Search the dblp DataBase
Takeshi Okamoto :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Lihua Wang , Takeshi Okamoto , Tsuyoshi Takagi , Eiji Okamoto Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:198-203 [Conf ] Raylin Tso , Takeshi Okamoto , Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:113-127 [Conf ] Takeshi Okamoto , Mitsuru Tada , Atsuko Miyaji An Improved Fast Signature Scheme without Online Multiplication. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:152-167 [Conf ] Takeshi Okamoto , Mitsuru Tada , Atsuko Miyaji Efficient "on the Fly" Signature Schemes Based on Integer Factoring. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:275-286 [Conf ] Takeshi Okamoto , Yoshiteru Ishida A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. [Citation Graph (0, 0)][DBLP ] ISADS, 1999, pp:328-331 [Conf ] Takeshi Okamoto , Hirofumi Katsuno , Eiji Okamoto A Fast Signature Scheme Based on New On-line Computation. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:111-121 [Conf ] Takeshi Okamoto , Mitsuru Tada , Eiji Okamoto Extended Proxy Signatures for Smart Cards. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:247-258 [Conf ] Takeshi Okamoto , Atsuo Inomata , Eiji Okamoto A Proposal of Short Proxy Signature using Pairing. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:631-635 [Conf ] Raylin Tso , Takeshi Okamoto , Eiji Okamoto An Improved Signcryption Scheme and Its Variation. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:772-778 [Conf ] Takeshi Okamoto A Worm Filter Based on the Number of Unacknowledged Requests. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:93-99 [Conf ] Takeshi Okamoto , Yoshiteru Ishida Towards an Immunity-Based Anomaly Detection System for Network Traffic. [Citation Graph (0, 0)][DBLP ] KES (2), 2006, pp:123-130 [Conf ] Takeshi Okamoto , Takayuki Watanabe , Yoshiteru Ishida Towards an Immunity-Based System for Detecting Masqueraders. [Citation Graph (0, 0)][DBLP ] KES, 2003, pp:488-495 [Conf ] Takeshi Okamoto , Takayuki Watanabe , Yoshiteru Ishida Mechanism for Generating Immunity-Based Agents that Detect Masqueraders. [Citation Graph (0, 0)][DBLP ] KES, 2004, pp:534-540 [Conf ] Eiji Okamoto , Takeshi Okamoto Cryptosystems Based on Elliptic Curve Pairing. [Citation Graph (0, 0)][DBLP ] MDAI, 2005, pp:13-23 [Conf ] Takeshi Okamoto , Raylin Tso , Eiji Okamoto One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. [Citation Graph (0, 0)][DBLP ] MDAI, 2005, pp:122-133 [Conf ] Raylin Tso , Takeshi Okamoto , Tsuyoshi Takagi , Eiji Okamoto An id-based non-interactive tripartite key agreement protocol with K-resilience. [Citation Graph (0, 0)][DBLP ] Communications and Computer Networks, 2005, pp:38-42 [Conf ] Lihua Wang , Eiji Okamoto , Ying Miao , Takeshi Okamoto , Hiroshi Doi ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] WCC, 2005, pp:291-303 [Conf ] Takeshi Okamoto , Yoshiteru Ishida An analysis of a model of computer viruses spreading via electronic mail. [Citation Graph (0, 0)][DBLP ] Systems and Computers in Japan, 2002, v:33, n:14, pp:81-90 [Journal ] Raylin Tso , Chunxiang Gu , Takeshi Okamoto , Eiji Okamoto Efficient ID-Based Digital Signatures with Message Recovery. [Citation Graph (0, 0)][DBLP ] CANS, 2007, pp:47-59 [Conf ] Takeshi Okamoto , Yoshiteru Ishida Framework of an Immunity-Based Anomaly Detection System for User Behavior. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:821-829 [Conf ] Sk. Md. Mizanur Rahman , Atsuo Inomata , Takeshi Okamoto , Masahiro Mambo , Eiji Okamoto Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICUCT, 2006, pp:140-149 [Conf ] ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. [Citation Graph (, )][DBLP ] Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography. [Citation Graph (, )][DBLP ] Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP ] 1-out-of-. [Citation Graph (, )][DBLP ] Strongly Unforgeable ID-Based Signatures without Random Oracles. [Citation Graph (, )][DBLP ] Efficient Short Signatures from Pairing. [Citation Graph (, )][DBLP ] Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System. [Citation Graph (, )][DBLP ] A Restricted Undeniable Designated Verifier Signature. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs