If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2013

Supporting secure provenance update by keeping "provenance" of the provenance

Syalim, A., Nishide, T. & Sakurai, K., Mar 25 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provenance
Update
Data storage equipment
Signature
Vertex of a graph
2 Citations (Scopus)

The development of radiation-resistant rf TAGS for use at nuclear power plants

Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., Jan 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear power plants
Radiation
Radiation damage
Radio frequency identification (RFID)
Dosimetry
3 Citations (Scopus)

Upper bound of the length of information embedd in RSA public key efficiently

Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., May 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2012
6 Citations (Scopus)

A behavior-based detection method for outbreaks of low-rate attacks

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security

Adaptive and composable non-interactive string-commitment protocols

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; vol. 222 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Strings
Cryptography
Zero-knowledge
Public key
16 Citations (Scopus)

A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

Hao, D. & Sakurai, K., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Trajectories
Denial-of-service attack
3 Citations (Scopus)

A method for embedding secret key information in RSA public key and its application

Kitahara, M., Nishide, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
certification
1 Citation (Scopus)

Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

Su, C., Wang, G. & Sakurai, K., Nov 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Processing
Industry
Internet of things
3 Citations (Scopus)

An image splicing detection based on interpolation analysis

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Dec 27 2012, Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings. p. 390-401 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7674 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital cameras
Interpolation
Interpolate
Concretes
Digital Image
1 Citation (Scopus)

Application of scalar multiplication of edwards curves to pairing-based cryptography

Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. Vol. 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pairing-based Cryptography
Scalar multiplication
Cryptography
Curve
Pairing
8 Citations (Scopus)

Barrier: A lightweight hypervisor for protecting kernel integrity via memory isolation

Hua, J. & Sakurai, K., Jul 12 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 1470-1477 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Computer operating systems
Personal computers
Computer hardware
Servers
3 Citations (Scopus)

Collaborative behavior visualization and its detection by observing darknet traffic

Akimoto, S., Hori, Y. & Sakurai, K., Dec 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Attack
Traffic
Scanning
DDoS
3 Citations (Scopus)

Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

Nakamura, S., Hori, Y. & Sakurai, K., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Wireless sensor networks
Topology
Network protocols
Communication
4 Citations (Scopus)

Cooperatively securing network coding against pollution attacks with incentive mechanism

Xu, Y. & Sakurai, K., May 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network coding
Pollution
Ions
1 Citation (Scopus)

Cryptanalysis of randomized arithmetic codes based on markov model

Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., Nov 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptanalysis
Encryption
Markov Model
Cryptography
Attack
13 Citations (Scopus)

Differential fault analysis of full lblock

Zhao, L., Nishide, T. & Sakurai, K., Jun 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault Analysis
Fault
S-box
Attack
Countermeasures
2 Citations (Scopus)

Efficient implementation of evaluating multivariate quadratic system with GPUs

Tanaka, S., Nishide, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Hardness
Polynomials
commodity
Computational complexity
1 Citation (Scopus)

Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Springer Verlag, Vol. 7690 LNCS. p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stream Cipher
Quadratic Systems
Quadratic Polynomial
Multivariate Polynomials
Polynomial Systems
5 Citations (Scopus)

Information hiding in subcells of a two-dimensional code

Teraura, N. & Sakurai, K., Dec 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Information hiding of two-dimensional code by multi-layer optical

Teraura, N. & Sakurai, K., Oct 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Printing
Wavelength
3 Citations (Scopus)

Mixed-strategy game based trust management for clustered wireless sensor networks

Hao, D., Adhikari, A. & Sakurai, K., Sep 7 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trust Management
Mixed Strategy
Wireless Sensor Networks
Wireless sensor networks
Game
37 Citations (Scopus)

Multi-user keyword search scheme for secure data sharing with fine-grained access control

Zhao, F., Nishide, T. & Sakurai, K., Aug 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7259 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keyword Search
Data Sharing
Access Control
Access control
Cryptography
1 Citation (Scopus)

On revenue driven server management incloud

Zhao, L. & Sakurai, K., Aug 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Farms
Costs
Recovery
1 Citation (Scopus)

Preventing the access of fraudulent WEB sites by using a special two-dimensional code

Teraura, N. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 645-650 6 p. 6296930. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile phones
Servers
Camouflage
Lead
incident
1 Citation (Scopus)

Proposal of the hierarchical file server groups for implementing mandatory access control

Sakuraba, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 639-644 6 p. 6296929. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Servers
security policy
Formal concept analysis
Group
10 Citations (Scopus)

