default search action
Atsuo Inomata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c30]Yuuki Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara:
On Collecting Onion Server Fingerprints and Identification of Their Operators. QRS Companion 2023: 540-548 - 2022
- [j13]Hoang Viet Nguyen, Junjun Zheng, Atsuo Inomata, Tetsutaro Uehara:
Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code. IEEE Access 10: 123786-123800 (2022) - [j12]Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori:
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework. Proc. Priv. Enhancing Technol. 2022(4): 140-161 (2022) - 2021
- [j11]Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata:
A Secure Cloud-centric IoT Framework for Smart Device Registration. J. Inf. Process. 29: 381-391 (2021) - [j10]Daiki Yamakawa, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara:
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. Secur. Commun. Networks 2021: 6610863:1-6610863:14 (2021) - [j9]Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata:
Migrating to Zero Trust Architecture: Reviews and Challenges. Secur. Commun. Networks 2021: 9947347:1-9947347:10 (2021) - [c29]Hai Ngoc Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara:
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. ICISSP 2021: 109-120 - [c28]Hoang Viet Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara:
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. ICISSP 2021: 440-449 - 2020
- [c27]Jiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata:
Evaluation to Classify Ransomware Variants based on Correlations between APIs. ICISSP 2020: 465-472
2010 – 2019
- 2019
- [c26]Yuki Fujita, Atsuo Inomata, Hiroki Kashiwazaki:
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB. APNOMS 2019: 1-4 - 2018
- [e1]Atsuo Inomata, Kan Yasuda:
Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings. Lecture Notes in Computer Science 11049, Springer 2018, ISBN 978-3-319-97915-1 [contents] - 2017
- [j8]Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa:
A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 62-72 (2017) - [j7]Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa:
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM. IEEE Trans. Computers 66(12): 2019-2030 (2017) - [c25]Ryota Jinnai, Atsuo Inomata, Ismail Arai, Kazutoshi Fujikawa:
Proposal of hardware device model for IoT endpoint security and its implementation. PerCom Workshops 2017: 91-93 - 2016
- [c24]Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa:
A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate. ICISSP 2016: 432-439 - [i3]Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa:
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM. IACR Cryptol. ePrint Arch. 2016: 365 (2016) - 2015
- [j6]Chien-Lung Hsu, Atsuo Inomata, Sk. Md. Mizanur Rahman, Fatos Xhafa, Laurence T. Yang:
Security, Privacy, and Applications in Mobile Healthcare. Int. J. Distributed Sens. Networks 11: 675129:1-675129:2 (2015) - [c23]Naohiro Washio, Satoshi Matsuura, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa:
A vehicle clustering algorithm for information propagation by inter-vehicle communications. PerCom Workshops 2015: 111-116 - 2013
- [j5]Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara:
Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking. IEICE Trans. Commun. 96-B(7): 1706-1715 (2013) - [c22]Tatsuya Fukui, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa:
A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing. AINA Workshops 2013: 749-756 - [c21]Yohei Kanemaru, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa:
TrafficCam: Sharing traffic information based on dynamic IPv6 multicast group assignment using smartphone sensors. CCNC 2013: 853-854 - [c20]Yohei Kanemaru, Satoshi Matsuura, Masatoshi Kakiuchi, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa:
Vehicle clustering algorithm for sharing information on traffic congestion. ITST 2013: 38-43 - [c19]Tsubasa Teramoto, Satoshi Matsuura, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa:
Location tracking prevention with dummy messages for vehicular communications. ITST 2013: 56-61 - 2012
- [j4]Satoru Noguchi, Manabu Tsukada, Thierry Ernst, Atsuo Inomata, Kazutoshi Fujikawa:
Design and field evaluation of geographical location-aware service discovery on IPv6 GeoNetworking for VANET. EURASIP J. Wirel. Commun. Netw. 2012: 29 (2012) - [c18]Yoshihiro Okamoto, Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa:
Koshien-Cloud: Operations of Distributed Cloud as a Large Scale Web Contents Distribution Platform. SAINT 2012: 363-368 - [c17]Ryota Miyagi, Satoshi Matsuura, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa:
A Divide and Merge Method for Sensor Data Processing on Large-Scale Publish/Subscribe Systems. SAINT 2012: 424-429 - 2011
- [c16]Atsuo Inomata, Hironobu Suzuki, Yoshiaki Kitaguchi, Hiroyuki Ohno:
Communication trials for Self-Mutual Help on the emergency situations in ∊-ARK. CCNC 2011: 848-849 - [c15]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata:
Session-wise private data exchange in eHealth peer-to-peer database management systems. ISI 2011: 204-206 - [c14]Noriaki Yoshikai, Shun-ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata:
Experimental Research on Personal Awareness and Behavior for Information Security Protection. NBiS 2011: 213-220 - [c13]Atsuo Inomata, Taiki Morikawa, Minoru Ikebe, Yoshihiro Okamoto, Satoru Noguchi, Kazutoshi Fujikawa, Hideki Sunahara, Sk. Md. Mizanur Rahman:
Proposal and Evaluation of a Dynamic Resource Allocation Method Based on the Load of VMs on IaaS. NTMS 2011: 1-6 - 2010
- [j3]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [c12]Atsuo Inomata, Hironobu Suzuki, Hiroyuki Ohno:
The ε-ARK Device Family for the Emergency Situations. CCNC 2010: 1-2 - [c11]Naomi Terada, Eiji Kominami, Atsuo Inomata, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara:
Proposal of Smooth Switching Mechanism on P2P Streaming. DCAI 2010: 181-184
2000 – 2009
- 2009
- [c10]Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara:
Efficient Data Management using the Session Log in DHT and its Evaluation. CCNC 2009: 1-5 - [c9]Minoru Ikebe, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara:
MetaFa: Metadata Management Framework for Data Sharing in Data-Intensive Applications. IWANN (2) 2009: 655-658 - [c8]Akira Yutani, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa, Yoshitsugu Manabe, Kunihiro Chihara, Keishi Kandori:
Total solar eclipse: fish-eye 4K image transmission experimentation on the internet. SIGGRAPH ASIA Posters 2009: 27:1 - [c7]Masatoshi Kakiuchi, Akira Yutani, Atsuo Inomata, Kazutoshi Fujikawa, Keishi Kandori:
Uncompressed 4K2K and HD live transmission on global internet. SIGGRAPH ASIA Posters 2009: 28:1 - 2008
- [j2]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Secur. Commun. Networks 1(2): 179-189 (2008) - [c6]Minoru Ikebe, Atsuo Inomata, Kazutoshi Fujikawa, Hideki Sunahara:
Distributed data access/find system with metadata for data-intensive computing. GRID 2008: 361-366 - [c5]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata:
Private Communication and Authentication Protocol for Wireless Sensor Networks. NTMS 2008: 1-6 - [i2]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2008: 280 (2008) - 2006
- [j1]Sk. Md. Mizanur Rahman, Atsuo Inomata, Masahiro Mambo, Eiji Okamoto:
Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks. Inf. Media Technol. 1(2): 1191-1203 (2006) - [c4]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149 - [c3]Sk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto:
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306 - [i1]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2006: 328 (2006) - 2005
- [c2]Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
A Proposal of Short Proxy Signature using Pairing. ITCC (1) 2005: 631-635 - 2004
- [c1]Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
Anonymous traceable disclosure scheme using pairing over elliptic curve. InfoSecu 2004: 48-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 22:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint