Research Output per year
Research Output 1991 2020
- 50 - 100 out of 319 results
- Publication Year, Title (descending)
Application of NTRU using group rings to partial decryption technique
Yasuda, T., Anada, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 203-213 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A proposal for cyber-attack trace-back using packet marking and logging
Li, P., Feng, Y., Kawamoto, J. & Sakurai, K., Dec 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 603-607 5 p. 7794540. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A study of security management with cyber insurance
Ishikawa, T. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a68. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Attribute-based two-tier signatures: Definition and construction
Anada, H., Arita, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers. Yun, A. & Kwon, S. (eds.). Springer Verlag, p. 36-49 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
CCA-secure keyed-fully homomorphic encryption
Lai, J., Deng, R. H., Ma, C., Sakurai, K. & Weng, J., Jan 1 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Persiano, G., Cheng, C-M., Chung, K-M. & Yang, B-Y. (eds.). Springer Verlag, p. 70-98 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Computational soundness of uniformity properties for multi-party computation based on LSSS
Zhao, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields
Yasuda, T., Takagi, T. & Sakurai, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Cross-group secret sharing for secure cloud storage service
Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Cyberbullying detection using parent-child relationship between comments
Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., Nov 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Association for Computing Machinery, Vol. Part F126325. p. 325-334 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Efficient threshold secret sharing schemes secure against rushing cheaters
Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., Jan 1 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Evaluation of gamma ray durability of RF tag and application to the radiation environment
Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., Jan 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm
Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Expressive rating scheme by signatures with predications on ratees
Anada, H., Ruj, S. & Sakurai, K., Jan 1 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Springer Verlag, Vol. 9955 LNCS. p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
On the application of clique problem for proof-of-work in cryptocurrencies
Bag, S., Ruj, S. & Sakurai, K., Jan 1 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (eds.). Springer Verlag, p. 260-279 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9589).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Retricoin: Bitcoin based on compact proofs of retrievability
Sengupta, B., Bag, S., Sakurai, K. & Ruj, S., Jan 4 2016, Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016. Association for Computing Machinery, a14. (ACM International Conference Proceeding Series; vol. 04-07-January-2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Yet another note on block withholding attack on bitcoin mining pools
Bag, S. & Sakurai, K., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A proposal for detecting distributed cyber-attacks using automatic thresholding
Feng, Y., Hori, Y. & Sakurai, K., Jan 1 2015, Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 152-159 8 p. 7153950. (Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors
Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., Mar 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, Vol. 2015-January. p. 104-109 6 p. 7057865Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Detection of illegal players in massively multiplayer online role playing game by classification algorithms
Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., Apr 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-April. p. 406-413 8 p. 7097999Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU
Tanaka, S., Cheng, C. M. & Sakurai, K., Jan 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse
Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., Jan 1 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Identity-embedding method for decentralized public-key infrastructure
Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., Jan 1 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units
Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., Feb 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Privacy-aware cloud-based input method editor
Kawamoto, J. & Sakurai, K., Jan 12 2015, 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014. Institute of Electrical and Electronics Engineers Inc., p. 209-213 5 p. 7008273. (2014 IEEE/CIC International Conference on Communications in China, ICCC 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones
Teraura, N. & Sakurai, K., Sep 14 2015, 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Institute of Electrical and Electronics Engineers Inc., 7266514Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Reconstructing and visualizing evidence of artifact from firefox sessionstorage
Matsumoto, S., Onitsuka, Y., Kawamoto, J. & Sakurai, K., Jan 1 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 83-94 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Securing sensor networks by moderating frequencies
Sarkar, P., Mahish, P., Chowdhury, M. U. & Sakurai, K., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 173-185 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Acquisition of evidence of web storage in HTML5 web browsers from memory image
Matsumoto, S. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
An efficient robust secret sharing scheme with optimal cheater resiliency
Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., Jan 1 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Schaumont, P., Chakraborty, R. S. & Matyas, V. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A parameterless learning algorithm for behavior-based detection
Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., Jan 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Attribute-based signatures without pairings via the Fiat-Shamir paradigm
Anada, H., Arita, S. & Sakurai, K., Jan 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A zero-watermarking-like steganography and potential applications
Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., Dec 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Efficient variant of rainbow without triangular matrix representation
Yasuda, T., Takagi, T. & Sakurai, K., Jan 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones
Teraura, N. & Sakurai, K., Dec 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Fine-grained conditional proxy re-encryption and application
Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., Jan 1 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Hui, L. C. K., Yiu, S. M. & Liu, J. K. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Implementation of efficient operations over GF(232) using graphics processing units
Tanaka, S., Yasuda, T. & Sakurai, K., Jan 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Security model and analysis of fhmqv, Revisited
Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., Jan 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Survey and new idea for attribute-based identification scheme secure against reset attacks
Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., Jan 1 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Towards "receipt-freeness" in remote biometric authentication
Ueshige, Y. & Sakurai, K., Dec 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Analysis of methods for detecting compromised nodes and its countermeasures
Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., Feb 26 2013, IT Convergence and Security 2012. Vol. 215 LNEE. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A proposal for the privacy leakage verification tool for android application developers
Matsumoto, S. & Sakurai, K., Apr 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A variant of rainbow with shorter secret key and faster signature generation
Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., May 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM
Yamauchi, K., Hori, Y. & Sakurai, K., Jan 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Detection of android API call using logging mechanism within android framework
Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Springer Verlag, Vol. 127 LNICST. p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Efficient computing over GF(216) using graphics processing unit
Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., Oct 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Image splicing verification based on pixel-based alignment method
Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Sep 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud
Zhao, L. & Sakurai, K., Jan 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Multivariate signature scheme using quadratic forms
Yasuda, T., Takagi, T. & Sakurai, K., Sep 26 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network
Tsuda, W., Hori, Y. & Sakurai, K., Dec 1 2013, Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013. p. 570-574 5 p. 6690949Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique
Ruj, S. & Sakurai, K., Jan 1 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 402-407 6 p. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution