If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2020

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Intrusion detection
Learning systems
Classifiers
Internet of things

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kaneko, K., Sharma, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
2019

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., Jan 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clique Graphs
Analysis of variance
Analysis of variance (ANOVA)
Mining
Clique

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., Sep 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
training method
incident
programming
evaluation
questionnaire

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Sakurai, K., Jun 1 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Text Classification
Neural Networks
Gradient methods
Information use
Attack
2018

Active attack against oblivious RAM

Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., Aug 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage

A new design for evaluating moving target defense system

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Moving Target
Information systems
Servers
Attack
Evaluation Method

A New Design for Evaluating Moving Target Defense System

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Thresholding
Networking
Attack
Software
Historical Data

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Blood
Internet

Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

Su, J., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Activation Function
Chemical activation
Neural Networks
Robustness
Neural networks

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., Oct 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature Selection
Support vector machines
Learning systems
Feature extraction
Machine Learning

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., Jan 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply chains
Risk management
Integrated circuits
Hardware security
Semiconductor materials

Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., Jan 1 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Robustness
Scenarios

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 133-136 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
1 Citation (Scopus)

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Vargas, D. V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image recognition
Internet
Domestic appliances
Cameras
Internet of things

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Topology
Neuroevolution
Neural Networks
Neural networks

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 522-528 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Controllers
Processing
Switches
Communication
2 Citations (Scopus)

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., Dec 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Electronic medical equipment
Public health
Medicine
Burden
1 Citation (Scopus)

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., Jan 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (eds.). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Efficient Solution
Robustness

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Swarm Robotics
Information Sharing
Robotics
Robots
Autonomous Robots

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Malware
Tracing
Attack
Denial of Service

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017
2 Citations (Scopus)

A behavior-based online engine for detecting distributed cyber-attacks

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engine
Attack
Engines
Information theory
Information Theory

A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (eds.). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10656 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial of Service
Normal Modes
Performance Evaluation
Attack
Information theory
6 Citations (Scopus)

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

Razouk, W., Sgandurra, D. & Sakurai, K., Oct 17 2017, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Hamdan, H., Hidoussi, F. & Boubiche, D. E. (eds.). Association for Computing Machinery, a35. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Middleware
Communication
Cloud computing
Radio frequency identification (RFID)

A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk management
Costs

A traceable signcryption scheme for secure sharing of data in cloud storage

Ahuja, R., Mohanty, S. K. & Sakurai, K., Mar 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Cryptography
Access control
Labels
Costs
4 Citations (Scopus)

C&C session detection using random forest

Lu, L., Feng, Y. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Classifiers
Telecommunication traffic
Denial-of-service attack
Botnet

Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., Apr 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Mobile devices
Synchronization
Internet

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evasion attacks against statistical code obfuscation detectors

Su, J., Vargas, D. V. & Sakurai, K., Jan 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Detector
Attack
Detectors
JavaScript

Host independent and distributed detection system of the network attack by using OpenFlow

Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., Apr 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi agent systems
Control systems
Controllers
1 Citation (Scopus)

Improving the accuracy of signature authentication using the eight principles of yong

Nishigori, T., Kawamoto, J. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Smartphones

On the robustness of visual cryptographic schemes

Dutta, S., Roy, P. S., Adhikari, A. & Sakurai, K., Jan 1 2017, Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Kim, H. J., Liu, F., Perez-Gonzalez, F. & Shi, Y. Q. (eds.). Springer Verlag, p. 251-262 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10082 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secret Sharing Scheme
Cryptography
Robustness
Visual Cryptography
Coalitions
2 Citations (Scopus)

On unconditionally binding code-based commitment schemes

Morozov, K., Roy, P. S. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 101. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardness
Decoding
Cryptography
4 Citations (Scopus)

Parameter manipulation attack prevention and detection by using web application deception proxy

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 74. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
2 Citations (Scopus)

Secure and light weight fine-grained access mechanism for outsourced data

Jahan, M., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., Sep 7 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. Institute of Electrical and Electronics Engineers Inc., p. 201-209 9 p. 8029441. (Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Cryptography
Access control
Encryption
Owners
3 Citations (Scopus)

SQL injection attack detection method using expectation criterion

Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016
3 Citations (Scopus)

A behavior-based method for detecting DNS amplification attacks

Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Servers
Bandwidth
7 Citations (Scopus)

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Servers
Network protocols
Learning algorithms
Denial-of-service attack

Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

Ueshige, Y. & Sakurai, K., May 19 2016, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016. Barolli, L., Enokido, T., Takizawa, M., Jara, A. J. & Bocchi, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 769-775 7 p. 7474167. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2016-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Network protocols
Servers
1 Citation (Scopus)

An analysis of IT assessment security maturity in higher education institution

Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D. & Sakurai, K., Jan 1 2016, Information Science and Applications, ICISA 2016. Kim, K. J. & Joukov, N. (eds.). Springer Verlag, p. 701-713 13 p. (Lecture Notes in Electrical Engineering; vol. 376).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
Education
Information management
Monitoring
3 Citations (Scopus)

An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 39-47 9 p. 7782056

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Access control
Computer systems
Servers
Cryptography

Application of NTRU using group rings to partial decryption technique

Yasuda, T., Anada, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 203-213 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Ring
Cryptography
Partial
Public key
Polynomials