Reducing the key size of rainbow using non-commutative rings

Yasuda, T., Sakurai, K. & Takagi, T., Mar 8 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. p. 68-83 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7178 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Non-commutative Rings
Public-key Cryptosystem
Cryptography
RSA Cryptosystem
Quantum Cryptography

Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Dec 1 2012, E-Business and Telecommunications: International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers. Sevillano, J. L. & Filipe, J. (eds.). p. 233-248 16 p. (Communications in Computer and Information Science; vol. 314).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Encryption
Revocation
Tracing
Ternary
Cryptography
14 Citations (Scopus)

Secure keyword search using bloom filter with specified character positions

Suga, T., Nishide, T. & Sakurai, K., Sep 14 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings. p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7496 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bloom Filter
Keyword Search
Cryptography
Encryption
Character
1 Citation (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Security Model
Diffie-Hellman
Framework
1 Citation (Scopus)

Weakness of provably secure searchable encryption against frequency analysis

Suga, T., Nishide, T. & Sakurai, K., Dec 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2011

Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

Liao, X., Hao, D. & Sakurai, K., Dec 1 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

information exchange
Wireless ad hoc networks
Numerical analysis
reputation
rationality
5 Citations (Scopus)

A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

Hao, D., Ren, Y. & Sakurai, K., Nov 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Game theory
Mobile ad hoc networks
Game Theory
Surveillance
Monitor
4 Citations (Scopus)

A generic evaluation method for key management schemes in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Analytic hierarchy process
Sensor nodes
Authentication
Cryptography
5 Citations (Scopus)

An efficient key generation method in audio zero-watermarking

Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Sampling
Experiments
3 Citations (Scopus)

A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

Zhao, L., Adhikari, A. & Sakurai, K., Feb 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Centroid
Spatial Distribution
Spatial distribution
Entropy
Watermarking

A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

Zhao, L., Adhikari, A. & Sakurai, K., Jan 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (eds.). Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Centroid
Spatial Distribution
Spatial distribution
Entropy
Watermarking
11 Citations (Scopus)

A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

Zhao, L., Ren, Y. & Sakurai, K., Jun 3 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling algorithms
Natural sciences computing
Communication
Costs
Topology
44 Citations (Scopus)

A robust and compression-combined digital image encryption method based on compressive sensing

Huang, R. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Gaussian distribution
Packet loss
Logistics
Experiments
3 Citations (Scopus)

A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

Yasuda, T. & Sakurai, K., Dec 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Analysis
Factorization
Signature
Paradigm
Quantum cryptography
27 Citations (Scopus)

A SMS-based mobile botnet using flooding algorithm

Hua, J. & Sakurai, K., Jun 20 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flooding
Mobile Phone
Malware
Command and Control
Mobile Computing

A study of communication route selection considering route security

Etoh, F., Hori, Y. & Sakurai, K., Sep 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Mobile phones
Telecommunication
Internet
Bandwidth
13 Citations (Scopus)

Classification on attacks in wireless ad hoc networks: A game theoretic view

Liao, X., Hao, D. & Sakurai, K., Sep 1 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Game theory
5 Citations (Scopus)

Cryptanalysis on an image scrambling encryption scheme based on pixel bit

Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., Feb 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image Encryption
Cryptanalysis
Cryptography
Pixel
Pixels

Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., Jan 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (eds.). Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image Encryption
Cryptanalysis
Cryptography
Pixel
Pixels

Customized program protection for a user customized data protection framework

Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., Aug 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Internet

Design and implementation of a forced encryption kernel module

Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Cryptography
Chemical activation
Defects

Design and implementation of document access control model based on role and security policy

Mao, L., Yao, S., Zhang, K. & Sakurai, K., Nov 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Policy
Access Control
Access control
Model-based
Role-based Access Control
16 Citations (Scopus)

Distributed Paillier cryptosystem without trusted dealer

Nishide, T. & Sakurai, K., Feb 1 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Multiparty Computation
Eliminate
Attack
1 Citation (Scopus)

Distributed Paillier Cryptosystem without Trusted Dealer

Nishide, T. & Sakurai, K., Jan 1 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Chung, Y. & Yung, M. (eds.). Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Multiparty Computation
Eliminate
Attack
6 Citations (Scopus)

General fault attacks on multivariate public key cryptosystems

Hashimoto, Y., Takagi, T. & Sakurai, K., Dec 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault Attacks
Public-key Cryptosystem
Cryptography
Attack
Triangular Systems