BibTeX records: Koji Okada

download as .bib file

@inproceedings{DBLP:conf/iiaiaai/KawanamiHO20,
  author       = {Shu Kawanami and
                  Ken Hidema and
                  Koji Okada},
  editor       = {Tokuro Matsuo and
                  Kunihiko Takamatsu and
                  Yuichi Ono and
                  Sachio Hirokawa},
  title        = {Proposal of a Method Extracting Strategic Phrases from Japanese Enterprise
                  Disclosure Documents},
  booktitle    = {9th International Congress on Advanced Applied Informatics, {IIAI-AAI}
                  2020, Kitakyushu, Japan, September 1-15, 2020},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IIAI-AAI50415.2020.00106},
  doi          = {10.1109/IIAI-AAI50415.2020.00106},
  timestamp    = {Thu, 20 May 2021 15:42:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/KawanamiHO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/OkadaNTH18,
  author       = {Koji Okada and
                  Hayato Nishizono and
                  Kosuke Tsubouchi and
                  Tatsuya Hirukawa},
  title        = {Proposal of a Method to Understand and Model Dynamic Mechanisms Existing
                  in Business Context},
  booktitle    = {7th International Congress on Advanced Applied Informatics, {IIAI-AAI}
                  2018, Yonago, Japan, July 8-13, 2018},
  pages        = {781--786},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IIAI-AAI.2018.00161},
  doi          = {10.1109/IIAI-AAI.2018.00161},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/OkadaNTH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/OshimaO17,
  author       = {Ayaka Oshima and
                  Koji Okada},
  title        = {Estimation of Risk Countermeasure Effects Based Upon Project-Behavior
                  Simulation System},
  booktitle    = {6th {IIAI} International Congress on Advanced Applied Informatics,
                  {IIAI-AAI} 2017, Hamamatsu, Japan, July 9-13, 2017},
  pages        = {307--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/IIAI-AAI.2017.86},
  doi          = {10.1109/IIAI-AAI.2017.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiaiaai/OshimaO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HayashiMYFO11,
  author       = {Ryotaro Hayashi and
                  Tatsuyuki Matsushita and
                  Takuya Yoshida and
                  Yoshihiro Fujii and
                  Koji Okada},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy
                  Re-Encryption},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {210--229},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_14},
  doi          = {10.1007/978-3-642-25141-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HayashiMYFO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoshidaO08,
  author       = {Takuya Yoshida and
                  Koji Okada},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {83--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_6},
  doi          = {10.1007/978-3-540-89598-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoshidaO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KishimotoOKO02,
  author       = {Wataru Kishimoto and
                  Koji Okada and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {On the bound for anonymous secret sharing schemes},
  journal      = {Discret. Appl. Math.},
  volume       = {121},
  number       = {1-3},
  pages        = {193--202},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0166-218X(01)00236-0},
  doi          = {10.1016/S0166-218X(01)00236-0},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KishimotoOKO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/OkadaK00,
  author       = {Koji Okada and
                  Kaoru Kurosawa},
  title        = {{MDS} secret-sharing scheme secure against cheaters},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {1078--1081},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841188},
  doi          = {10.1109/18.841188},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/OkadaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaOSS98,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Hajime Saido and
                  Douglas R. Stinson},
  title        = {New Combinatorial Bounds for Authentication Codes and Key Predistribution
                  Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {15},
  number       = {1},
  pages        = {87--100},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008229625895},
  doi          = {10.1023/A:1008229625895},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaOSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KurosawaO96,
  author       = {Kaoru Kurosawa and
                  Koji Okada},
  title        = {Combinatorial Lower Bounds for Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {60},
  number       = {6},
  pages        = {301--304},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0020-0190(96)00178-0},
  doi          = {10.1016/S0020-0190(96)00178-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KurosawaO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KurosawaOT95,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Shigeo Tsujii},
  title        = {Low Exponent Attack Against Elliptic Curve {RSA}},
  journal      = {Inf. Process. Lett.},
  volume       = {53},
  number       = {2},
  pages        = {77--83},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(94)00179-3},
  doi          = {10.1016/0020-0190(94)00179-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KurosawaOT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkadaK94,
  author       = {Koji Okada and
                  Kaoru Kurosawa},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {33--41},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000422},
  doi          = {10.1007/BFB0000422},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkadaK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaO94,
  author       = {Kaoru Kurosawa and
                  Koji Okada},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Combinatorial Interpretation of Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {55--64},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000424},
  doi          = {10.1007/BFB0000424},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaOS94,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Keiichi Sakano},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Security of the Center in Key Distribution Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {333--341},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000445},
  doi          = {10.1007/BFB0000445},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaOS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaOT94,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Shigeo Tsujii},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Low Exponent Attack against Elliptic Curve {RSA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {376--383},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000449},
  doi          = {10.1007/BFB0000449},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaOT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaOSOT93,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Keiichi Sakano and
                  Wakaha Ogata and
                  Shigeo Tsujii},
  editor       = {Tor Helleseth},
  title        = {Nonperfect Secret Sharing Schemes and Matroids},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_11},
  doi          = {10.1007/3-540-48285-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaOSOT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/FutatsugiGMO87,
  author       = {Kokichi Futatsugi and
                  Joseph A. Goguen and
                  Jos{\'{e}} Meseguer and
                  Koji Okada},
  editor       = {William E. Riddle and
                  Robert M. Balzer and
                  Kouichi Kishida},
  title        = {Parameterized Programming in {OBJ2}},
  booktitle    = {Proceedings, 9th International Conference on Software Engineering,
                  Monterey, California, USA, March 30 - April 2, 1987},
  pages        = {51--60},
  publisher    = {{ACM} Press},
  year         = {1987},
  url          = {http://dl.acm.org/citation.cfm?id=41772},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/FutatsugiGMO87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/FutatsugiO82,
  author       = {Kokichi Futatsugi and
                  Koji Okada},
  editor       = {Yutaka Ohno and
                  Victor R. Basili and
                  Hajime Enomoto and
                  Koji Kobayashi and
                  Raymond T. Yeh},
  title        = {A Hierarchical Structuring Method for Functional Software Systems},
  booktitle    = {Proceedings, 6th International Conference on Software Engineering,
                  Tokyo, Japan, September 13-16, 1982},
  pages        = {393--402},
  publisher    = {{IEEE} Computer Society},
  year         = {1982},
  url          = {http://dl.acm.org/citation.cfm?id=807782},
  timestamp    = {Mon, 14 May 2012 18:17:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/FutatsugiO82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/FutatsugiO80,
  author       = {Kokichi Futatsugi and
                  Koji Okada},
  editor       = {Simon H. Lavington},
  title        = {Specification Writing as Construction of Hierarchically Structured
                  Clusters of Operators},
  booktitle    = {Information Processing, Proceedings of the 8th {IFIP} Congress 1980,
                  Tokyo, Japan - October 6-9, 1980 and Melbourne, Australia - October
                  14-17, 1980},
  pages        = {287--292},
  publisher    = {North-Holland/IFIP},
  year         = {1980},
  timestamp    = {Fri, 26 Jul 2019 22:58:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/FutatsugiO80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics