Search Results - "Omote, Kazumasa"
-
1
Toward Achieving Anonymous NFT Trading
Published in IEEE access (2022)“…With the rapid development of Non-Fungible Token (NFT) market, various types of digital artwork are published via NFT in recent years for sale. In the current…”
Get full text
Journal Article -
2
A study on robustness of malware detection model
Published in Annales des télécommunications (01-10-2022)“…In recent years, machine learning–based techniques are used to prevent cyberattacks caused by malware, and special attention is paid to the risks posed by such…”
Get full text
Journal Article -
3
Blockchain-Based Autonomous Notarization System Using National eID Card
Published in IEEE access (2022)“…In recent years, the spread of information and communication technology has led to the emergence of e-government, which is the electronic replacement of…”
Get full text
Journal Article -
4
Analysis of the Features and Structure Behind Availability in Blockchain Using Altcoin
Published in IEEE access (2022)“…Data availability is a security factor in a blockchain that is challenging to understand and explain because it cannot be described cryptographically or…”
Get full text
Journal Article -
5
Honeypot Method to Lure Attackers Without Holding Crypto-Assets
Published in IEEE access (2024)“…In recent years, the convenience and potential use of crypto-assets such as Bitcoin and Ethereum have attracted increasing attention. On the other hand, there…”
Get full text
Journal Article -
6
Toward the Application of Differential Privacy to Data Collaboration
Published in IEEE access (01-01-2024)“…Federated Learning, a model-sharing method, and Data Collaboration, a non-model-sharing method, are recognized as data analysis methods for distributed data…”
Get full text
Journal Article -
7
A Scientometrics Analysis of Cybersecurity Using e-CSTI
Published in IEEE access (01-01-2024)“…The research area of cybersecurity covers a wide range of fields from networking, software, and hardware to cryptography, authentication, and cyberattack…”
Get full text
Journal Article -
8
Robust Detection Model for Portable Execution Malware
Published in ICC 2021 - IEEE International Conference on Communications (01-06-2021)“…With recent technological developments, it has become natural for personal computers and Internet of Things(IoT) devices, such as smartphones and tablets, to…”
Get full text
Conference Proceeding -
9
An Anonymous Trust-Marking Scheme on Blockchain Systems
Published in IEEE access (2021)“…During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a…”
Get full text
Journal Article -
10
An Approach to Detect Remote Access Trojan in the Early Stage of Communication
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…As data leakage accidents occur every year, the security of confidential information is becoming increasingly important. Remote Access Trojans (RAT), a kind of…”
Get full text
Conference Proceeding Journal Article -
11
Self-healing wireless sensor networks
Published in Concurrency and computation (01-07-2015)“…SummaryAvailability is very important for long‐term use of wireless sensor networks (WSNs), assuming the presence of an attacker. It is thus important to…”
Get full text
Journal Article -
12
MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability
Published in International journal of distributed sensor networks (01-01-2015)“…When data owners publish their data to a cloud storage, data integrity and availability become typical problems because the cloud servers are never trusted. To…”
Get full text
Journal Article -
13
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation
Published in IEEE transactions on emerging topics in computing (01-01-2016)“…Both anonymity and end-to-end encryption are recognized as important properties in privacy-preserving communication. However, secure and anonymous…”
Get full text
Journal Article -
14
An r-Hiding Revocable Group Signature Scheme : Group Signatures with the Property of Hiding the Number of Revoked Users
Published in Journal of applied mathematics (01-01-2014)“…If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit…”
Get full text
Journal Article -
15
A New Efficient and Secure POR Scheme Based on Network Coding
Published in 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (01-05-2014)“…Information is increasing quickly, database owners have tendency to outsource their data to an external service provider called Cloud Computing. Using Cloud,…”
Get full text
Conference Proceeding -
16
An efficient blockchain-based authentication scheme with transferability
Published in PloS one (12-09-2024)“…In the development of web applications, the rapid advancement of Internet technologies has brought unprecedented opportunities and increased the demand for…”
Get full text
Journal Article -
17
A Simple and Flexible Global ID System for Authentication in Blockchain
Published in ICC 2022 - IEEE International Conference on Communications (16-05-2022)“…In recent years, decentralized global ID systems have attracted significant attention. The concept of self-sovereign identity was established to realize a…”
Get full text
Conference Proceeding -
18
Empirical Analysis of Cryptocurrency Mixer: Tornado Cash
Published in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) (24-07-2023)“…Decentralized and anonymous transactions have become possible with the advent of cryptocurrency. However, these characteristics make it challenging to trace…”
Get full text
Conference Proceeding -
19
Cross-Referencing Scheme to Ensure NFT and Platform Linkage Unaffected by Forking
Published in 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (01-01-2023)“…One blockchain technological update thus far includes smart contract functionality implemented in Ethereum. One of its use cases, the ERC721 Non-Fungible Token…”
Get full text
Conference Proceeding -
20
Analysis of Attack Activities for Honeypots Installation in Ethereum Network
Published in 2021 IEEE International Conference on Blockchain (Blockchain) (01-01-2021)“…In recent years, blockchain-based cryptocurren-cies have attracted much attention. Attacks targeting cryptocurrencies and related services directly profit an…”
Get full text
Conference Proceeding