default search action
Takeshi Okamoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c49]Yuhei Kawakoya
, Shu Akabane
, Makoto Iwamura
, Takeshi Okamoto
:
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware. RAID 2023: 471-484 - 2022
- [c48]Takeshi Okamoto:
Prevention of DoS Attacks on Use-After-Free Vulnerabilities in Mosquitto. KES 2022: 1763-1772 - 2021
- [c47]Shu Akabane, Takeshi Okamoto:
Identification of toolchains used to build IoT malware with statically linked libraries. KES 2021: 5130-5138 - 2020
- [c46]Shu Akabane, Takeshi Okamoto:
Identification of library functions statically linked to Linux malware without symbols. KES 2020: 3436-3445
2010 – 2019
- 2019
- [j21]Idris Winarno
, Yoshiteru Ishida, Takeshi Okamoto:
A Performance Evaluation of Resilient Server with a Self-Repair Network Model. Mob. Networks Appl. 24(3): 1095-1103 (2019) - [c45]Shu Akabane, Tomoya Miwa, Takeshi Okamoto:
An EAF guard driver to prevent shellcode from removing guard pages. KES 2019: 2432-2439 - 2018
- [j20]Takeshi Okamoto, Mitsunobu Tarao:
An artificial immunity-enhancing module for internet servers against cyberattacks. Artif. Life Robotics 23(3): 292-297 (2018) - [c44]Takeshi Okamoto, Mitsunobu Tarao:
Implementation and evaluation of an immunity-enhancing module for ISC BIND9. KES 2018: 1405-1414 - [i9]Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto:
A k-out-of-n Ring Signature with Flexible Participation for Signers. IACR Cryptol. ePrint Arch. 2018: 728 (2018) - 2017
- [j19]Seiji Okamoto, Kazushige Yonenaga, Kengo Horikoshi, Mitsuteru Yoshida, Yutaka Miyamoto, Masahito Tomizawa, Takeshi Okamoto, Hidemi Noguchi, Jun-ichi Abe, Junichiro Matsui, Hisao Nakashima, Yuichi Akiyama, Takeshi Hoshida
, Hiroshi Onaka, Kenya Sugihara, Soichiro Kametani, Kazuo Kubo, Takashi Sugihara:
400Gbit/s/ch Field Demonstration of Modulation Format Adaptation Based on Pilot-Aided OSNR Estimation Using Real-Time DSP. IEICE Trans. Commun. 100-B(10): 1726-1733 (2017) - [c43]Mitsunobu Tarao, Takeshi Okamoto:
Performance evaluation of an immunity-enhancing module for server applications. KES 2017: 2165-2174 - [c42]Takeshi Okamoto:
Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers. KES 2017: 2319-2327 - 2016
- [j18]Fumikazu Sano, Takeshi Okamoto, Idris Winarno
, Yoshikazu Hata, Yoshiteru Ishida:
A cyber attack-resilient server inspired by biological diversity. Artif. Life Robotics 21(3): 345-350 (2016) - [j17]Takeshi Okamoto, Mitsunobu Tarao:
Toward an artificial immune server against cyber attacks. Artif. Life Robotics 21(3): 351-356 (2016) - [c41]Mitsunobu Tarao, Takeshi Okamoto:
Toward an Artificial Immune Server against Cyber Attacks: Enhancement of Protection against DoS Attacks. KES 2016: 1137-1146 - [c40]Fumikazu Sano, Takeshi Okamoto, Idris Winarno
, Yoshikazu Hata, Yoshiteru Ishida:
A Cyber Attack-Resilient Server Using Hybrid Virtualization. KES 2016: 1627-1636 - [c39]Idris Winarno
, Takeshi Okamoto, Yoshikazu Hata, Yoshiteru Ishida:
Increasing the Diversity of Resilient Server Using Multiple Virtualization Engines. KES 2016: 1701-1709 - 2015
- [c38]Takeshi Okamoto:
SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks. KES 2015: 691-699 - [c37]Michitomo Yamaguchi, Takeshi Okamoto, Hiroaki Kikuchi:
CAPTCHA System by Differentiating the Awkwardness of Objects. NBiS 2015: 257-263 - 2014
- [c36]Michitomo Yamaguchi, Toru Nakata
, Takeshi Okamoto, Hiroaki Kikuchi:
An Accessible CAPTCHA System for People with Visual Disability - Generation of Human/Computer Distinguish Test with Documents on the Net. HCI (7) 2014: 119-130 - [c35]Michitomo Yamaguchi, Toru Nakata
, Hajime Watanabe, Takeshi Okamoto, Hiroaki Kikuchi:
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people. SMC 2014: 3946-3951 - 2012
- [j16]Manabu Arikawa
, Takeshi Okamoto, Mitsunori Muraki, Daisaku Ogasahara, Emmanuel Le Taillandier de Gabory
, Toshiharu Ito, Kiyoshi Fukuchi:
