Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs Detection

    In order to compare the performance of the malicious URLs detection method, researches used the F-score or other detection accuracy to evaluate, but there are some difficulties in evaluating the URL embedding ...

    Qisheng Chen, Kazumasa Omote in ICT Systems Security and Privacy Protection (2024)

  2. No Access

    Chapter and Conference Paper

    Analysis and Risk Consideration of Worldwide Cyber Incidents Related to Cryptoassets

    Cryptoassets are exposed to a variety of cyber attacks, including exploit vulnerabilities in blockchain technology and transaction systems, in addition to traditional cyber attacks. To mitigate incidents relat...

    Kazumasa Omote, Yuto Tsuzuki, Keisho Ito, Ryohei Kishibuchi in Hybrid Intelligent Systems (2023)

  3. No Access

    Chapter and Conference Paper

    A Secure Contact Tracing Method Using Smart Contracts with Considering Privacy

    Contact tracing, which uses smartphones to track the behavioral history of device owners, is used for infection control and crime control. On the other hand, contact tracing collects personal information, such...

    Kazumasa Omote, Tatsuhiro Fukuda in Blockchain – ICBC 2023 (2023)

  4. No Access

    Article

    A study on robustness of malware detection model

    In recent years, machine learning–based techniques are used to prevent cyberattacks caused by malware, and special attention is paid to the risks posed by such systems. However, there are relatively few studie...

    Wanjia Zheng, Kazumasa Omote in Annals of Telecommunications (2022)

  5. No Access

    Chapter and Conference Paper

    Ethereum Contract Honeypot Risk Analysis

    In recent years, smart contracts on the Ethereum platform have attracted considerable attention, and smart contracts have increasingly become targets of cyberattacks for the purpose of stealing cryptoassets. O...

    Motoya Ishimaki, Kazumasa Omote in Frontiers in Cyber Security (2022)

  6. No Access

    Chapter and Conference Paper

    Automatic Monitoring System for Security Using IoT Devices and Smart Contracts

    With the recent technological advances in the design of IoT devices and their widespread use, it has become increasingly common for alarm services that provide security for facilities to use IoT devices. Howev...

    Kotono Iwata, Kazumasa Omote in Advanced Information Networking and Applications (2022)

  7. No Access

    Chapter and Conference Paper

    Image Data Recoverability Against Data Collaboration and Its Countermeasure

    The development machine learning and related techniques has accelerated the use of data in a variety of fields, including medicine, finance, and advertising. Because the amount of data is increasing extremely ...

    Takaya Yamazoe, Hiromi Yamashiro in Science of Cyber Security - SciSec 2022 Wo… (2022)

  8. No Access

    Chapter and Conference Paper

    Toward a Blockchain Healthcare Information Exchange

    The introduction of healthcare information exchange (HIE) systems has been limited, although its compelling social need has been recognized. This could be due to medical institutions’ concerns about informatio...

    Ryuji Ueno, Kazumasa Omote in Advanced Information Networking and Applications (2022)

  9. No Access

    Chapter and Conference Paper

    Information Security Fatigue in Visually Impaired University Students

    Information security measures for ICT users are always issues that must be considered. This may lead to a sense of mental exhaustion (information security fatigue) owing to the troublesome and time-consuming m...

    Masataka Kakinouchi, Kazumasa Omote in Advanced Information Networking and Applications (2022)

  10. No Access

    Chapter and Conference Paper

    Building a Blockchain-Based Social Network Identification System

    With the rise of social network service (SNS) in recent years, the security of SNS users’ private information has been a concern for the public. However, due to the anonymity of SNS, identity impersonation is ...

    Zhanwen Chen, Kazumasa Omote in Advanced Information Networking and Applications (2022)

  11. No Access

    Chapter and Conference Paper

    Empirical Study of Software Adoption Process in the Bitcoin Network

    Managing the flood of devices is a modern challenge in distributed networks as it is becoming increasingly difficult to manage the software updates needed to protect the devices from malicious attacks. Bitcoin...

    Mitsuyoshi Imamura, Kazumasa Omote in Advanced Information Networking and Applications (2021)

  12. No Access

    Chapter and Conference Paper

    Risk Analysis for Worthless Crypto Asset Networks

    Blockchain technology has been used as the basis of crypto assets since the proposal of Bitcoin [8] by Satoshi Nakamoto, and new operation methods are being discussed every day. However, because of decentralizati...

    Wataru Taguchi, Kazumasa Omote in Advanced Information Networking and Applications (2021)

  13. No Access

    Chapter and Conference Paper

    Investigation and Analysis of Features in Decentralized Network Management of Minor Cryptocurrencies

    Blockchain is a trustless interoperability platform for users and is managed in a decentralized structure. There are no controllers in this platform, and service continuity depends on the users present in the ...

    Mitsuyoshi Imamura, Kazumasa Omote in Advanced Information Networking and Applications (2021)

  14. No Access

    Chapter and Conference Paper

    Verifiable Functional Encryption Using Intel SGX

    Most functional encryption schemes implicitly assume that inputs to decryption algorithms, i.e., secret keys and ciphertexts, are generated honestly. However, they may be tampered by malicious adversaries. Thu...

    Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi in Provable and Practical Security (2021)

  15. No Access

    Chapter and Conference Paper

    Toward Achieving Unanimity for Implicit Closings in a Trustless System

    Blockchain, which has a decentralized management structure, is a technology that challenges conventional wisdom about the availability and durability of an unstable structure, because the network system is man...

    Mitsuyoshi Imamura, Kazumasa Omote in Quality, Reliability, Security and Robustn… (2021)

  16. No Access

    Chapter and Conference Paper

    Detecting Malicious Websites by Query Templates

    With the development of the Internet, web content is exponentially increasing. Along with this, web-based attacks such as drive-by download attacks and phishing have grown year on year. To prevent such attacks...

    Satomi Kaneko, Akira Yamada, Yukiko Sawaya in Innovative Security Solutions for Informat… (2020)

  17. Chapter

    Bitcoin and Blockchain Technology

    A can be defined as a “book of permanent record.” With modern information technology, data have become economic resources if they are associated with exclusive owners and put into a . It is shown in Chaps. 3

    Kazumasa Omote, Makoto Yano in Blockchain and Crypto Currency (2020)

  18. Chapter and Conference Paper

    Threat Analysis of Poisoning Attack Against Ethereum Blockchain

    In recent years, blockchain technology has witnessed remarkable developments in its application to crypto assets (cryptocurrency) considering not only function storing values but also extension of the smart c...

    Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote in Information Security Theory and Practice (2020)

  19. No Access

    Chapter and Conference Paper

    Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives

    Recently, large-scale data collection has driven data utilization in the medical, financial, advertising, and several other fields. This increasing use of data necessitates privacy risk considerations. K-anonymiz...

    Takaya Yamazoe, Kazumasa Omote in Network and System Security (2020)

  20. No Access

    Chapter and Conference Paper

    Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain

    Blockchain is an autonomous decentralized system, the operation of which depends on the motivation of the users who provide the nodes for managing the accurate distributed ledger. For the management of an acc...

    Mitsuyoshi Imamura, Kazumasa Omote in Network and System Security (2019)

previous disabled Page of 3