Skip to main content

Page of 3 next disabled
and
  1. No Access

    Chapter and Conference Paper

    Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model

    One of the worst threats present in an enterprise network is the propagation of “scanning malware” (e.g., scanning worms and bots). It is important to prevent such scanning malware from spreading within an ent...

    Kazumasa Omote, Takeshi Shimoyama, Satoru Torii in E-business and Telecommunications (2009)

  2. No Access

    Chapter and Conference Paper

    A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

    An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. However, the length of the ciphertext depends on the numb...

    Keita Emura, Atsuko Miyaji, Akito Nomura in Information Security Practice and Experien… (2009)

  3. No Access

    Chapter and Conference Paper

    A Selectable k-Times Relaxed Anonymous Authentication Scheme

    In a k-Times Anonymous Authentication (k-TAA) scheme, Application Providers (APs) authenticates each group member in k times. A user can preserve his/her own privacy and an AP can restrict the number of used serv...

    Keita Emura, Atsuko Miyaji, Kazumasa Omote in Information Security Applications (2009)

  4. No Access

    Chapter and Conference Paper

    A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root

    A second-price sealed-bid auction is that a bidder who offers the highest price gets a good in the second highest price. This style of auction solves the problems of both an English auction and a first-price s...

    Kazumasa Omote, Atsuko Miyaji in Financial Cryptography (2003)

  5. No Access

    Chapter and Conference Paper

    A Practical English Auction with One-Time Registration

    An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidders, and the auction manager(...

    Kazumasa Omote, Atsuko Miyaji in Information Security and Privacy (2001)

  6. No Access

    Chapter and Conference Paper

    An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees

    Some works about an electronic auction protocol have been proposed[2],[3],[4],[5],[6],[8],[11],[12]. An electronic auction protocol should satisfy the following seven properties: (a)Fair of bidders; (b)Security o...

    Kazumasa Omote, Atsuko Miyaji in Information Security (2000)

  7. No Access

    Chapter and Conference Paper

    User Identification System Based on Biometrics for Keystroke

    In this paper, a new type of user identification system based on characteristics (biometrics) for keystroke is proposed. In this system, we do not require any special devices. We utilize two basic parameters: ...

    Kazumasa Omote, Eiji Okamoto in Information and Communication Security (1999)

Page of 3 next disabled