Search Results - "Omote, Kazumasa"

Refine Results
  1. 1

    Toward Achieving Anonymous NFT Trading by Chen, Zhanwen, Omote, Kazumasa

    Published in IEEE access (2022)
    “…With the rapid development of Non-Fungible Token (NFT) market, various types of digital artwork are published via NFT in recent years for sale. In the current…”
    Get full text
    Journal Article
  2. 2

    A study on robustness of malware detection model by Zheng, Wanjia, Omote, Kazumasa

    Published in Annales des télécommunications (01-10-2022)
    “…In recent years, machine learning–based techniques are used to prevent cyberattacks caused by malware, and special attention is paid to the risks posed by such…”
    Get full text
    Journal Article
  3. 3

    Blockchain-Based Autonomous Notarization System Using National eID Card by Haga, Shinya, Omote, Kazumasa

    Published in IEEE access (2022)
    “…In recent years, the spread of information and communication technology has led to the emergence of e-government, which is the electronic replacement of…”
    Get full text
    Journal Article
  4. 4

    Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin by Imamura, Mitsuyoshi, Omote, Kazumasa

    Published in IEEE access (2022)
    “…Data availability is a security factor in a blockchain that is challenging to understand and explain because it cannot be described cryptographically or…”
    Get full text
    Journal Article
  5. 5

    Honeypot Method to Lure Attackers Without Holding Crypto-Assets by Uchibori, Hironori, Yoshioka, Katsunari, Omote, Kazumasa

    Published in IEEE access (2024)
    “…In recent years, the convenience and potential use of crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there…”
    Get full text
    Journal Article
  6. 6

    Toward the Application of Differential Privacy to Data Collaboration by Yamashiro, Hiromi, Omote, Kazumasa, Imakura, Akira, Sakurai, Tetsuya

    Published in IEEE access (01-01-2024)
    “…Federated Learning, a model-sharing method, and Data Collaboration, a non-model-sharing method, are recognized as data analysis methods for distributed data…”
    Get full text
    Journal Article
  7. 7

    A Scientometrics Analysis of Cybersecurity Using e-CSTI by Omote, Kazumasa, Inoue, Yoko, Terada, Yoshihide, Shichijo, Naohiro, Shirai, Toshiyuki

    Published in IEEE access (01-01-2024)
    “…The research area of cybersecurity covers a wide range of fields from networking, software, and hardware to cryptography, authentication, and cyberattack…”
    Get full text
    Journal Article
  8. 8

    Robust Detection Model for Portable Execution Malware by Zheng, Wanjia, Omote, Kazumasa

    “…With recent technological developments, it has become natural for personal computers and Internet of Things(IoT) devices, such as smartphones and tablets, to…”
    Get full text
    Conference Proceeding
  9. 9

    An Anonymous Trust-Marking Scheme on Blockchain Systems by Sato, Teppei, Emura, Keita, Fujitani, Tomoki, Omote, Kazumasa

    Published in IEEE access (2021)
    “…During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a…”
    Get full text
    Journal Article
  10. 10

    An Approach to Detect Remote Access Trojan in the Early Stage of Communication by Jiang, Dan, Omote, Kazumasa

    “…As data leakage accidents occur every year, the security of confidential information is becoming increasingly important. Remote Access Trojans (RAT), a kind of…”
    Get full text
    Conference Proceeding Journal Article
  11. 11

    Self-healing wireless sensor networks by Miyaji, Atsuko, Omote, Kazumasa

    Published in Concurrency and computation (01-07-2015)
    “…SummaryAvailability is very important for long‐term use of wireless sensor networks (WSNs), assuming the presence of an attacker. It is thus important to…”
    Get full text
    Journal Article
  12. 12

    MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability by Omote, Kazumasa, Thao, Tran Phuong

    “…When data owners publish their data to a cloud storage, data integrity and availability become typical problems because the cloud servers are never trusted. To…”
    Get full text
    Journal Article
  13. 13

    Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation by Emura, Keita, Kanaoka, Akira, Ohta, Satoshi, Omote, Kazumasa, Takahashi, Takeshi

    “…Both anonymity and end-to-end encryption are recognized as important properties in privacy-preserving communication. However, secure and anonymous…”
    Get full text
    Journal Article
  14. 14

    An r-Hiding Revocable Group Signature Scheme : Group Signatures with the Property of Hiding the Number of Revoked Users by Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa

    Published in Journal of applied mathematics (01-01-2014)
    “…If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit…”
    Get full text
    Journal Article
  15. 15

    A New Efficient and Secure POR Scheme Based on Network Coding by Omote, Kazumasa, Thao, Tran Phuong

    “…Information is increasing quickly, database owners have tendency to outsource their data to an external service provider called Cloud Computing. Using Cloud,…”
    Get full text
    Conference Proceeding
  16. 16

    An efficient blockchain-based authentication scheme with transferability by Jin, Xiushu, Omote, Kazumasa

    Published in PloS one (12-09-2024)
    “…In the development of web applications, the rapid advancement of Internet technologies has brought unprecedented opportunities and increased the demand for…”
    Get full text
    Journal Article
  17. 17

    A Simple and Flexible Global ID System for Authentication in Blockchain by Omote, Kazumasa

    “…In recent years, decentralized global ID systems have attracted significant attention. The concept of self-sovereign identity was established to realize a…”
    Get full text
    Conference Proceeding
  18. 18

    Empirical Analysis of Cryptocurrency Mixer: Tornado Cash by Youn, Minwoo, Chin, Kota, Omote, Kazumasa

    “…Decentralized and anonymous transactions have become possible with the advent of cryptocurrency. However, these characteristics make it challenging to trace…”
    Get full text
    Conference Proceeding
  19. 19

    Cross-Referencing Scheme to Ensure NFT and Platform Linkage Unaffected by Forking by Kimura, Keigo, Imamura, Mitsuyoshi, Omote, Kazumasa

    “…One blockchain technological update thus far includes smart contract functionality implemented in Ethereum. One of its use cases, the ERC721 Non-Fungible Token…”
    Get full text
    Conference Proceeding
  20. 20

    Analysis of Attack Activities for Honeypots Installation in Ethereum Network by Chin, Kota, Omote, Kazumasa

    “…In recent years, blockchain-based cryptocurren-cies have attracted much attention. Attacks targeting cryptocurrencies and related services directly profit an…”
    Get full text
    Conference Proceeding