If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
Conference contribution
2 Citations (Scopus)

Integrity for the In-flight web page based on a fragile watermarking chain scheme

Gao, P., Nishide, T., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
Watermarking
Websites
Servers
Network protocols
13 Citations (Scopus)

Interactively combining 2D and 3D visualization for network traffic monitoring

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Monitoring
Computer networks
Communication

Invalidation of mailing list address to block spam mails

Takahashi, K., Sakai, A. & Sakurai, K., Jan 1 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

K2 stream cipher

Kiyomoto, S., Tanaka, T. & Sakurai, K., Dec 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; vol. 23 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback control
Clocks
1 Citation (Scopus)

Key distribution scheme using matched filter resistant against DoS attack

Nishi, R., Hori, Y. & Sakurai, K., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Matched filters
Glossaries
Local area networks
Network protocols
Denial-of-service attack

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., Jun 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image recognition
Internet
Domestic appliances
Cameras
Internet of things
1 Citation (Scopus)

Making hash functions from block ciphers secure and efficient by using convolutional codes

Inoue, T. & Sakurai, K., Jan 1 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Convolutional Codes
Block Ciphers
Hash functions
Convolutional codes
Block Codes
1 Citation (Scopus)

Methodology for evaluating information security countermeasures of a system

Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
methodology
Industry
Countermeasures
Information security
3 Citations (Scopus)

Mixed-strategy game based trust management for clustered wireless sensor networks

Hao, D., Adhikari, A. & Sakurai, K., Sep 7 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trust Management
Mixed Strategy
Wireless Sensor Networks
Wireless sensor networks
Game
1 Citation (Scopus)

Mobile agent based security monitoring and analysis for the electric power infrastructure

David, M. W. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Monitoring
Intrusion detection
Power transmission
Failure analysis

Model-based intrusion detection by abstract interpretation

Hua, J., Nishide, T. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Semantics
Concretes
1 Citation (Scopus)

Modeling and containment of search worms targeting web applications

Hua, J. & Sakurai, K., Aug 3 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Worm
Web Application
Modeling
Honeypot
Propagation
1 Citation (Scopus)

Monitoring unused IP addresses on segments managed by DHCP

Mizoguchi, S., Hori, Y. & Sakurai, K., Dec 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Monitoring
Internet
38 Citations (Scopus)

Multi-user keyword search scheme for secure data sharing with fine-grained access control

Zhao, F., Nishide, T. & Sakurai, K., Aug 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7259 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keyword Search
Data Sharing
Access Control
Access control
Cryptography
10 Citations (Scopus)

Multivariate signature scheme using quadratic forms

Yasuda, T., Takagi, T. & Sakurai, K., Sep 26 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature Scheme
Quadratic form
Cryptography
Public-key Cryptosystem
Equivalence classes

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Topology
Neuroevolution
Neural Networks
Neural networks

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

New semantically secure public-key cryptosystems from the rsa-primitive

Sakurai, K. & Takagi, T., Jan 1 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Cryptosystem
Semantic Security
Semantics

On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Many to one
One-way Function
Hardness
Randomness
Discrete Logarithm

On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ad hoc networks
Ad Hoc Networks
Incentives
Routing
Incentive Compatibility
5 Citations (Scopus)

One-round protocol for two-party verifier-based password-authenticated key exchange

Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Key Exchange
Password
Network protocols
Security Protocols
Server
36 Citations (Scopus)

On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

Okeya, K. & Sakurai, K., Jan 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Subtraction
Countermeasures
Doubling
Electronic crime countermeasures

On-line versus off-line in money-making strategies with brokerage

Dannoura, E. & Sakurai, K., Jan 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Line
Competitive Ratio
Strategy
Money
Lower bound
1 Citation (Scopus)

On revenue driven server management incloud

Zhao, L. & Sakurai, K., Aug 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Farms
Costs
Recovery
1 Citation (Scopus)

On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

Sakurai, K., Jan 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identification Scheme
Soundness
Knowledge
Language
1 Citation (Scopus)

On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Activation
Chemical activation
Attack
Model
Recommendations
4 Citations (Scopus)

On studying P2P topology construction based on virtual regions and its effect on search performance

Wang, Y., Wang, W., Sakurai, K. & Hori, Y., Jan 1 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Topology
Overlay networks
Proximity
Semantic Similarity
1 Citation (Scopus)

