OKAMURA Shingo

J-GLOBAL         Last updated: Jun 21, 2019 at 12:32
 
Avatar
Name
OKAMURA Shingo
Affiliation
Nara National College of Technology
Section
Department of Information Engineering
Job title
Assistant Professor
Degree
Master(Engineering)(Osaka University)

Research Interests

 
 

Research Areas

 
 

Academic & Professional Experience

 
Apr 2013
 - 
Today
Associate Professor, Information Engineering, Nara National College of Technology
 

Education

 
 
 - 
1998
Osaka Prefectural College of Technology
 
 
 - 
2000
Department of Informatics and Mathematical Science, Faculty of Engineering Science, Osaka University
 
 
 - 
2000
Faculty of Engineering Science, Osaka University
 
 
 - 
2002
Department of Informatics and Mathematical Science, Graduate School, Division of Engineering Science, Osaka University
 
 
 - 
2002
Graduate School, Division of Engineering Science, Osaka University
 

Published Papers

 
H. Shimamoto, N. Yanai, S. Okamura, J. P. Cruz, S. Ou and T. Okubo
IEEE Access   7 74941-74960   Jun 2019   [Refereed]
Toyokazu Akiyama, Yuuichi Teranishi, Shingo Okamura, Eisaku Sakane, Go Hasegawa, Ken Ichi Baba, Hirotaka Nakano, Shinji Shimojo
SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W      Dec 2007   [Refereed]
Cybermedia Center, Osaka University (CMC) is now developing Campus-wide IT Authentication Platform System (CITAPS). In this paper, we will report the current status of CITAPS development. Before installing CITAPS, Unified Account System (UAS) serv...
Satoshi Nakayama,Maki Yoshida,Shingo Okamura,Toru Fujiwara
IEICE Transactions on Fundamentals   90-A(1) 204-215   Jan 2007   [Refereed]
Hikaru Kishimoto, Naoto Yanai, Shingo Okamura
Journal of Information Proceccing   25(1) 12-21   Jan 2017   [Refereed]
Hikaru Kishimoto,Naoto Yanai,Shingo Okamura
31st International Conference on Advanced Information Networking and Applications Workshops, AINA 2017 Workshops, Taipei, Taiwan, March 27-29, 2017   62-67   Mar 2017   [Refereed]
Kenta Muranaka,Naoto Yanai,Shingo Okamura,Toru Fujiwara
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016.   376-387   Jul 2016   [Refereed]
Ryo Fukuyama,Naoto Yanai,Shingo Okamura,Toru Fujiwara
2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016   413-417   Oct 2016   [Refereed]
Hayato Shimamoto,Naoto Yanai,Shingo Okamura,Toru Fujiwara
2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016   408-412   Oct 2016   [Refereed]
Kenta Muranaka,Naoto Yanai,Shingo Okamura,Toru Fujiwara
2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1   1329-1336   Aug 2015   [Refereed]
Yuma Higashiyama,Naoto Yanai,Shingo Okamura,Toru Fujiwara
Third International Symposium on Computing and Networking, CANDAR 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015   89-95   Nov 2015   [Refereed]
© 2015 IEEE. A challenge/response authentication scheme with a hidden challenge is useful authentication against a shoulder-surfing attack. This scheme allows a user in authentication with secret information to receive a challenge securely as a no...
Hikaru Kishimoto,Shingo Okamura
International Symposium on Information Theory and its Applications, ISITA 2014, Melbourne, Australia, October 26-29, 2014   226-230   Oct 2014   [Refereed]
Hiroaki Yamanaka,Toru Fujiwara,Shingo Okamura
Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings   181-184   2010   [Refereed]
Toyokazu Akiyama,Yuuichi Teranishi,Shingo Okamura,Shinji Shimojo
3PGCIC 2010, International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka Institute of Technology, Fukuoka, Japan, 4-6 November 2010   517-520   2010   [Refereed]
Toyokazu Akiyama,Yuuichi Teranishi,Shingo Okamura,Shinji Shimojo
2009 International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009, Fukuoka, Japan, March 16-19, 2009   1112-1117   2009   [Refereed]
Eisaku Sakane,Manabu Higashida,Shingo Okamura,Toyokazu Akiyama,Ken-ichi Baba,Shinji Shimojo,Yuuichi Teranishi
Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland   277-280   2008   [Refereed]
Mohamed Layouni,Maki Yoshida,Shingo Okamura
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings   387-402   2008   [Refereed]
Towards Secure C2C Contents Distribution Services
Junya Asano, Shingo Okamura, Maki Yoshida, Toru Fujiwara
Proc. of the 1st Joint Workshop on Information Security   347–360-360   Sep 2006   [Refereed]
Shingo Okamura,Yoshiyuki Konishi,Maki Yoshida,Toru Fujiwara
IEICE Transactions   88-A(1) 262-269   Jan 2005   [Refereed]

Misc

 
Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Toru Fujiwara
Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016   408-412   Feb 2017
© 2016 IEICE. Cache is a mechanism in a web system to store web contents in order to provide them efficiently. Since there is an attack called a browser cache poisoning attack where an adversary utilizes a web cache, analyzing the security under e...
Ryo Fukuyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara
Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016   413-417   Feb 2017
© 2016 IEICE. A data-oriented attack allows an adversary to rewrite data values stored in memories by manipulating data flow of a program, and brings serious damage such as leakage of secret keys or escalation of privileges. To the best of our kno...
A Study on Application of User Authentication Protocol to Smart Grid
Hikaru Kishimoto, Naoto Yanai, Shingo Okamura
1C2-5   Jan 2017
Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Toru Fujiwara
コンピュータセキュリティシンポジウム2016論文集   741-748   Oct 2016
Ryo Fukuyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara
コンピュータセキュリティシンポジウム2016論文集   726-732   Oct 2016
Yudai Nagamine, Naoto Yanai, Shingo Okamura, Toru Fujiwara
コンピュータセキュリティシンポジウム2016論文集   655-661   Oct 2016
井上晴也, 岡村真吾
2016 ROMBUNNO.A‐7‐2   Mar 2016
Hikaru Kishimoto, Naoto Yanai, Shingo Okamura
コンピュータセキュリティシンポジウム2016論文集   850-857   Oct 2016
岸本光, 岡村真吾
情報処理学会全国大会講演論文集   77th(3) 3.473-3.474   Mar 2015
Yuma Higashiyama, Shingo Okamura, Naoto Yanai, Toru Fujiwara
A-7-10   Mar 2015
村中謙太, 矢内直人, 岡村真吾, 藤原融
電子情報通信学会技術研究報告   114(489(ICSS2014 63-99)) 91-96   Feb 2015
Yuma Higashiyama, Shingo Okamura, Naoto Yanai, Toru Fujiwara
コンピュータセキュリティシンポジウム2014論文集   2014(2) 1023-1028   Oct 2014
東山侑真, 岡村真吾, 藤原融
電子情報通信学会大会講演論文集(CD-ROM)   2014 ROMBUNNO.A-7-4   Mar 2014
Matsuo Kenichi, Nishino Satoru, Sakai Fumitoshi, Okamura Shingo, Miki Kojiro, Koshiba Takashi
Japanese colleges of technology education journal   (36) 563-568   Mar 2013
In this paper, we describe the student guidance activities for observance of traffic regulations. In this school, theabout 800 students attend the school from the station to NNCT(Nara National College of Technology) using the bicycle.Some students...
寺西 裕一, 秋山 豊和, 岡村 真吾, 竹内 亨, 武本 充治, 野本 義弘
研究報告マルチメディア通信と分散処理(DPS)   2011(28) 1-8   Mar 2011
蓄積運搬転送型の送受信を含む P2P ネットワークにおいて,階層的に構成されるグループのメンバ同士で安全なメッセージ交換を行なうことを可能とする仮想化オーバレイネットワーク (VON) 機構の設計について述べる.本稿では,メッセージに対する送信・中継ノードによる証明書の付与と,入れ子構造の暗号化により,階層構造をもつグループと蓄積運搬転送型の送受信に対応した上で,不正な挙動をするノードを排除する VON の実現法を示す.また,隣接ノード同士が直接接続可能,かつ,同一のグループに属している場...
Yamaguchi Kenichi, Yamaguchi Tomohiro, Okamura Shingo, Ueno Hidetake, Nishino Takayuki
Japanese colleges of technology education journal   34 679-684   Mar 2011
Recently, junior high school students are greatly influenced by their parents on their decisions about nextcareer. Therefore, it seems to be effective for increasing the applicants of our college to lead the parents' interest tothe information eng...
An Approach for Filtering Inaccurate Access Point Observation Report in WiFi Positioning System
Toyokazu Akiyama, Yuuichi Teranishi, Shingo Okamura, Shinji Shimojo
Proceedings of 1st International Workshop on Streaming Media Delivery and Management Systems (SMDMS2010)      Nov 2010   [Refereed]
山中広明, 岡村真吾, 藤原融, 吉田真紀, 石原靖哲, 秋山豊和, 加藤精一, 下條真司
情報処理学会論文誌ジャーナル(CD-ROM)   51(8) 1428-1442   Aug 2010
Hiroaki Yamanaka, Shingo Okamura, Toru Fujiwara
Proceedings of 2010 International Symposium on Applications and the Internet Workshops (SAINT2010)      Jul 2010   [Refereed]
YAMANAKA HIROAKI, OKAMURA SHINGO, FUJIWARA TORU
研究報告コンピュータセキュリティ(CSEC)   2010(12) 1-7   Feb 2010
コンテンツ検索の効率化と汚染コンテンツダウンロード抑制の両性能を両立するための非構造化オーバレイ構築手法が提案されている.より良い構築手法を設計するには,両性能のオーバレイに対する評価指標の設計が重要である.既存研究での評価指標は,所望コンテンツをダウンロードできる確率や,汚染コンテンツを提供する確率が異なるピアが混在する状況での汚染コンテンツ抑制効果の評価には不十分である.そこで本研究では,オーバレイに対して両性能を統合的に評価するため,他ピアが所望のコンテンツを保持する確率,正当コンテ...
Toyokazu Akiyama, Yuuichi Teranishi, Shingo Okamura, Shinji Shimojo
Proceedings of the International Workshop on Data Management for Information Explosion in Wireless Networks (DMIEW2009)      Mar 2009   [Refereed]
Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval
Mohamed Layouni, Maki Yoshida, Shingo Okamura
Proceedings of 10th International Conference on Information and Communications Security (ICICS2008)      Oct 2008   [Refereed]
山中広明, 岡村真吾, 藤原融
情報処理学会研究報告   2008(91(DPS-136 GN-69 EIP-41)) 59-64   Sep 2008
In a P2P contents sharing where a reputation system is applied for avoidance of downloading polluted contents, the reputation system should be reliable. However dishonest ratings considerably degrade the reliability of trust values of peers comput...
Eisaku Sakane, Manabu Higashida, Shingo Okamura, Toyokazu Akiyama, Yuuichi Teranishi, Ken-ichi Baba, Shinji Shimojo
Proceedings of 2008 International Symposium on Applications and the Internet Workshops (SAINT2008)      Jul 2008   [Refereed]
秋山豊和, 寺西裕一, 岡村真吾, 坂根栄作, 長谷川剛, 馬場健一, 中野博隆, 下條真司, 長岡亨
情報処理学会論文誌   49(3) 1249-1264   Mar 2008
秋山豊和, 岡村真吾, 寺西裕一
電子情報通信学会大会講演論文集   2008 S.114-S.115   Mar 2008
AKIYAMA Toyokazu, TERANISHI Yuichi, OKAMURA Shingo, SAKANE Eisaku, HASEGAWA Go, BABA Ken-ichi, NAKANO Hirotaka, SHIMOJO Shinji
IEICE technical report   107(74) 47-52   May 2007
In Osaka University, since many academic affairs systems are going to become online, we have upgraded campus-wide IT authentication infrastructure to support higher security. The new infrastructure resolves vulnerability of the password authentica...
SAKANE Eisaku, HIGASHIDA Manabu, OKAMURA Shingo, TERANISHI Yuuichi, AKIYAMA Toyokazu, BABA Ken-ichi, SHIMOJO Shinji
情報処理学会研究報告インターネットと運用技術(IOT)   2007-DSM-45(38) 25-30   May 2007
In the Cybermedia Center, Osaka University, we introduce the NAREGI grid middleware to our latest large-scale computing system for nationwide joint-use, and make grid computing technology available on them. At the same time, we keep the past opera...
SAKANE Eisaku, HIGASHIDA Manabu, OKAMURA Shingo, TERANISHI Yuuichi, AKIYAMA Toyokazu, BABA Ken-ichi, SHIMOJO Shinji
IEICE technical report   107(30) 25-30   May 2007
In the Cybermedia Center, Osaka University, we introduce the NAREGI grid middleware to our latest large-scale computing system for nationwide joint-use, and make grid computing technology available on them. At the same time, we keep the past opera...
OKAMURA Shingo, TERANISHI Yuuichi, AKIYAMA Toyokazu, BABA Ken-ichi, NAKANO Hirotaka
IPSJ SIG Notes   2006(26) 67-72   Mar 2006
In Osaka University, a campus-wide authentication infrastructure based on public keys, called Campus PKI, is being constructed to make computer systems more secure. A public key authentication is more secure against password cracking than a passwo...
NAKAYAMA Satoshi, YOSHIDA Maki, OKAMURA Shingo, FUJIWARA Akira, FUJIWARA Toru
IPSJ SIG Notes   2005(70) 377-384   Jul 2005
A data retrieval protocol between a database server, who has a database, and a user, who has an index, allows the user to obtain an item in the database. Security requirements for data retrieval are the privacy of a user, the privacy of the databa...
NAKAYAMA Satoshi, YOSHIDA Maki, OKAMURA Shingo, FUJIWARA Akira, FUJIWARA Toru
Technical report of IEICE. ISEC   105(194) 129-136   Jul 2005
A data retrieval protocol between a database server, who has a database, and a user, who has an index, allows the user to obtain an item in the database. Security requirements for data retrieval are the privacy of a user, the privacy of the databa...
An Efficient Private and Consistent Data Retrieval Protocol
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara
Western European Workshop on Research in Cryptology (WEWoRC2005)      Jul 2005   [Refereed]
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors
Shingo Okamura, Maki Yoshida, Toru Fujiwara
Peer-reviewed Proceedings of the ISSA 2005 New Knowledge Today Conference      Jun 2005   [Refereed]
A Digital Contents Consignment System Protecting Marketing Information
Akira Fujiwara, Shingo Okamura, Maki Yoshida, Toru Fujiwara
2004 International Symposium on Information Theory and Its Applications (ISITA2004)   468-473   Oct 2004   [Refereed]
Unlinkable Delivery System for Interactive Dramas Including Conditional Choices
Shingo Okamura, Maki Yoshida, Toru Fujiwara
2004 International Symposium on Information Theory and Its Applications (ISITA2004)   474-479   Oct 2004   [Refereed]
An Interactive Drama Delivery System Suitable for Mobile Phone (Preliminary Version)
Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
Pre-Proceedings of the 5th International workshop on Information Security Applications (WISA2004)   391-398   Aug 2004   [Refereed]
FUJIWARA Akira, OKAMURA Shingo, YOSHIDA Maki, FUJIWARA Toru
IPSJ SIG Notes   ISEC2004-34(75) 143-150   Jul 2004
A digital contents delivering system is considered, where contents providers consign delivering and charging to distributors who have infrastructures of delivering, e.g. Internet Service Providers (ISP). One of marketing information in delivering ...
FUJIWARA Akira, OKAMURA Shingo, YOSHIDA Maki, FUJIWARA Toru
Technical report of IEICE. ISEC   104(199) 143-150   Jul 2004
A digital contents delivering system is considered, where contents providers consign delivering and charging to distributors who have infrastructures of delivering, e.g. Internet Service Providers (ISP). One of marketing information in delivering ...
A Validatable Revocation Scheme with Black-Box Traitor Tracing
Shingo Okamura, Maki Yoshida, Toru Fujiwara
2002 International Symposium on Information Theory and Its Applications (ISITA2002)   355-358   Oct 2002   [Refereed]

Books etc

 
Hikaru Kishimoto, Naoto Yanai, Shingo Okamura (Part:Contributor, An Anonymous Authentication Protocol for the Smart Grid)
Springer   Sep 2018   ISBN:331991426X

Conference Activities & Talks

 
Malware for Protocol Misidentification
Yudai Nagamine, Naoto Yanai, Shingo Okamura, Toru Fujiwara
Poster session of the 11th International Workshop on Security (IWSEC2016)   12 Sep 2016   
Secure Payment Protocol for Charging Information over SmartGrid
Hikaru Kishimoto, Shingo Okamura, Naoto Yanai
The 10th International Workshop on Security (IWSEC2015)   26 Aug 2015   
Toward Secure Routing Protocols for Sensor Networks
Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara
Poster session of the 10th International Workshop on Security (IWSEC2015)   26 Aug 2015   

Association Memberships