Kazumasa Omote

Orcid: 0000-0002-1371-4454

According to our database1, Kazumasa Omote authored at least 115 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Honeypot Method to Lure Attackers Without Holding Crypto-Assets.
IEEE Access, 2024

A Scientometrics Analysis of Cybersecurity Using e-CSTI.
IEEE Access, 2024

2023
Preventing SNS Impersonation: A Blockchain-Based Approach.
IEICE Trans. Inf. Syst., September, 2023

An Anonymous yet Accountable Contract Wallet System using Account Abstraction.
CoRR, 2023

Towards Decentralized Autonomous Digital Signatures Using Smart Contracts.
Proceedings of the International Conference on Information Networking, 2023

Does Private Blockchain Make Sense?
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Cross-Referencing Scheme to Ensure NFT and Platform Linkage Unaffected by Forking.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A Secure Contact Tracing Method Using Smart Contracts with Considering Privacy.
Proceedings of the Blockchain - ICBC 2023, 2023

Is the Blockchain Useful for Sharing Sensitive Data?
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

The Validator's Dilemma in PoW Blockchain: An Evolutionary Game Perspective.
Proceedings of the IEEE International Conference on Blockchain, 2023

Efficient Authentication System Based On Blockchain Using eID card.
Proceedings of the IEEE International Conference on Blockchain, 2023

VMI System with Smart Contracts for Demand Forecasting.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
A study on robustness of malware detection model.
Ann. des Télécommunications, 2022

Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin.
IEEE Access, 2022

Blockchain-Based Autonomous Notarization System Using National eID Card.
IEEE Access, 2022

Toward Achieving Anonymous NFT Trading.
IEEE Access, 2022

Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures.
Proceedings of the IEEE International Conference on Trust, 2022

Multi Pair Swap-Based Weather Derivative DeFi.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Three-Step Framework for Detecting Malicious URLs.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

A Simple and Flexible Global ID System for Authentication in Blockchain.
Proceedings of the IEEE International Conference on Communications, 2022

A Distributed Authenticity Verification Scheme Using Deep Learning for NFT Market.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

Does Blockchain Qualify as Secret-free Immutable Storage?
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Ethereum Contract Honeypot Risk Analysis.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

A study of the privacy perspective on principal component analysis via a realistic attack model.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

Proposal of a smart contract-based security token management system.
Proceedings of the IEEE International Conference on Blockchain, 2022

A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage.
Proceedings of the IEEE International Conference on Blockchain, 2022

Toward a Blockchain Healthcare Information Exchange.
Proceedings of the Advanced Information Networking and Applications, 2022

Information Security Fatigue in Visually Impaired University Students.
Proceedings of the Advanced Information Networking and Applications, 2022

Automatic Monitoring System for Security Using IoT Devices and Smart Contracts.
Proceedings of the Advanced Information Networking and Applications, 2022

Building a Blockchain-Based Social Network Identification System.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
IEEE Trans. Big Data, 2021

IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet.
Secur. Commun. Networks, 2021

Accuracy and Privacy Evaluations of Collaborative Data Analysis.
CoRR, 2021

An Anonymous Trust-Marking Scheme on Blockchain Systems.
IEEE Access, 2021

Toward Achieving Unanimity for Implicit Closings in a Trustless System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Robust Detection Model for Portable Execution Malware.
Proceedings of the ICC 2021, 2021

Efficient Blockchain-based IoT Firmware Update Considering Distribution Incentives.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Risk Analysis for Abusing Blockchain Poisoning.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

Analysis of Attack Activities for Honeypots Installation in Ethereum Network.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

A Privacy-Preserving Enforced Bill Collection System using Smart Contracts.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine Learning.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

Risk Analysis for Worthless Crypto Asset Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

Investigation and Analysis of Features in Decentralized Network Management of Minor Cryptocurrencies.
Proceedings of the Advanced Information Networking and Applications, 2021

Empirical Study of Software Adoption Process in the Bitcoin Network.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Verifiable Functional Encryption using Intel SGX.
IACR Cryptol. ePrint Arch., 2020

Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives.
Proceedings of the Network and System Security - 14th International Conference, 2020

A Decentralized Secure Email System based on Conventional RSA Signature.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Profiling of Malicious Users Targeting Ethereum's RPC Port Using Simple Honeypots.
Proceedings of the IEEE International Conference on Blockchain, 2020

A New Method of Assigning Trust to User Addresses in Bitcoin.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019

Threat Analysis of Poisoning Attack Against Ethereum Blockchain.
Proceedings of the Information Security Theory and Practice, 2019

Detecting Malicious Websites by Query Templates.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Early Detection of Remote Access Trojan by Software Network Behavior.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Malware Function Estimation Using API in Initial Behavior.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016

D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability.
IEICE Trans. Inf. Syst., 2016

A RAT Detection Method Based on Network Behavior of the Communication's Early Stage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Privacy-Preserving Profile Matching Protocol Considering Conditions.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Host-Based Detection Method of Remote Access Trojan in the Early Stage.
Proceedings of the Information Security Practice and Experience, 2016

ELAR: extremely lightweight auditing and repairing for cloud security.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Generic constructions of secure-channel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015

MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability.
Int. J. Distributed Sens. Networks, 2015

ND-POR: A POR Based on Network Coding and Dispersal Coding.
IEICE Trans. Inf. Syst., 2015

Self-healing wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

POR-2P: Network Coding-Based POR for Data Provision-Payment System.
Proceedings of the Risks and Security of Internet and Systems, 2015

DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

SW-SSS: Slepian-Wolf Coding-Based Secret Sharing Scheme.
Proceedings of the International Joint Conference, 2015

Malware Function Classification Using APIs in Initial Behavior.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

An Approach to Detect Remote Access Trojan in the Early Stage of Communication.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
J. Appl. Math., 2014

A New Efficient and Secure POR Scheme Based on Network Coding.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Methods for Restricting Message Space in Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Self-healing Schemes Suitable for Various WSNs.
Proceedings of the Internet and Distributed Computing Systems, 2013

How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Group Signatures with Message-Dependent Opening.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks.
Proceedings of the Information Security Practice and Experience, 2012

Improvement of multi-user searchable encrypted data scheme.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes.
IEICE Trans. Inf. Syst., 2011

A Timed-Release Proxy Re-Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Towards Restricting Plaintext Space in Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
Proceedings of the Information Security, 14th International Conference, 2011

A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure.
J. Inf. Process., 2010

A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010

Practical and Secure Recovery of Disk Encryption Key Using Smart Cards.
IEICE Trans. Inf. Syst., 2010

Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Proceedings of the Provable Security - 4th International Conference, 2010

An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Proceedings of the Provable Security - 4th International Conference, 2010

RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2009
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.
J. Inf. Process., 2009

A Selectable <i>k</i>-Times Relaxed Anonymous Authentication Scheme.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

BitVisor: a thin hypervisor for enforcing i/o device security.
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009

A Two-Step Execution Mechanism for Thin Secure Hypervisors.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Protection and Recovery of Disk Encryption Key Using Smart Cards.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Simple Certificateless Signature with Smart Cards.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware.
Proceedings of the SECRYPT 2007, 2007

Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

2002
A Practical English Auction with Simple Revocation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Second-price Sealed-bid Auction with the Discriminant of the p<sub>0</sub>-th Root.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
A Practical English Auction with One-Time Registration.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees.
Proceedings of the Information Security, Third International Workshop, 2000

1999
User Identification System Based on Biometrics for Keystroke.
Proceedings of the Information and Communication Security, Second International Conference, 1999


  Loading...