On the application of clique problem for proof-of-work in cryptocurrencies

Bag, S., Ruj, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (eds.). Springer Verlag, p. 260-279 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9589).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Miners
Clique
Computing
Graph in graph theory
Electronic money

On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

Yanbe, A. & Sakurai, K., Jan 1 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Wong, C. K., Wong, C. K. & Cai, J-Y. (eds.). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1090).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simple Game
Stochastic Games
Computational complexity
Optimal Strategy
Two-person Games
5 Citations (Scopus)

On the complexity of constant round ZKIP of possession of knowledge

Itoh, T. & Sakurai, K., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proof Systems
Zero-knowledge Proof
Black Box
Perfect Simulation
L'Hôpital's Rule
5 Citations (Scopus)

On the complexity of hyperelliptic discrete logarithm problem

Shizuya, H., Itoh, T. & Sakurai, K., Jan 1 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 547 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm Problem
Computational complexity
Complexity Theory
Elliptic Curves
Galois field
6 Citations (Scopus)

On the discrepancy between serial and parallel of zero-knowledge protocols

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (ed.). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge
Discrepancy
1 Citation (Scopus)

On the power of multidoubling in speeding up elliptic scalar multiplication

Sakai, Y. & Sakurai, K., Jan 1 2001, Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. Vaudenay, S. & Youssef, A. M. (eds.). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2259).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Elliptic Curves
Galois field
Computational complexity
Doubling

On the robustness of visual cryptographic schemes

Dutta, S., Roy, P. S., Adhikari, A. & Sakurai, K., Jan 1 2017, Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Kim, H. J., Liu, F., Perez-Gonzalez, F. & Shi, Y. Q. (eds.). Springer Verlag, p. 251-262 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10082 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secret Sharing Scheme
Cryptography
Robustness
Visual Cryptography
Coalitions
3 Citations (Scopus)

On the security of a modified paillier public-key primitive

Sakurai, K. & Takagi, T., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Springer Verlag, Vol. 2384. p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key
Cryptosystem
Cryptography
Modulus
Factoring
1 Citation (Scopus)

On the security of SELinux with a simplified policy

Sueyasu, K., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Macros
Linux
Computer operating systems
Servers
4 Citations (Scopus)

On threshold RSA-signing with no dealer

Miyazaki, S., Sakurai, K. & Yung, M., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed Computation
Attack
Demonstrate
2 Citations (Scopus)

On unconditionally binding code-based commitment schemes

Morozov, K., Roy, P. S. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 101. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardness
Decoding
Cryptography
5 Citations (Scopus)

On zero-knowledge proofs: "From membership to decision" (extended abstract)

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Over Fp vs. Over F2n and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Cryptography
Software
Program processors
3 Citations (Scopus)

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 522-528 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Controllers
Processing
Switches
Communication

Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., Feb 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polynomials
Costs
Graphics processing unit
4 Citations (Scopus)

Parameter manipulation attack prevention and detection by using web application deception proxy

Ishikawa, T. & Sakurai, K., Jan 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 74. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
3 Citations (Scopus)

Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

Ruan, N., Ren, Y., Hori, Y. & Sakurai, K., Dec 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 1739-1744 6 p. 6121040. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analytic hierarchy process
Wireless sensor networks
Sensor nodes
Authentication
Cryptography
1 Citation (Scopus)

Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

Tsuda, W., Hori, Y. & Sakurai, K., Dec 1 2013, Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013. p. 570-574 5 p. 6690949. (Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Wireless networks
Security of data
Wireless sensor networks

Polymorphic worm detection by analyzing maximum length of instruction sequence in network packets

Tatara, K., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 972-977 6 p. 5066596. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packet networks
Intrusion detection
74 Citations (Scopus)

Power analysis breaks elliptic curve cryptosystems even secure against the timing attack

Okeya, K. & Sakurai, K., Jan 1 2000, Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings. Roy, B. & Okamoto, E. (eds.). Springer Verlag, p. 178-190 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Timing Attack
Elliptic Curve Cryptosystem
Scalar multiplication
Power Analysis
Cryptography
11 Citations (Scopus)

Preserving integrity and confidentiality of a directed acyclic graph model of provenance

Syalim, A., Nishide, T. & Sakurai, K., Oct 29 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 311-318 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provenance
Directed Acyclic Graph
Confidentiality
Graph Model
Access control
1 Citation (Scopus)

Preventing the access of fraudulent WEB sites by using a special two-dimensional code

Teraura, N. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 645-650 6 p. 6296930. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile phones
Servers
Camouflage
Lead
incident