Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Koji Okada
@inproceedings{DBLP:conf/iiaiaai/KawanamiHO20, author = {Shu Kawanami and Ken Hidema and Koji Okada}, editor = {Tokuro Matsuo and Kunihiko Takamatsu and Yuichi Ono and Sachio Hirokawa}, title = {Proposal of a Method Extracting Strategic Phrases from Japanese Enterprise Disclosure Documents}, booktitle = {9th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2020, Kitakyushu, Japan, September 1-15, 2020}, pages = {506--511}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IIAI-AAI50415.2020.00106}, doi = {10.1109/IIAI-AAI50415.2020.00106}, timestamp = {Thu, 20 May 2021 15:42:15 +0200}, biburl = {https://dblp.org/rec/conf/iiaiaai/KawanamiHO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/OkadaNTH18, author = {Koji Okada and Hayato Nishizono and Kosuke Tsubouchi and Tatsuya Hirukawa}, title = {Proposal of a Method to Understand and Model Dynamic Mechanisms Existing in Business Context}, booktitle = {7th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2018, Yonago, Japan, July 8-13, 2018}, pages = {781--786}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IIAI-AAI.2018.00161}, doi = {10.1109/IIAI-AAI.2018.00161}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/iiaiaai/OkadaNTH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/OshimaO17, author = {Ayaka Oshima and Koji Okada}, title = {Estimation of Risk Countermeasure Effects Based Upon Project-Behavior Simulation System}, booktitle = {6th {IIAI} International Congress on Advanced Applied Informatics, {IIAI-AAI} 2017, Hamamatsu, Japan, July 9-13, 2017}, pages = {307--312}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/IIAI-AAI.2017.86}, doi = {10.1109/IIAI-AAI.2017.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/OshimaO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HayashiMYFO11, author = {Ryotaro Hayashi and Tatsuyuki Matsushita and Takuya Yoshida and Yoshihiro Fujii and Koji Okada}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {210--229}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_14}, doi = {10.1007/978-3-642-25141-2\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HayashiMYFO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoshidaO08, author = {Takuya Yoshida and Koji Okada}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {83--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_6}, doi = {10.1007/978-3-540-89598-5\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoshidaO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KishimotoOKO02, author = {Wataru Kishimoto and Koji Okada and Kaoru Kurosawa and Wakaha Ogata}, title = {On the bound for anonymous secret sharing schemes}, journal = {Discret. Appl. Math.}, volume = {121}, number = {1-3}, pages = {193--202}, year = {2002}, url = {https://doi.org/10.1016/S0166-218X(01)00236-0}, doi = {10.1016/S0166-218X(01)00236-0}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KishimotoOKO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/OkadaK00, author = {Koji Okada and Kaoru Kurosawa}, title = {{MDS} secret-sharing scheme secure against cheaters}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {1078--1081}, year = {2000}, url = {https://doi.org/10.1109/18.841188}, doi = {10.1109/18.841188}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/OkadaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaOSS98, author = {Kaoru Kurosawa and Koji Okada and Hajime Saido and Douglas R. Stinson}, title = {New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes}, journal = {Des. Codes Cryptogr.}, volume = {15}, number = {1}, pages = {87--100}, year = {1998}, url = {https://doi.org/10.1023/A:1008229625895}, doi = {10.1023/A:1008229625895}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaOSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KurosawaO96, author = {Kaoru Kurosawa and Koji Okada}, title = {Combinatorial Lower Bounds for Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {60}, number = {6}, pages = {301--304}, year = {1996}, url = {https://doi.org/10.1016/S0020-0190(96)00178-0}, doi = {10.1016/S0020-0190(96)00178-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KurosawaO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KurosawaOT95, author = {Kaoru Kurosawa and Koji Okada and Shigeo Tsujii}, title = {Low Exponent Attack Against Elliptic Curve {RSA}}, journal = {Inf. Process. Lett.}, volume = {53}, number = {2}, pages = {77--83}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(94)00179-3}, doi = {10.1016/0020-0190(94)00179-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KurosawaOT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkadaK94, author = {Koji Okada and Kaoru Kurosawa}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {33--41}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000422}, doi = {10.1007/BFB0000422}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkadaK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaO94, author = {Kaoru Kurosawa and Koji Okada}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Combinatorial Interpretation of Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {55--64}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000424}, doi = {10.1007/BFB0000424}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaOS94, author = {Kaoru Kurosawa and Koji Okada and Keiichi Sakano}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Security of the Center in Key Distribution Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {333--341}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000445}, doi = {10.1007/BFB0000445}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaOS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaOT94, author = {Kaoru Kurosawa and Koji Okada and Shigeo Tsujii}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Low Exponent Attack against Elliptic Curve {RSA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {376--383}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000449}, doi = {10.1007/BFB0000449}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaOT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaOSOT93, author = {Kaoru Kurosawa and Koji Okada and Keiichi Sakano and Wakaha Ogata and Shigeo Tsujii}, editor = {Tor Helleseth}, title = {Nonperfect Secret Sharing Schemes and Matroids}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {126--141}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_11}, doi = {10.1007/3-540-48285-7\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaOSOT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/FutatsugiGMO87, author = {Kokichi Futatsugi and Joseph A. Goguen and Jos{\'{e}} Meseguer and Koji Okada}, editor = {William E. Riddle and Robert M. Balzer and Kouichi Kishida}, title = {Parameterized Programming in {OBJ2}}, booktitle = {Proceedings, 9th International Conference on Software Engineering, Monterey, California, USA, March 30 - April 2, 1987}, pages = {51--60}, publisher = {{ACM} Press}, year = {1987}, url = {http://dl.acm.org/citation.cfm?id=41772}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/FutatsugiGMO87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/FutatsugiO82, author = {Kokichi Futatsugi and Koji Okada}, editor = {Yutaka Ohno and Victor R. Basili and Hajime Enomoto and Koji Kobayashi and Raymond T. Yeh}, title = {A Hierarchical Structuring Method for Functional Software Systems}, booktitle = {Proceedings, 6th International Conference on Software Engineering, Tokyo, Japan, September 13-16, 1982}, pages = {393--402}, publisher = {{IEEE} Computer Society}, year = {1982}, url = {http://dl.acm.org/citation.cfm?id=807782}, timestamp = {Mon, 14 May 2012 18:17:19 +0200}, biburl = {https://dblp.org/rec/conf/icse/FutatsugiO82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/FutatsugiO80, author = {Kokichi Futatsugi and Koji Okada}, editor = {Simon H. Lavington}, title = {Specification Writing as Construction of Hierarchically Structured Clusters of Operators}, booktitle = {Information Processing, Proceedings of the 8th {IFIP} Congress 1980, Tokyo, Japan - October 6-9, 1980 and Melbourne, Australia - October 14-17, 1980}, pages = {287--292}, publisher = {North-Holland/IFIP}, year = {1980}, timestamp = {Fri, 26 Jul 2019 22:58:40 +0200}, biburl = {https://dblp.org/rec/conf/ifip/FutatsugiO80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.