面 和成(オモテ カズマサ)

研究者情報全体を表示

会議発表等
  • A Secure Contact Tracing Method Using Blockchain for Criminal Investigation
    Tsuchida Mizuki; OMOTE Kazumasa
    17th International Conference on Security of Information and Networks (SIN 2024)/2024/12-02--2024/12/04
  • Analysis of Papers and Patents in the Blockchain Field Using e-CSTI
    OMOTE Kazumasa; Ikeda Torazo; Kono Eiko; Nagai Hiroak...
    6th International Conference on Blockchain Computing and Applications (BCCA 2024)/2024/11-26--2024/11-29
  • Is a Blockchain-Based Ticket Without NFTs Useful?
    OMOTE Kazumasa
    11th International Conference on Consumer Electronics - Taiwan (ICCE-TW 2024)/2024/06-9--2024/06-11
  • 連合学習の地震動予測モデルへの適用
    鷲尾友康; 赤木翔; 鈴木里奈; 早川俊彦; 面 和成
    コンピュータセキュリティ研究会2024-CSEC-108(70)/2025-03-17--2025-03-18
  • 複数のブロックチェーンを用いたトレーサビリティシステムの提案
    角杉蒼依; 面 和成
    コンピュータセキュリティ研究会,2024-CSEC-108(15)/2025-03-17--2025-03-18
  • ブロックチェーンと耐タンパーデバイスを活用した医療情報共有システム
    松本 太一; 髙橋 大成; 面 和成
    コンピュータセキュリティ研究会,2024-CSEC-108(13)/2025-03-17--2025-03-18
  • スマートコントラクトと証明者限定署名を用いた委譲不可署名検証システム
    西野 陽大; 江村 恵太; 面 和成
    暗号と情報セキュリティシンポジウム (SCIS 2025)/2025-01-28--2025-01-31
  • IDベース署名を用いたバニティアドレス生成手法の検討
    村崎 翔梧; 面 和成; 江村 恵太
    暗号と情報セキュリティシンポジウム (SCIS 2025)/2025-01-28--2025-01-31
  • 不正なトランザクションの発行を防ぐコールドウォレットシステムの提案
    小林 紘也; 面 和成
    2024-CSEC-107(28)/2024/12-03--2024/12-04
  • 自由投票と監査可能性を両立するブロックチェーンベース電子投票スキームの提案
    萩原 健太; 面 和成
    2024-CSEC-107(27)/2024/12-03--2024/12-04
  • リンカビリティを強化したNFT検証方式に向けて
    Samuel Sanjaya; 面 和成
    2024-CSEC-107(26)/2024/12-03--2024/12-04
  • Toward the Application of Differential Privacy to Data Collaboration
    Yamashiro Hiromi; OMOTE Kazumasa; Imakura Akira; Sakur...
    IEEE Access/2024-05
  • An Efficient Blockchain-based Authentication Scheme with Transferability
    Xiushu Jin; OMOTE Kazumasa
    PLoS ONE/2024-09--2024-09
  • Emergency Medical Access Control System Based on Public Blockchain
    Takahashi Taisei; Zhihao Yan; Omote Kazumasa
    Journal of Medical Systems/2024-09--2024-09
  • An Intrinsic Evaluator for Embedding Methods in Malicious URL
    Qisheng Chen; OMOTE Kazumasa
    International Journal of Information Security/2024-12--2024-12
  • A Machine Learning Based Three-Step Framework for Malicious URL Detection
    Qisheng Chen; OMOTE Kazumasa
    Journal of Information Processing/2024-12
  • Estimating the Popularity of Company Using Academic Credential NFT
    Keigo Yanai; Taisei Takahashi; 面 和成
    Proceedings of the 9th International Conference on Intelligent Information Technology/2024-02-23--2024-02-25
  • The Validator's Dilemma in PoW Blockchain: An Evolutionary Game Perspective
    Liang Liu; Qiao Wang; Turnbull John; Omote Kazumasa
    Proceedings of the 6th IEEE International Conference on Blockchain/2023-12-17--2023-12-21
  • Efficient Authentication System Based on Blockchain Using eID Card
    Liang Liu; Omote Kazumasa
    6th IEEE International Conference on Blockchain/2023-12-17--2023-12-21
  • Toward Achieving Anonymous Non-Fungible Tokens in Trustless Environment
    Omote Kazumasa
    Proceedings of the 6th International Conference on Blockchain Technology and Applications/2023-12-15--2023-12-17
  • Is the Blockchain Useful for Sharing Sensitive Data?
    Omote Kazumasa
    12th Global Conference on Consumer Electronics/2023-10-10--2023-10-13
  • A Secure Contact Tracing Method Using Smart Contracts with Considering Privacy
    Omote Kazumasa
    International Conference on Blockchain/2023-09-23--2023-09-26
  • VMI System with Smart Contracts for Demand Forecasting
    Omote Kazumasa
    18th Asia Joint Conference on Information Security/2023-08-15--2023-08-16
  • Security Education Using Screen Reader: Utilizing a Problem-Posing Approach
    Masataka Kakinouchi; Omote Kazumasa
    21st International Conference on Security and Management/2023-07-24--2023-07-27
  • Empirical Analysis of Cryptocurrency Mixer: Tornado Cash
    Youn Minwoo; Chin Kota; Omote Kazumasa
    21st International Conference on Security and Management/2023-07-24--2023-07-27
  • さらに表示...