default search action
Masaki Inamura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c24]Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal, Masaki Inamura:
TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server. AsiaCCS 2022: 1243-1245 - [c23]Yunosuke Noso, Keiichi Iwamura, Masaki Inamura:
Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers. CANDARW 2022: 344-350 - 2021
- [c22]Nozomi Nagashima, Masaki Inamura, Keiichi Iwamura:
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures. ICISSP 2021: 485-491 - 2020
- [c21]Tomohiro Kobayashi, Keiichi Iwamura, Masaki Inamura:
A Content Protection Method That Allows Commissioning of Editing Control Processing to a Third Party using a Proxy Signature. ICETE (3) 2020: 98-109 - [c20]Wataru Fujii, Keiichi Iwamura, Masaki Inamura:
Secure Comparison and Interval Test Protocols based on Three-party MPC. ICISSP 2020: 698-704
2010 – 2019
- 2019
- [c19]Tomohiro Kobayashi, Keiichi Iwamura, Masaki Inamura:
Content Protection Method to Control Editing by Billing. ICETE (1) 2019: 202-214 - [c18]Takuya Ezure, Masaki Inamura:
Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature. ICISSP (Revised Selected Papers) 2019: 121-136 - [c17]Takuya Ezure, Masaki Inamura:
An Order-specified Aggregate Authority-transfer Signature. ICISSP 2019: 309-318 - 2018
- [j4]Yuji Hashimoto, Koji Nuida, Kazumasa Shinagawa, Masaki Inamura, Goichiro Hanaoka:
Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1503-1511 (2018) - [j3]Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka:
Secure Grouping Protocol Using a Deck of Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1512-1524 (2018) - [c16]Tatsunori Mochida, Masaki Inamura:
Personal Authentication Method based on Human Preference Prediction using Machine Learning. ICETE (1) 2018: 297-304 - 2017
- [j2]Naoto Yanai, Tomoya Iwasaki, Masaki Inamura, Keiichi Iwamura:
Provably Secure Structured Signature Schemes with Tighter Reductions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1870-1881 (2017) - [c15]Yuri Yoshino, Masaki Inamura:
Access Control of Webcam on PC with Prevention against Peeping by Attackers. CANDAR 2017: 529-532 - [c14]Daichi Tanaka, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda:
Deployment of Contents Protection Scheme using Digital Signature. ICE-B 2017: 130-137 - [c13]Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka:
Secure Grouping Protocol Using a Deck of Cards. ICITS 2017: 135-152 - [i1]Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka:
Secure Grouping Protocol Using a Deck of Cards. CoRR abs/1709.07785 (2017) - 2016
- [c12]Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura:
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption. AINA 2016: 669-676 - [c11]Moe Sasaki, Masaki Inamura:
Evaluation of Handwriting Characteristic for Two-factor Authentication Interface on Touch-pad Panel. ICE-B 2016: 106-111 - [c10]Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura:
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control. ICE-B 2016: 116-123 - [c9]Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura:
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control. ICETE (Selected Papers) 2016: 124-138 - 2015
- [c8]Kent Kobayashi, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use. ICE-B 2015: 41-48 - [c7]Katsuma Koga, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura:
Content Control Scheme to Realize Right Succession and Edit Control. ICE-B 2015: 249-256 - [c6]Masaki Inamura:
Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange. ICISSP 2015: 213-220 - 2013
- [j1]Masaki Inamura, Keiichi Iwamura:
Content Approval Systems with Expansions of a New Pair-Connected-Structured Aggregate Signature Scheme. Int. J. E Entrepreneurship Innov. 4(2): 15-37 (2013) - 2011
- [c5]Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka:
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. SECRYPT 2011: 362-369
2000 – 2009
- 2009
- [c4]Toshiyuki Fujisawa, Masaki Inamura, Toshiaki Tanaka:
Anonymous handover mechanism for service mobility in heterogeneous wireless networks. WCNC 2009: 2726-2731 - 2007
- [c3]Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka:
Anonymous Prepaid Content Viewing System with Mobile Terminal. SECRYPT 2007: 281-288 - [c2]Masaki Inamura, Toshiaki Tanaka:
Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. SECRYPT 2007: 427-432 - 2006
- [c1]Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura:
Flexible License Transfer System Using Mobile Terminal. SECRYPT 2006: 397-404
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint