• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1991 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 3-party adversarial steganography

    Meraouche, I., Dutta, S. & Sakurai, K., 2020, Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers. You, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 89-100 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 move perfect ZKIP of knowledge with no assumption

    Saito, T., Kurosawa, K. & Sakurai, K., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A behavior-based detection method for outbreaks of low-rate attacks

    Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A behavior based malware detection scheme for avoiding false positive

    Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • A behavior-based method for detecting DNS amplification attacks

    Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • A behavior-based online engine for detecting distributed cyber-attacks

    Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties

    Chaudhury, S. S., Dutta, S. & Sakurai, K., 2020, Network and System Security - 14th International Conference, NSS 2020, Proceedings. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 292-308 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A certified E-mail system with receiver’s selective usage of delivery authority

    Imamoto, K. & Sakurai, K., 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Menezes, A. & Sarkar, P. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

    Liao, X., Hao, D. & Sakurai, K., 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Acquisition of evidence of web storage in HTML5 web browsers from memory image

    Matsumoto, S. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Active attack against oblivious RAM

    Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., Aug 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Actively modifying control flow of program for efficient anormaly detection

    Tatara, K., Tabata, T. & Sakurai, K., Jan 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Adaptive and composable non-committing encryptions

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

    Imamoto, K. & Sakurai, K., Jul 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Kiuchi, T., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

    Feng, Y., Hori, Y. & Sakurai, K., 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (eds.). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10656 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

    Hao, D. & Sakurai, K., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • A Distributed Ledger Management Mechanism for Storing and Selling Private Data

    Dutta, S., Paul, A., Ozaki, R. H., Ranzan, C. P. & Sakurai, K., Jan 30 2021, 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. Institute of Electrical and Electronics Engineers Inc., 9346258. (2021 IEEE Conference on Dependable and Secure Computing, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

    Su, C. & Sakurai, K., Dec 1 2008, Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings. p. 170-181 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5139 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

    Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • A framework for protecting private information through user-trusted-program and its realizability

    Takahashi, K., Sakurai, K. & Amamiya, M., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A framework for the user-oriented personal information protection

    Takahashi, K. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

    Hao, D., Ren, Y. & Sakurai, K., 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A generic evaluation method for key management schemes in wireless sensor network

    Na, R., Ren, Y., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

    Tamura, T., Sakurai, K. & Matsumoto, T., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A hidden cryptographic assumption in no-transferable indentification schemes

    Sakurai, K., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

    Sakai, Y. & Sakurai, K., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

    Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A merging method of certification authorities without using cross-certifications

    Koga, S. & Sakurai, K., Jul 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A method for embedding secret key information in RSA public key and its application

    Kitahara, M., Nishide, T. & Sakurai, K., 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

    Miyazaki, S. & Sakurai, K., 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723. (Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

    Su, C., Wang, G. & Sakurai, K., Nov 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Analysis of methods for detecting compromised nodes and its countermeasures

    Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., 2013, IT Convergence and Security 2012. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis of privacy disclosure in DNS query

    Zhao, F., Hori, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

    Ueshige, Y. & Sakurai, K., May 19 2016, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016. Barolli, L., Enokido, T., Takizawa, M., Jara, A. J. & Bocchi, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 769-775 7 p. 7474167. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2016-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis of variance of graph-clique mining for scalable proof of work

    Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection

    Tatara, K., Hori, Y. & Sakurai, K., Sep 12 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 485-489 5 p. 4505774. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An analysis of IT assessment security maturity in higher education institution

    Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D. & Sakurai, K., 2016, Information Science and Applications, ICISA 2016. Kim, K. J. & Joukov, N. (eds.). Springer Verlag, p. 701-713 13 p. (Lecture Notes in Electrical Engineering; vol. 376).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

    Zhao, H., Feng, Y., Koide, H. & Sakurai, K., Nov 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 8958477. (Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

    Sakurai, K. & Miyazaki, S., 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    48 Citations (Scopus)
  • An approach of program analysis prevention for information protection

    Takahashi, K., Liu, Z. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An approach of trusted program generation for user-responsible privacy

    Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An efficient key generation method in audio zero-watermarking

    Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., Aug 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An efficient robust secret sharing scheme with optimal cheater resiliency

    Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Chakraborty, R. S., Matyas, V. & Schaumont, P. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • An evenhanded certified email system for contract signing

    Imamoto, K., Zhou, J. & Sakurai, K., Dec 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)