Transmission of a 127 Gb/s PM-QPSK Signal Over a 3350 km SMF-Only Line With Chromatic Dispersion Compensation Using Real-Time DSP [Invited]. JOCN 4(11): B161-B167 (2012) - 2011
- [j15]Takeshi Okamoto:
An artificial intelligence membrane to detect network intrusion. Artif. Life Robotics 16(1): 44-47 (2011) - [j14]Takeshi Okamoto, Yoshiteru Ishida:
Towards an immunity-based anomaly detection system for network traffic. Int. J. Knowl. Based Intell. Eng. Syst. 15(4): 215-225 (2011) - [j13]Haruki Shida, Takeshi Okamoto, Yoshiteru Ishida:
Immunity-Based Diagnosis for a Motherboard. Sensors 11(4): 4462-4473 (2011) - [c34]Haruki Shida, Takeshi Okamoto:
A Vulnerability Remediation Support System Using a Peer-to-Peer Network. KES (4) 2011: 298-307 - 2010
- [j12]Takeshi Okamoto, Yoshiteru Ishida:
Evaluations for immunity-based anomaly detection with dynamic updating of profiles. Artif. Life Robotics 15(2): 225-228 (2010) - [j11]Jean-Luc Beuchat
, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [j10]Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Strongly unforgeable ID-based signatures without random oracles. Int. J. Appl. Cryptogr. 2(1): 35-45 (2010) - [c33]Raylin Tso
, Xun Yi, Tadahiko Ito, Takeshi Okamoto, Eiji Okamoto:
Design and Analysis of "Flexible" k-out-of-n Signatures. ATC 2010: 255-267 - [c32]Haruki Shida, Takeshi Okamoto, Yoshiteru Ishida:
Evaluations of Immunity-Based Diagnosis for a Motherboard. KES (3) 2010: 628-636
2000 – 2009
- 2009
- [j9]Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Sender Authenticated Key Agreements without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1787-1794 (2009) - [j8]Takeshi Okamoto, Yoshiteru Ishida:
Towards an immunity-based system for detecting masqueraders. Int. J. Knowl. Based Intell. Eng. Syst. 13(3-4): 103-110 (2009) - [j7]Takeshi Okamoto, Yoshiteru Ishida:
An Immunity-Based Anomaly Detection System with Sensor Agents. Sensors 9(11): 9175-9195 (2009) - [c31]Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Strongly Unforgeable ID-Based Signatures without Random Oracles. ISPEC 2009: 35-46 - [c30]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Efficient Short Signatures from Pairing. ITNG 2009: 417-422 - [i8]Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Underlying Assumptions and Designated Verifier Signatures. IACR Cryptol. ePrint Arch. 2009: 499 (2009) - 2008
- [j6]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Secur. Commun. Networks 1(2): 179-189 (2008) - [c29]Atsushi Koide, Raylin Tso
, Takeshi Okamoto, Eiji Okamoto:
A Restricted Undeniable Designated Verifier Signature. APSCC 2008: 1375-1380 - [c28]Hideyuki Tanaka, Takeshi Okamoto:
Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography. II3E 2008: 265-277 - [c27]Raylin Tso
, Xun Yi, Takeshi Okamoto, Eiji Okamoto:
Efficient convertible Limited Verifier Signatures. ISIT 2008: 230-234 - [c26]Raylin Tso
, Takeshi Okamoto, Eiji Okamoto:
1-out-of-. ISPEC 2008: 45-55 - [c25]Takeshi Okamoto, Yoshiteru Ishida:
Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System. KES (3) 2008: 456-464 - [i7]Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Strongly Unforgeable ID-based Signatures Without Random Oracles. IACR Cryptol. ePrint Arch. 2008: 95 (2008) - [i6]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2008: 280 (2008) - 2007
- [j5]Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi:
An ID-SP-M4M Scheme and Its Security Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 91-100 (2007) - [c24]Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
Efficient ID-Based Digital Signatures with Message Recovery. CANS 2007: 47-59 - [c23]Raylin Tso
, Takeshi Okamoto, Eiji Okamoto:
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Inscrypt 2007: 11-24 - [c22]Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto:
Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMACC 2007: 403-421 - [c21]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
An Improved Signcryption Scheme and Its Variation. ITNG 2007: 772-778 - [c20]Takeshi Okamoto, Yoshiteru Ishida:
Framework of an Immunity-Based Anomaly Detection System for User Behavior. KES (3) 2007: 821-829 - [e1]Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto:
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4575, Springer 2007, ISBN 978-3-540-73488-8 [contents] - 2006
- [j4]Lihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto:
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 106-114 (2006) - [j3]Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
How to Verify the Threshold t of Shamir's (t, n)-Threshold Scheme. Inf. Media Technol. 1(1): 102-111 (2006) - [j2]Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment. Inf. Media Technol. 1(1): 606-614 (2006) - [c19]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149 - [c18]Takeshi Okamoto, Yoshiteru Ishida:
Towards an Immunity-Based Anomaly Detection System for Network Traffic. KES (2) 2006: 123-130 - [i5]Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing. IACR Cryptol. ePrint Arch. 2006: 195 (2006) - [i4]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2006: 328 (2006) - [i3]Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. IACR Cryptol. ePrint Arch. 2006: 344 (2006) - 2005
- [c17]Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42 - [c16]Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203 - [c15]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. CISC 2005: 113-127 - [c14]Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
A Proposal of Short Proxy Signature using Pairing. ITCC (1) 2005: 631-635 - [c13]Takeshi Okamoto:
A Worm Filter Based on the Number of Unacknowledged Requests. KES (2) 2005: 93-99 - [c12]Eiji Okamoto, Takeshi Okamoto:
Cryptosystems Based on Elliptic Curve Pairing. MDAI 2005: 13-23 - [c11]Takeshi Okamoto, Raylin Tso, Eiji Okamoto:
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. MDAI 2005: 122-133 - [c10]Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi:
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. WCC 2005: 291-303 - [i2]Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamoto:
On Designatedly Verified (Non-interactive) Watermarking Schemes. IACR Cryptol. ePrint Arch. 2005: 120 (2005) - [i1]Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment. IACR Cryptol. ePrint Arch. 2005: 239 (2005) - 2004
- [c9]Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
Anonymous traceable disclosure scheme using pairing over elliptic curve. InfoSecu 2004: 48-52 - [c8]Lihua Wang, Zhenfu Cao, Eiji Okamoto, Ying Miao, Takeshi Okamoto:
Transformation-free proxy cryptosystems and their applications to electronic commerce. InfoSecu 2004: 92-98 - [c7]Takeshi Okamoto, Takayuki Watanabe, Yoshiteru Ishida:
Mechanism for Generating Immunity-Based Agents that Detect Masqueraders. KES 2004: 534-540 - 2003
- [c6]Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto:
A Fast Signature Scheme Based on New On-line Computation. ISC 2003: 111-121 - [c5]Takeshi Okamoto, Takayuki Watanabe, Yoshiteru Ishida:
Towards an Immunity-Based System for Detecting Masqueraders. KES 2003: 488-495 - 2002
- [j1]Takeshi Okamoto, Yoshiteru Ishida:
An analysis of a model of computer viruses spreading via electronic mail. Syst. Comput. Jpn. 33(14): 81-90 (2002) - [c4]Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
:
An Improved Fast Signature Scheme without Online Multiplication. Financial Cryptography 2002: 152-167 - 2001
- [c3]Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
:
Efficient "on the Fly" Signature Schemes Based on Integer Factoring. INDOCRYPT 2001: 275-286
1990 – 1999
- 1999
- [c2]Takeshi Okamoto, Yoshiteru Ishida:
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. ISADS 1999: 328-331 - [c1]Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto:
Extended Proxy Signatures for Smart Cards. ISW 1999: 247-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint