If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2016

Application of NTRU using group rings to partial decryption technique

Yasuda, T., Anada, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 203-213 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Ring
Cryptography
Partial
Public key
Polynomials
2 Citations (Scopus)

A proposal for cyber-attack trace-back using packet marking and logging

Li, P., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 603-607 5 p. 7794540. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A study of security management with cyber insurance

Ishikawa, T. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a68. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Insurance
Costs

Attribute-based two-tier signatures: Definition and construction

Anada, H., Arita, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers. Yun, A. & Kwon, S. (eds.). Springer Verlag, p. 36-49 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature
Attribute
Signature Scheme
Electronic document identification systems
Privacy
4 Citations (Scopus)

CCA-secure keyed-fully homomorphic encryption

Lai, J., Deng, R. H., Ma, C., Sakurai, K. & Weng, J., Jan 1 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Persiano, G., Cheng, C-M., Chung, K-M. & Yang, B-Y. (eds.). Springer Verlag, p. 70-98 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Cryptography
Identity-based
Homomorphic
Evaluation

Computational soundness of uniformity properties for multi-party computation based on LSSS

Zhao, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multiparty Computation
Soundness
Uniformity
Attack
Secret Sharing Scheme
1 Citation (Scopus)

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Number theory
Cryptography
1 Citation (Scopus)

Cross-group secret sharing for secure cloud storage service

Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Data privacy
Mobile phones
Mobile devices
Availability
3 Citations (Scopus)

Cyberbullying detection using parent-child relationship between comments

Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., Nov 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Association for Computing Machinery, Vol. Part F126325. p. 325-334 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
7 Citations (Scopus)

Efficient threshold secret sharing schemes secure against rushing cheaters

Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., Jan 1 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Scheme
Secret Sharing Scheme
Denote
Linearly
Flexibility

Evaluation of gamma ray durability of RF tag and application to the radiation environment

Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., Jan 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

durability
Gamma rays
Durability
gamma rays
Radiation
2 Citations (Scopus)

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Template matching
Decoding
Watermarking
Sorting

Expressive rating scheme by signatures with predications on ratees

Anada, H., Ruj, S. & Sakurai, K., Jan 1 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Springer Verlag, Vol. 9955 LNCS. p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Signature
Concretes
Signature Scheme
Digital Signature
1 Citation (Scopus)

On the application of clique problem for proof-of-work in cryptocurrencies

Bag, S., Ruj, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (eds.). Springer Verlag, p. 260-279 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9589).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Miners
Clique
Computing
Graph in graph theory
Electronic money
8 Citations (Scopus)

Retricoin: Bitcoin based on compact proofs of retrievability

Sengupta, B., Bag, S., Sakurai, K. & Ruj, S., Jan 4 2016, Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016. Association for Computing Machinery, a14. (ACM International Conference Proceeding Series; vol. 04-07-January-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Miners
Availability
Bandwidth
Electronic money
6 Citations (Scopus)

Yet another note on block withholding attack on bitcoin mining pools

Bag, S. & Sakurai, K., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reward
Mining
Miners
Attack
Incentives
2015
3 Citations (Scopus)

A proposal for detecting distributed cyber-attacks using automatic thresholding

Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2015, Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 152-159 8 p. 7153950. (Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
1 Citation (Scopus)

Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., Mar 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, Vol. 2015-January. p. 104-109 6 p. 7057865

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
Marketing
Image acquisition
Fourier transforms
Servers
3 Citations (Scopus)

Detection of illegal players in massively multiplayer online role playing game by classification algorithms

Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., Apr 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-April. p. 406-413 8 p. 7097999

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

Tanaka, S., Cheng, C. M. & Sakurai, K., Jan 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quadratic equation
Graphics Processing Unit
Galois field
Unknown
Evaluation
1 Citation (Scopus)

Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., Jan 1 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer terminals
Fingerprint
Encryption
Cryptography
Attribute

Identity-embedding method for decentralized public-key infrastructure

Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., Jan 1 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Infrastructure
Public key
Decentralized
Cryptography
Cryptosystem

Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., Feb 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polynomials
Costs
Graphics processing unit

Privacy-aware cloud-based input method editor

Kawamoto, J. & Sakurai, K., Jan 12 2015, 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014. Institute of Electrical and Electronics Engineers Inc., p. 209-213 5 p. 7008273. (2014 IEEE/CIC International Conference on Communications in China, ICCC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
3 Citations (Scopus)

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

Teraura, N. & Sakurai, K., Sep 14 2015, 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Institute of Electrical and Electronics Engineers Inc., 7266514

