• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1991 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2011

    A generic evaluation method for key management schemes in wireless sensor network

    Na, R., Ren, Y., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • An efficient key generation method in audio zero-watermarking

    Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Zhao, L., Adhikari, A. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Zhao, L., Ren, Y. & Sakurai, K., 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • A robust and compression-combined digital image encryption method based on compressive sensing

    Huang, R. & Sakurai, K., Dec 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Citations (Scopus)
  • A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Yasuda, T. & Sakurai, K., Dec 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A SMS-based mobile botnet using flooding algorithm

    Hua, J. & Sakurai, K., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • A study of communication route selection considering route security

    Etoh, F., Hori, Y. & Sakurai, K., Sep 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Classification on attacks in wireless ad hoc networks: A game theoretic view

    Liao, X., Hao, D. & Sakurai, K., 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Customized program protection for a user customized data protection framework

    Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., Aug 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of a forced encryption kernel module

    Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of document access control model based on role and security policy

    Mao, L., Yao, S., Zhang, K. & Sakurai, K., Nov 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed Paillier cryptosystem without trusted dealer

    Nishide, T. & Sakurai, K., 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • General fault attacks on multivariate public key cryptosystems

    Hashimoto, Y., Takagi, T. & Sakurai, K., Dec 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Improvement on secrecy capacity of wireless LAN using matched filter

    Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., Dec 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Gao, P., Nishide, T., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

    Ruan, N., Ren, Y., Hori, Y. & Sakurai, K., Dec 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 1739-1744 6 p. 6121040. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

    Fukushima, Y., Hori, Y. & Sakurai, K., 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 352-361 10 p. 6120839. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

    Zhao, F., Nishide, T. & Sakurai, K., May 26 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    60 Citations (Scopus)
  • Realizing proxy re-encryption in the symmetric world

    Syalim, A., Nishide, T. & Sakurai, K., 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 ed. p. 259-274 16 p. (Communications in Computer and Information Science; vol. 251 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Securing location-aware services based on online/offline signatures in VANETs

    Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

    Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Towards countermeasure of insider threat in network security

    Hori, Y., Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Sep 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Traceback framework against botmaster by sharing network communication pattern information

    Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2010

    A behavior based malware detection scheme for avoiding false positive

    Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Adaptive and composable non-committing encryptions

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Kiuchi, T., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Behavior control based on dynamic code translation

    Sakai, A., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Darknet monitoring on real-operated networks

    Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Citations (Scopus)
  • Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Zhao, L., Xiao, D. & Sakurai, K., Jul 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Model-based intrusion detection by abstract interpretation

    Hua, J., Nishide, T. & Sakurai, K., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and containment of search worms targeting web applications

    Hua, J. & Sakurai, K., 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Preserving integrity and confidentiality of a directed acyclic graph model of provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 311-318 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

    Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Study of log file dispersion management method

    Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    A signature scheme associated with universal re-signcryption

    Tatara, K. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 780-785 6 p. 5066564. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    You, I., Sakurai, K. & Hori, Y., Dec 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

    Syalim, A., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., Jul 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and object-oriented implementation of an intelligence entity sharing pool

    Huang, R., Ma, J., Takahashi, K. & Sakurai, K., 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient intrusion detection based on static analysis and stack walks

    Hua, J., Li, M., Sakurai, K. & Ren, Y., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Enhancing cooperative behavior for online reputation systems by group selection

    Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., Dec 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Formal verification for access control in web information sharing system

    Sakai, A., Hori, Y. & Sakurai, K., Nov 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution