If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
4 Citations (Scopus)

4 move perfect ZKIP of knowledge with no assumption

Saito, T., Kurosawa, K. & Sakurai, K., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Tail
Knowledge
Language
6 Citations (Scopus)

A behavior-based detection method for outbreaks of low-rate attacks

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security
19 Citations (Scopus)

A behavior based malware detection scheme for avoiding false positive

Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Viruses
Malware
Pattern matching
Cryptography
Experiments
3 Citations (Scopus)

A behavior-based method for detecting DNS amplification attacks

Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Servers
Bandwidth
2 Citations (Scopus)

A behavior-based online engine for detecting distributed cyber-attacks

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engine
Attack
Engines
Information theory
Information Theory
20 Citations (Scopus)

A certified E-mail system with receiver’s selective usage of delivery authority

Imamoto, K. & Sakurai, K., Jan 1 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Sarkar, P. & Menezes, A. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Receiver
Costs
Choose

Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

Liao, X., Hao, D. & Sakurai, K., Dec 1 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

information exchange
Wireless ad hoc networks
Numerical analysis
reputation
rationality
4 Citations (Scopus)

Acquisition of evidence of web storage in HTML5 web browsers from memory image

Matsumoto, S. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
World Wide Web
Data storage equipment
Smartphones
HTML

Active attack against oblivious RAM

Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., Aug 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage

Actively modifying control flow of program for efficient anormaly detection

Tatara, K., Tabata, T. & Sakurai, K., Jan 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow Control
Flow control
Buffer Overflow
Anomaly Detection
Intrusion detection
5 Citations (Scopus)

Adaptive and composable non-committing encryptions

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Diffie-Hellman
Encryption
Cryptography
Framework

Adaptive and composable non-interactive string-commitment protocols

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; vol. 222 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Strings
Cryptography
Zero-knowledge
Public key

Adaptive and composable non-interactive string-commitment protocols

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
8 Citations (Scopus)

A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

Imamoto, K. & Sakurai, K., Jul 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Denial-of-service attack
7 Citations (Scopus)

A design of history based traffic filtering with probabilistic packet marking against DoS attacks

Kiuchi, T., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telecommunication traffic
Routers
Communication
Servers
Denial-of-service attack

A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (eds.). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10656 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial of Service
Normal Modes
Performance Evaluation
Attack
Information theory
16 Citations (Scopus)

A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

Hao, D. & Sakurai, K., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Trajectories
Denial-of-service attack
8 Citations (Scopus)

A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

Su, C. & Sakurai, K., Dec 1 2008, Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings. p. 170-181 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5139 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frequent Pattern
Association Rule Mining
Privacy Preserving
Association rules
Collusion
23 Citations (Scopus)

A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, Vol. 2288. p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Side Channel Attacks
Elliptic Curves
Smart cards
Mobile devices
4 Citations (Scopus)

A framework for protecting private information through user-trusted-program and its realizability

Takahashi, K., Sakurai, K. & Amamiya, M., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Private Information
Realizability
Ubiquitous computing
Internet
Mobile Technology
1 Citation (Scopus)

A framework for the user-oriented personal information protection

Takahashi, K. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Computer terminals
Information use
5 Citations (Scopus)

A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

Hao, D., Ren, Y. & Sakurai, K., Nov 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Game theory
Mobile ad hoc networks
Game Theory
Surveillance
Monitor
4 Citations (Scopus)

A generic evaluation method for key management schemes in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Analytic hierarchy process
Sensor nodes
Authentication
Cryptography

A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tamura, T., Sakurai, K. & Matsumoto, T., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Hardware Implementation
Cryptography
Genus

A hidden cryptographic assumption in no-transferable indentification schemes

Sakurai, K., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soundness
Zero-knowledge
Identification Scheme
Restriction
6 Citations (Scopus)

Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

Sakai, Y. & Sakurai, K., Jan 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hamming Weight
Scalar multiplication
Elliptic Curves
Scalar
Network protocols
7 Citations (Scopus)

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Servers
Network protocols
Learning algorithms
Denial-of-service attack
9 Citations (Scopus)

A merging method of certification authorities without using cross-certifications

Koga, S. & Sakurai, K., Jul 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Merging
Electronic commerce
Mergers and acquisitions
Processing
Communication
3 Citations (Scopus)

A method for embedding secret key information in RSA public key and its application

Kitahara, M., Nishide, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
certification
7 Citations (Scopus)

A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

Miyazaki, S. & Sakurai, K., Jan 1 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blind Signature
Discrete Logarithm Problem
Security of data
Information Security
Tracing
9 Citations (Scopus)

A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side channel attack
1 Citation (Scopus)

An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reputation System
Activation
Chemical activation
Attack
Metric
1 Citation (Scopus)

Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

Su, C., Wang, G. & Sakurai, K., Nov 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Processing
Industry
Internet of things

Analysis of methods for detecting compromised nodes and its countermeasures

Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., Feb 26 2013, IT Convergence and Security 2012. Vol. 215 LNEE. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
20 Citations (Scopus)

Analysis of privacy disclosure in DNS query

Zhao, F., Hori, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Internet

Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

Ueshige, Y. & Sakurai, K., May 19 2016, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016. Barolli, L., Enokido, T., Takizawa, M., Jara, A. J. & Bocchi, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 769-775 7 p. 7474167. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2016-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Network protocols
Servers

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., Jan 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clique Graphs
Analysis of variance
Analysis of variance (ANOVA)
Mining
Clique
2 Citations (Scopus)

Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection

Tatara, K., Hori, Y. & Sakurai, K., Sep 12 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 485-489 5 p. 4505774. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packet networks
Viruses
2 Citations (Scopus)

An analysis of IT assessment security maturity in higher education institution

Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D. & Sakurai, K., Jan 1 2016, Information Science and Applications, ICISA 2016. Kim, K. J. & Joukov, N. (eds.). Springer Verlag, p. 701-713 13 p. (Lecture Notes in Electrical Engineering; vol. 376).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
Education
Information management
Monitoring
43 Citations (Scopus)

An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

Sakurai, K. & Miyazaki, S., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Group Scheme
Bidding
Auctions
Signature Scheme

An approach of program analysis prevention for information protection

Takahashi, K., Liu, Z. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
2 Citations (Scopus)

An approach of trusted program generation for user-responsible privacy

Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., Dec 1 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Internet
Leakage
5 Citations (Scopus)

An efficient key generation method in audio zero-watermarking

Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Sampling
Experiments
3 Citations (Scopus)

An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., Aug 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Mobile phones
Integrated circuits
Servers
6 Citations (Scopus)

An efficient robust secret sharing scheme with optimal cheater resiliency

Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., Jan 1 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Schaumont, P., Chakraborty, R. S. & Matyas, V. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resiliency
Secret Sharing Scheme
Authentication
Resilience
Secret Sharing
3 Citations (Scopus)

An evenhanded certified email system for contract signing

Imamoto, K., Zhou, J. & Sakurai, K., Dec 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Transactions
Receiver
Gambling

A new design for evaluating moving target defense system

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Moving Target
Information systems
Servers
Attack
Evaluation Method

A New Design for Evaluating Moving Target Defense System

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

A new scheme for distributed density estimation based privacy-preserving clustering

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., Aug 14 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 112-119 8 p. 4529328. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear transformations
Gaussian distribution
Information retrieval
Data mining
Industry
3 Citations (Scopus)

A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

Zhao, L., Adhikari, A. & Sakurai, K., Feb 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Centroid
Spatial Distribution
Spatial distribution
Entropy
Watermarking