If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
Conference contribution
1 Citation (Scopus)

Enforcement of integrated security policy in trusted operating systems

Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., Dec 1 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Policy
Access control
Operating Systems
Monitor
Access Control
6 Citations (Scopus)

English vs. sealed bid in anonymous electronic auction protocols

Hirakiuchi, D. & Sakurait, K., Jan 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Servers

Enhanced privacy in key-exchange protocols by one-time ID

Imamoto, K. & Sakurai, K., Dec 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Wireless networks
Denial-of-service attack

Enhancing cooperative behavior for online reputation systems by group selection

Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Online systems
Game theory
1 Citation (Scopus)

Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

Iwanaga, M., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evaluation of gamma ray durability of RF tag and application to the radiation environment

Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., Jan 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

durability
Gamma rays
Durability
gamma rays
Radiation
2 Citations (Scopus)

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Template matching
Decoding
Watermarking
Sorting
1 Citation (Scopus)

Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

Fukushima, K., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encapsulation

Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

Tanaka, S., Cheng, C. M. & Sakurai, K., Jan 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quadratic equation
Graphics Processing Unit
Galois field
Unknown
Evaluation
2 Citations (Scopus)

Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

Teraura, N. & Sakurai, K., Dec 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Computer vision
Internet
Color
Sensors

Evasion attacks against statistical code obfuscation detectors

Su, J., Vargas, D. V. & Sakurai, K., Jan 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Detector
Attack
Detectors
JavaScript
4 Citations (Scopus)

Exploring security countermeasures along the attack sequence

Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., Sep 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

threat
time
Countermeasures
Attack
Threat

Expressive rating scheme by signatures with predications on ratees

Anada, H., Ruj, S. & Sakurai, K., Jan 1 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Springer Verlag, Vol. 9955 LNCS. p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Signature
Concretes
Signature Scheme
Digital Signature
39 Citations (Scopus)

Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterogeneous Systems
Replica
Fault-tolerant
Scheduling
Scheduling algorithms
3 Citations (Scopus)

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., Oct 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature Selection
Support vector machines
Learning systems
Feature extraction
Machine Learning
11 Citations (Scopus)

Fine-grained conditional proxy re-encryption and application

Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., Jan 1 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Hui, L. C. K., Yiu, S. M. & Liu, J. K. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Revocation
Attribute
Security Proof
1 Citation (Scopus)

Flow traffic classification with support vector machine by using payload length

Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., Dec 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Support vector machines
Planning
Monitoring

Formal verification for access control in web information sharing system

Sakai, A., Hori, Y. & Sakurai, K., Nov 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information Sharing
Formal Verification
Access Control
Access control
Predicate Logic
1 Citation (Scopus)

Forward secure privacy protection scheme for RFID system using advanced encryption standard

Yeo, S. S., Sakurai, K., Cho, S., Yang, K. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Vol. 4743 LNCS. p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio Frequency Identification Device
Advanced Encryption Standard
Privacy Protection
Privacy
Radio Frequency Identification
1 Citation (Scopus)

FPGA-targeted hardware implementations of K2

Kiyomoto, S., Tanaka, T. & Sakurai, K., Dec 1 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field programmable gate arrays (FPGA)
Hardware
Cryptography
Feedback control
6 Citations (Scopus)

General fault attacks on multivariate public key cryptosystems

Hashimoto, Y., Takagi, T. & Sakurai, K., Dec 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault Attacks
Public-key Cryptosystem
Cryptography
Attack
Triangular Systems
2 Citations (Scopus)

Generic, optimistic, and efficient schemes for fair certified email delivery

Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Vol. 3783 LNCS. p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Receiver
Flavors
3 Citations (Scopus)

Granularity considering in a trust model for P2P networks

Li, M., Ren, Y., Sakurai, K., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Grid based network address space browsing for network traffic visualization

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., Jan 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Visualization
Statistical methods
Processing
144 Citations (Scopus)

Grouping proof for RFID tags

Saito, J. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Radio communication
Antennas
Costs
10 Citations (Scopus)

Grouping provenance information to improve efficiency of access Control

Syalim, A., Hori, Y. & Sakurai, K., Nov 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provenance
Access Control
Access control
Grouping
Directed Acyclic Graph

Group key distribution scheme for reducing required rekey message size

Nishi, R. & Sakurai, K., Sep 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forward error correction
Communication
Bandwidth

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., Jan 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply chains
Risk management
Integrated circuits
Hardware security
Semiconductor materials
1 Citation (Scopus)

Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., Jan 1 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Robustness
Scenarios

Host independent and distributed detection system of the network attack by using OpenFlow

Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., Apr 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi agent systems
Control systems
Controllers
3 Citations (Scopus)

How intractable is the discrete logarithm for a general finite group?

Okamoto, T., Sakurai, K. & Shizuya, H., Jan 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm
Polynomial time
Finite Group
Polynomials
Computational complexity

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
9 Citations (Scopus)

How to utilize the transformability of digital signatures for solving the oracle problem

Mambo, M., Sakurai, K. & Okamoto, E., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Digital Signature
Decoding
Blind Signature
Signature
1 Citation (Scopus)

Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., Jan 1 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer terminals
Fingerprint
Encryption
Cryptography
Attribute

Identity-embedding method for decentralized public-key infrastructure

Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., Jan 1 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Infrastructure
Public key
Decentralized
Cryptography
Cryptosystem
1 Citation (Scopus)

Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

Zhao, L., Xiao, D. & Sakurai, K., Jul 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Substitution reactions
Information science
1 Citation (Scopus)

Image splicing verification based on pixel-based alignment method

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Sep 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image registration
Alignment
Pixel
Pixels
Concretes
2 Citations (Scopus)

Implementation and evaluation of bot detection scheme based on data transmission intervals

Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data communication systems
Launching
Servers
Testing
Denial-of-service attack

Implementation of efficient operations over GF(232) using graphics processing units

Tanaka, S., Yasuda, T. & Sakurai, K., Jan 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graphics Processing Unit
Cryptography
Multivariate Polynomials
Polynomial Systems
Polynomials
1 Citation (Scopus)

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Intrusion detection
Learning systems
Classifiers
Internet of things
4 Citations (Scopus)

Importance of data standardization in privacy-preserving k-means clustering

Su, C., Zhan, J. & Sakurai, K., Sep 28 2009, Database Systems for Advanced Applications - DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD. p. 276-286 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5667 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
K-means Clustering
Standardization
Data mining
Data Mining
1 Citation (Scopus)

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., Jan 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption
2 Citations (Scopus)

Improvement on secrecy capacity of wireless LAN using matched filter

Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., Dec 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Matched filters
Local area networks
Channel coding
Communication
Wire

Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

Zhao, L. & Sakurai, K., Jan 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Scheduling
Costs
Recovery
Scheduling algorithms
3 Citations (Scopus)

Improving linear cryptanalysis of LOKI91 by probabilistic counting method

Sakurai, K. & Furuya, S., Jan 1 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Counting
Attack
S-box
Maximum likelihood
1 Citation (Scopus)

Improving the accuracy of signature authentication using the eight principles of yong

Nishigori, T., Kawamoto, J. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Smartphones
1 Citation (Scopus)

Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

Han, Y., Sakai, A., Hori, Y. & Sakurai, K., Jul 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. Park, J. H., Zhan, J., Lee, C., Wang, G., Kim, T. & Yeo, S-S. (eds.). p. 105-110 6 p. (Communications in Computer and Information Science; vol. 36).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Firewall
Taxonomies
Taxonomy
Web Application
Attack

Induction and implementation of security requirements in each system block

Kim, T. H., Sakurai, K. & Hwang, S. M., Dec 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Proof by induction
Requirements
Customers
Software
5 Citations (Scopus)

Information hiding in subcells of a two-dimensional code

Teraura, N. & Sakurai, K., Dec 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Information hiding of two-dimensional code by multi-layer optical

Teraura, N. & Sakurai, K., Oct 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Printing
Wavelength