )][DBLP]


  24. Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP]


  25. 1-out-of-. [Citation Graph (, )][DBLP]


  26. Strongly Unforgeable ID-Based Signatures without Random Oracles. [Citation Graph (, )][DBLP]


  27. Efficient Short Signatures from Pairing. [Citation Graph (, )][DBLP]


  28. Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System. [Citation Graph (, )][DBLP]


  29. A Restricted Undeniable Designated Verifier Signature. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002