Naonobu Okazaki
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j22]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker. IJNC 9(2): 318-338 (2019) - [j21]Tetsuro Katayama, Tatsumi Nishida, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit. JRNAL 5(4): 249-252 (2019) - [j20]Tetsuro Katayama, Toshihiro Miyaji, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar. JRNAL 6(2): 123-127 (2019) - [c31]Makoto Nagatomo, Kentaro Aburada, Hisaaki Yamaba, Naonobu Okazaki, Mirang Park:
Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration. AINA Workshops 2019: 683-692 - [c30]Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG. AINA Workshops 2019: 693-701 - [c29]Kazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Gait-Based Authentication for Smart Locks Using Accelerometers in Two Devices. NBiS 2019: 281-291 - [c28]Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files. NBiS 2019: 305-316 - [c27]Makoto Nagatomo, Kazuki Watanabe, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule. NBiS 2019: 560-569 - [c26]Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG. NBiS 2019: 570-580 - 2018
- [j19]Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Evaluation of Farmers Market Information System to Connect with Some Social Stakeholders. JIP 26: 247-256 (2018) - [j18]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method. JIP 26: 257-266 (2018) - [j17]Tetsuro Katayama, Keisuke Mori, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time. JRNAL 5(2): 114-117 (2018) - [c25]Ryohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks. EIDWT 2018: 870-879 - [c24]Tokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG. EIDWT 2018: 889-900 - [c23]Makoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance. EIDWT 2018: 978-989 - [c22]Kentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Index Poisoning Method in Large Scale Winny Network. EIDWT 2018: 999-1006 - [c21]Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns. CANDAR 2018: 207-212 - [c20]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer. CANDAR Workshops 2018: 310-315 - [c19]Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
An Examination of Pairing Method with Camera and Acceleration Sensor. ICMU 2018: 1-4 - [c18]Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki:
Interactive Video CAPTCHA for Better Resistance to Automated Attack. ICMU 2018: 1-2 - [c17]Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG. NBiS 2018: 733-742 - 2017
- [j16]Kentaroh Toyoda
, Mirang Park, Naonobu Okazaki, Tomoaki Ohtsuki:
Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation. IEEE Access 5: 6746-6756 (2017) - [j15]Tetsuro Katayama, Yuuki Kikkawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Development of a Tool to Keep Consistency between a Model and a Source Code in Software Development Using MDA. JRNAL 3(4): 231-235 (2017) - [j14]Tetsuro Katayama, Hiroki Tachiyama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
BWDM: Test Cases Automatic Generation Tool Based on Boundary Value Analysis with VDM++. JRNAL 4(2): 110-113 (2017) - [c16]Kentaro Aburada, Kengo Todaka, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki:
Development of a Monitoring System Based on Power Consumption. NBiS 2017: 363-372 - [c15]Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Kentaro Aburada, Naonobu Okazaki:
Evaluation and Improvement of Farmers Market Information System to Connect with Some Social Stakeholders. NBiS 2017: 431-442 - [c14]Takahiro Hori, Yoshihiro Kita, Kentaroh Toyoda, Naonobu Okazaki, Mirang Park:
Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices. NBiS 2017: 529-538 - [c13]Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method. NBiS 2017: 914-923 - 2016
- [c12]Kentaroh Toyoda, Mirang Park, Naonobu Okazaki:
Unsupervised SPITters Detection Scheme for Unbalanced Callers. AINA Workshops 2016: 64-68 - [c11]Jihoon Hong, Mirang Park, Naonobu Okazaki:
SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems. NBiS 2016: 146-151 - 2015
