• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1991 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2020

    3-Party Adversarial Cryptography

    Meraouche, I., Dutta, S. & Sakurai, K., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 247-258 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • Blockchain for IoT-Based Digital Supply Chain: A Survey

    Zhang, H. & Sakurai, K., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 564-573 10 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • Classification of Malicious Domains by Their LIFETIME

    Hara, D., Sakurai, K. & Musashi, Y., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 334-341 8 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2017

    A comprehensive security analysis checksheet for openflow networks

    Hori, Y., Mizoguchi, S., Miyazaki, R., Yamada, A., Feng, Y., Kubota, A. & Sakurai, K., 2017, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 231-242 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • 2012

    Workflow scheduling with fault tolerance

    Zhao, L. & Sakurai, K., 2012, Network and Traffic Engineering in Emerging Distributed Computing Applications. IGI Global, p. 94-123 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2007

    Privacy-preservation techniques in data mining

    Su, C., Zhou, J., Bao, F., Wang, G. & Sakurai, K., Jan 1 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 187-226 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A distributed online certificate status protocol with a single public key

    Koga, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    7 Citations (Scopus)
  • A DRM framework for secure distribution of mobile contents

    Lee, K. I., Sakurai, K., Lee, J. S. & Ryou, J. C., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. & Goto, S. (eds.). Springer Verlag, p. 905-914 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • A generalization of PGV-hash functions and security analysis in black-box model

    Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • A new attack with side channel leakage during exponent recoding computations

    Sakai, Y. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. & Quisquater, J-J. (eds.). Springer Verlag, p. 298-311 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3156).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    5 Citations (Scopus)
  • A software fingerprinting scheme for java using classfiles obfuscation

    Fukushima, K. & Sakurai, K., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 303-316 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Citations (Scopus)
  • Enhancing privacy of universal re-encryption scheme for RFID tags

    Saito, J., Ryou, J. C. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yang, L. T., Guo, M., Gao, G. R. & Jha, N. K. (eds.). Springer Verlag, p. 879-890 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3207).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    66 Citations (Scopus)
  • Modified power-analysis attacks on XTR and an efficient countermeasure

    Han, D. G., Izu, T., Lim, J. & Sakurai, K., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • On security of XTR public key cryptosystems against side channel attacks

    Han, D. G., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 454-465 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Citations (Scopus)
  • Pre-production methods of a response to certificates with the common status - Design and theoretical evaluation

    Koga, S., Ryou, J. C. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • 2003

    Single-path authenticated-encryption scheme based on universal hashing

    Furuya, S. & Sakurai, K., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access