If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
Conference contribution

A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

Zhao, L., Adhikari, A. & Sakurai, K., Jan 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (eds.). Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Centroid
Spatial Distribution
Spatial distribution
Entropy
Watermarking
7 Citations (Scopus)

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

Razouk, W., Sgandurra, D. & Sakurai, K., Oct 17 2017, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Hamdan, H., Hidoussi, F. & Boubiche, D. E. (eds.). Association for Computing Machinery, a35. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fog
Middleware
Communication
Cloud computing
Radio frequency identification (RFID)
4 Citations (Scopus)

An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Dec 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 39-47 9 p. 7782056. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Access control
Computer systems
Servers
Cryptography
3 Citations (Scopus)

An image splicing detection based on interpolation analysis

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Dec 27 2012, Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings. p. 390-401 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7674 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital cameras
Interpolation
Interpolate
Concretes
Digital Image
4 Citations (Scopus)

An IND-CCA2 public-key cryptosystem with fast decryption

Buchmann, J., Sakurai, K. & Takagi, T., Jan 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Cryptosystem
kernel
Hash Function
1 Citation (Scopus)

An intrusion detection system using alteration of data

Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., Nov 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 243-248 6 p. 1620199. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Data storage equipment

An intrusion detection system which can restore altered data

Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., Dec 3 2007, Fourth International Conference on Information Technology and Applications, ICITA 2007. p. 29-34 6 p. (Fourth International Conference on Information Technology and Applications, ICITA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Intrusion detection
Data storage equipment
4 Citations (Scopus)

A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption

Hada, S. & Sakurai, K., Dec 1 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Encryption
Cryptography
Transform
Obfuscation
1 Citation (Scopus)

An RFID system based MCLT system with improved privacy

Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., Jan 1 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Mu, Y., Jeong, Y-S., Xu, C-Z., Yan, L., Shao, Z., Lee, D-C., Sokolsky, O., Yan, L., Jung, E-S., Zhou, X. & Kim, D. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tracking System
Radio Frequency Identification
Radio frequency identification (RFID)
Privacy
Security systems
6 Citations (Scopus)

Any language in IP has a divertible ZKIP

Itoh, T., Sakurai, K. & Shizuya, H., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proof Systems
Zero-knowledge Proof
Cryptography
Homomorphisms
Encryption
1 Citation (Scopus)

A parameterless learning algorithm for behavior-based detection

Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Network security
Experiments
1 Citation (Scopus)

A policy language for the extended reference monitor in trusted operating systems

Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., Aug 29 2007, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007. p. 1160-1166 7 p. 4159922. (Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Semantics
1 Citation (Scopus)

Application and evaluation of Bayesian filter for Chinese spam

Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spam
Electronic mail
Electronic Mail
Filtering
Filter

Application of NTRU using group rings to partial decryption technique

Yasuda, T., Anada, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 203-213 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Ring
Cryptography
Partial
Public key
Polynomials
1 Citation (Scopus)

Application of scalar multiplication of edwards curves to pairing-based cryptography

Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. Vol. 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pairing-based Cryptography
Scalar multiplication
Cryptography
Curve
Pairing

A practical proxy device for protecting RFID tag's identifier

Yeo, S. S., Sakurai, K. & Kwak, J., 2007, Proceedings - 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007. p. 55-58 4 p. 4290939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Consumer electronics
Automobiles
Radio frequency identification
Tag
9 Citations (Scopus)

A proactive secret sharing for server assisted threshold signatures

Yang, J. P., Rhee, K. H. & Sakurai, K., Jan 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Signature
Secret Sharing
Threshold Scheme
Servers
Server
9 Citations (Scopus)

A progress report on subliminal-free channels

Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., Jan 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Randomness
Communication
Zero-knowledge
2 Citations (Scopus)

A proposal for cyber-attack trace-back using packet marking and logging

Li, P., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 603-607 5 p. 7794540. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

A proposal for detecting distributed cyber-attacks using automatic thresholding

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2015, Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 152-159 8 p. 7153950. (Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
6 Citations (Scopus)

A proposal for the privacy leakage verification tool for android application developers

Matsumoto, S. & Sakurai, K., Apr 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Android (operating system)
2 Citations (Scopus)

A proposal of efficient scheme of key management using ID-based encryption and biometrics

Izumi, A., Ueshige, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 29-34 6 p. 4197245. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Cryptography
Authentication
Public key cryptography
Electronic document identification systems

A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk management
Costs
10 Citations (Scopus)

A proposal of one-time biometric authentication

Ueshige, Y. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Internet
Communication
11 Citations (Scopus)