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Color

Reconstructing and visualizing evidence of artifact from firefox sessionstorage

Matsumoto, S., Onitsuka, Y., Kawamoto, J. & Sakurai, K., Jan 1 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 83-94 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Digital Forensics
World Wide Web
Personal computers
File System
3 Citations (Scopus)

Securing sensor networks by moderating frequencies

Sarkar, P., Mahish, P., Chowdhury, M. U. & Sakurai, K., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 173-185 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Network protocols
Magnetooptical effects
Sensors
Security of data
2014
4 Citations (Scopus)

Acquisition of evidence of web storage in HTML5 web browsers from memory image

Matsumoto, S. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
World Wide Web
Data storage equipment
Smartphones
HTML
6 Citations (Scopus)

An efficient robust secret sharing scheme with optimal cheater resiliency

Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., Jan 1 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Schaumont, P., Chakraborty, R. S. & Matyas, V. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resiliency
Secret Sharing Scheme
Authentication
Resilience
Secret Sharing
1 Citation (Scopus)

A parameterless learning algorithm for behavior-based detection

Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Network security
Experiments
8 Citations (Scopus)

Attribute-based signatures without pairings via the Fiat-Shamir paradigm

Anada, H., Arita, S. & Sakurai, K., Jan 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

A zero-watermarking-like steganography and potential applications

Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., Dec 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Watermarking
Digital watermarking
Camouflage
8 Citations (Scopus)

Efficient variant of rainbow without triangular matrix representation

Yasuda, T., Takagi, T. & Sakurai, K., Jan 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Triangular matrix
Matrix Representation
Cryptography
Public-key Cryptosystem
Signature
2 Citations (Scopus)

Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

Teraura, N. & Sakurai, K., Dec 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Computer vision
Internet
Color
Sensors
11 Citations (Scopus)

Fine-grained conditional proxy re-encryption and application

Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., Jan 1 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Hui, L. C. K., Yiu, S. M. & Liu, J. K. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Revocation
Attribute
Security Proof

Implementation of efficient operations over GF(232) using graphics processing units

Tanaka, S., Yasuda, T. & Sakurai, K., Jan 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graphics Processing Unit
Cryptography
Multivariate Polynomials
Polynomial Systems
Polynomials
2 Citations (Scopus)

Security model and analysis of fhmqv, Revisited

Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., Jan 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Model
Security Analysis
Provable Security
Public key cryptography
Defects

Survey and new idea for attribute-based identification scheme secure against reset attacks

Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., Jan 1 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Authentication
2 Citations (Scopus)

Towards "receipt-freeness" in remote biometric authentication

Ueshige, Y. & Sakurai, K., Dec 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Network protocols
Servers
2013

Analysis of methods for detecting compromised nodes and its countermeasures

Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., Feb 26 2013, IT Convergence and Security 2012. Vol. 215 LNEE. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
6 Citations (Scopus)

A proposal for the privacy leakage verification tool for android application developers

Matsumoto, S. & Sakurai, K., Apr 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Android (operating system)
9 Citations (Scopus)

A variant of rainbow with shorter secret key and faster signature generation

Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., May 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Quantum cryptography
4 Citations (Scopus)

Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

Yamauchi, K., Hori, Y. & Sakurai, K., Jan 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
Remote control
Support vector machines
Botnet
6 Citations (Scopus)

Detection of android API call using logging mechanism within android framework

Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Springer Verlag, Vol. 127 LNICST. p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Smartphones
Availability
Android (operating system)
Malware
2 Citations (Scopus)

Efficient computing over GF(216) using graphics processing unit

Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., Oct 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Polynomials
Subroutines
Graphics processing unit
1 Citation (Scopus)

Image splicing verification based on pixel-based alignment method

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Sep 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image registration
Alignment
Pixel
Pixels
Concretes

Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

Zhao, L. & Sakurai, K., Jan 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Scheduling
Costs
Recovery
Scheduling algorithms
9 Citations (Scopus)

Multivariate signature scheme using quadratic forms

Yasuda, T., Takagi, T. & Sakurai, K., Sep 26 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature Scheme
Quadratic form
Cryptography
Public-key Cryptosystem
Equivalence classes
1 Citation (Scopus)

Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

Tsuda, W., Hori, Y. & Sakurai, K., Dec 1 2013, Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013. p. 570-574 5 p. 6690949

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Wireless networks
Security of data
Wireless sensor networks
4 Citations (Scopus)

Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

Ruj, S. & Sakurai, K., Jan 1 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 402-407 6 p. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Sensor nodes
Tires
Base stations
Wireless networks