Masaki Inamura

According to our database1, Masaki Inamura authored at least 26 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Secure Comparison and Interval Test Protocols based on Three-party MPC.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

An Order-specified Aggregate Authority-transfer Signature.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Content Protection Method to Control Editing by Billing.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Secure Grouping Protocol Using a Deck of Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Personal Authentication Method based on Human Preference Prediction using Machine Learning.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Provably Secure Structured Signature Schemes with Tighter Reductions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Deployment of Contents Protection Scheme using Digital Signature.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Access Control of Webcam on PC with Prevention against Peeping by Attackers.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Evaluation of Handwriting Characteristic for Two-factor Authentication Interface on Touch-pad Panel.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange.
Proceedings of the ICISSP 2015, 2015

Content Control Scheme to Realize Right Succession and Edit Control.
Proceedings of the ICE-B 2015, 2015

Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015

2013
Content Approval Systems with Expansions of a New Pair-Connected-Structured Aggregate Signature Scheme.
Int. J. E Entrepreneurship Innov., 2013

2011
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2009
Anonymous handover mechanism for service mobility in heterogeneous wireless networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

2007
Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy.
Proceedings of the SECRYPT 2007, 2007

Anonymous Prepaid Content Viewing System with Mobile Terminal.
Proceedings of the SECRYPT 2007, 2007

2006
Flexible License Transfer System Using Mobile Terminal.
Proceedings of the SECRYPT 2006, 2006


  Loading...