A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

Zhao, L., Ren, Y. & Sakurai, K., Jun 3 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling algorithms
Natural sciences computing
Communication
Costs
Topology
44 Citations (Scopus)

A robust and compression-combined digital image encryption method based on compressive sensing

Huang, R. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Gaussian distribution
Packet loss
Logistics
Experiments
24 Citations (Scopus)

A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Springer Verlag, Vol. 2433. p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Countermeasures
Attack
Scalar
Electronic crime countermeasures
1 Citation (Scopus)

A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

Chou, B. H., Tatara, K., Sakuraba, T., Hori, Y. & Sakurai, K., Sep 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 421-426 6 p. 4511604. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

virtualization
integrity
event
performance
Module
3 Citations (Scopus)

A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

Yasuda, T. & Sakurai, K., Dec 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Analysis
Factorization
Signature
Paradigm
Quantum cryptography

A sequential scheme for detecting cyber attacks in IoT environment

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 8890502. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Attack
Classifiers
Chemical activation
Activation Function

A signature scheme associated with universal re-signcryption

Tatara, K. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 780-785 6 p. 5066564. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computational complexity
Semantics
27 Citations (Scopus)

A SMS-based mobile botnet using flooding algorithm

Hua, J. & Sakurai, K., Jun 20 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flooding
Mobile Phone
Malware
Command and Control
Mobile Computing

A study of communication route selection considering route security

Etoh, F., Hori, Y. & Sakurai, K., Sep 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Mobile phones
Telecommunication
Internet
Bandwidth
2 Citations (Scopus)

A study of security management with cyber insurance

Ishikawa, T. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a68. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Insurance
Costs

A traceable signcryption scheme for secure sharing of data in cloud storage

Ahuja, R., Mohanty, S. K. & Sakurai, K., Mar 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Cryptography
Access control
Labels
Costs
8 Citations (Scopus)

Attribute-based signatures without pairings via the Fiat-Shamir paradigm

Anada, H., Arita, S. & Sakurai, K., Jan 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attribute-based two-tier signatures: Definition and construction

Anada, H., Arita, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers. Yun, A. & Kwon, S. (eds.). Springer Verlag, p. 36-49 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature
Attribute
Signature Scheme
Electronic document identification systems
Privacy
10 Citations (Scopus)

A variant of rainbow with shorter secret key and faster signature generation

Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., May 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Quantum cryptography
7 Citations (Scopus)

A zero-watermarking-like steganography and potential applications

Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., Dec 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Watermarking
Digital watermarking
Camouflage
8 Citations (Scopus)

Barrier: A lightweight hypervisor for protecting kernel integrity via memory isolation

Hua, J. & Sakurai, K., Jul 12 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 1470-1477 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Computer operating systems
Personal computers
Computer hardware
Servers

Behavior control based on dynamic code translation

Sakai, A., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Binary codes
Static analysis
19 Citations (Scopus)

Blind decoding, blind undeniable signatures, and their applications to privacy protection

Sakurai, K. & Yamane, Y., Jan 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Undeniable Signature
Blind Signature
Privacy Protection
Decoding
Servers
21 Citations (Scopus)

Bot detection based on traffic analysis

Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 303-306 4 p. 4438445. (Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Information systems
Network protocols
Communication
Botnet
4 Citations (Scopus)

C&C session detection using random forest

Lu, L., Feng, Y. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Classifiers
Telecommunication traffic
Denial-of-service attack
Botnet
4 Citations (Scopus)

CCA-secure keyed-fully homomorphic encryption

Lai, J., Deng, R. H., Ma, C., Sakurai, K. & Weng, J., Jan 1 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Persiano, G., Cheng, C-M., Chung, K-M. & Yang, B-Y. (eds.). Springer Verlag, p. 70-98 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Cryptography
Identity-based
Homomorphic
Evaluation
2 Citations (Scopus)

Certified e-mail systems using public notice board

Imamoto, K. & Sakurai, K., Jan 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
1 Citation (Scopus)

Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998, Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings. p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge
Correctness
Zero-knowledge Proof
Alike
Requirements
2 Citations (Scopus)

Ciphertext-auditable public key encryption

Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, Vol. 4266 LNCS. p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Public key
Cryptography
Scenarios
Attack
13 Citations (Scopus)

Classification on attacks in wireless ad hoc networks: A game theoretic view

Liao, X., Hao, D. & Sakurai, K., Sep 1 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Game theory
3 Citations (Scopus)

Collaborative behavior visualization and its detection by observing darknet traffic

Akimoto, S., Hori, Y. & Sakurai, K., Dec 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Attack
Traffic
Scanning
DDoS