- [j13]Tetsuro Katayama, Shoichiro Kitano, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Testing Method Using Similarity of Interleaving for Java Multi-threaded Programs. JRNAL 1(4): 299-302 (2015) - [j12]Tetsuro Katayama, Seiya Urata, Yohei Ogata, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Prototype of a Supporting Tool to Generate Testing Communication Diagram. JRNAL 2(1): 9-12 (2015) - [j11]Hisaaki Yamaba, So Nagatomo, Kentaro Aburada, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device. JRNAL 2(1): 60-63 (2015) - [j10]Kentaro Aburada, Hisaaki Yamaba, Shin-Ichiro Kubota, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks. JRNAL 2(2): 120-124 (2015) - [j9]Tetsuro Katayama, Yuuki Kikkawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Modification Method of a Source Code to Correspond with a Modified Model in MDA. JRNAL 2(2): 135-139 (2015) - [j8]Tetsuro Katayama, Hiroto Nakamura, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
TFVIS: a Supporting Debugging Tool for Java Programs by Visualizing Data Transitions and Execution Flows. JRNAL 2(3): 177-181 (2015) - [j7]Naonobu Okazaki, Yoshihiro Kita, Kentaro Aburada, Mirang Park:
Security Evaluation System for Android Applications Using User's Reviews and Permissions. JRNAL 2(3): 190-193 (2015) - [j6]Tetsuro Katayama, Kenta Nishikawa, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Prototype of a Decision Table Generation Tool from the Formal Specification. JRNAL 2(3): 205-208 (2015) - [c10]Kentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Content Access Control Scheme for P2P Networks Using a Reputation Value. AINA 2015: 527-533 - [c9]Masahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Study of Filter Sharing Method Using Virtual Peers in P2P Networks. AINA 2015: 720-726 - [c8]Yoshihiro Kita, Mirang Park, Naonobu Okazaki:
Proposal of Rhythm Authentication Method Using Users Classification by Self-Organizing Map. NBiS 2015: 665-668 - 2014
- [j5]Tetsuro Katayama, Hiroto Nakamura, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki:
Proposal of a Visualizing Method of Data Transitions to Support Debugging for Java Programs. JRNAL 1(2): 111-115 (2014) - [j4]Tetsuro Katayama, Zhijia Zhao, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki:
Proposal of a Method to Build Markov Chain Usage Model from UML Diagrams for Communication Delay Testing in Distributed Systems. JRNAL 1(2): 120-124 (2014) - [j3]Tetsuro Katayama, Kenta Nishikawa, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki:
Proposal of a Supporting Method to Generate a Decision Table from the Formal Specification. JRNAL 1(3): 174-178 (2014) - [j2]Tetsuro Katayama, Shoichiro Kitano, Yoshihiro Kita, Hisaaki Yamaba, Naonobu Okazaki:
Proposal of a Supporting Method for Debugging to Reproduce Java Multi-threaded Programs by Petri-net. JRNAL 1(3): 207-211 (2014) - [c7]Kentaro Aburada, Mirang Park, Naonobu Okazaki:
Investigation of the routing method based on the number of neighbor nodes. ICMU 2014: 103-104 - [c6]Mirang Park, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki:
Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance. NBiS 2014: 495-500 - 2013
- [c5]Hisaaki Yamaba, Michihito Tanoue, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita:
On a Serendipity-oriented Recommender System based on Folksonomy and its Evaluation. KES 2013: 276-284 - [c4]Hisaaki Yamaba, Shoichiro Kitano, Kayoko Takatsuka, Tetsuro Katayama, Naonobu Okazaki, Shigeyuki Tomita:
A Conversion Method from an ETSC to a Timed Petri Net to Improve the Matrix-based Discrete Event Controller and its Unified Support System. KES 2013: 467-476
2000 – 2009
- 2006
- [j1]Mirang Park, Naonobu Okazaki, Shoichiro Seno:
A proposal and its evaluations of a re-keying system for dynamic secure group communications. Systems and Computers in Japan 37(2): 11-24 (2006) - [c3]Shinya Masuda, Hidekazu Suzuki, Naonobu Okazaki, Akira Watanabe:
Proposal for a Practical Cipher Communication Protocol That Can Coexist with NAT and Firewalls. ICOIN 2006: 713-722 - [c2]Mirang Park, Naonobu Okazaki, Yoshimasa Baba:
A New User Authentication Protocol for Mobile Terminals in Wireless Network. MDM 2006: 94 - 2004
- [c1]Mirang Park, Naonobu Okazaki, Shoichiro Seno, Kazuyuki Kashima, Kazuyoshi Oshima:
A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications. AINA (2) 2004: 43-49
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-22 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint