If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2011
2 Citations (Scopus)

Improvement on secrecy capacity of wireless LAN using matched filter

Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., Dec 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Matched filters
Local area networks
Channel coding
Communication
Wire
2 Citations (Scopus)

Integrity for the In-flight web page based on a fragile watermarking chain scheme

Gao, P., Nishide, T., Hori, Y. & Sakurai, K., May 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
Watermarking
Websites
Servers
Network protocols
3 Citations (Scopus)

Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

Ruan, N., Ren, Y., Hori, Y. & Sakurai, K., Dec 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 1739-1744 6 p. 6121040. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analytic hierarchy process
Wireless sensor networks
Sensor nodes
Authentication
Cryptography
5 Citations (Scopus)

Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

Fukushima, Y., Hori, Y. & Sakurai, K., Dec 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 352-361 10 p. 6120839. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Web browsers
Malware
51 Citations (Scopus)

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

Zhao, F., Nishide, T. & Sakurai, K., May 26 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Access Control
Access control
Cryptography
Attribute
18 Citations (Scopus)

Realizing proxy re-encryption in the symmetric world

Syalim, A., Nishide, T. & Sakurai, K., Dec 12 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 ed. p. 259-274 16 p. (Communications in Computer and Information Science; vol. 251 CCIS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
1 Citation (Scopus)

Securing location-aware services based on online/offline signatures in VANETs

Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., Sep 7 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular ad hoc networks
Vehicular Ad Hoc Networks
Signature
Signature Scheme
Network protocols
4 Citations (Scopus)

Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

Nishide, T. & Sakurai, K., Dec 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic money
2 Citations (Scopus)

Towards countermeasure of insider threat in network security

Hori, Y., Nishide, T. & Sakurai, K., Dec 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security
Access control
1 Citation (Scopus)

Towards optimal revocation and tracing schemes - The power of the ternary tree

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Sep 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Revocation
Tracing
Ternary
Labels
Broadcasting
6 Citations (Scopus)

Traceback framework against botmaster by sharing network communication pattern information

Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telecommunication networks
Servers
Communication
Monitoring
Botnet
2010
19 Citations (Scopus)

A behavior based malware detection scheme for avoiding false positive

Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Viruses
Malware
Pattern matching
Cryptography
Experiments
5 Citations (Scopus)

Adaptive and composable non-committing encryptions

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Diffie-Hellman
Encryption
Cryptography
Framework

Adaptive and composable non-interactive string-commitment protocols

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
7 Citations (Scopus)

A design of history based traffic filtering with probabilistic packet marking against DoS attacks

Kiuchi, T., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telecommunication traffic
Routers
Communication
Servers
Denial-of-service attack

Behavior control based on dynamic code translation

Sakai, A., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Binary codes
Static analysis

Darknet monitoring on real-operated networks

Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Sensors
Sensor networks
Servers
Internet
37 Citations (Scopus)

Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterogeneous Systems
Replica
Fault-tolerant
Scheduling
Scheduling algorithms
1 Citation (Scopus)

Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

Zhao, L., Xiao, D. & Sakurai, K., Jul 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Substitution reactions
Information science
2 Citations (Scopus)

Implementation and evaluation of bot detection scheme based on data transmission intervals

Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., Dec 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data communication systems
Launching
Servers
Testing
Denial-of-service attack

Model-based intrusion detection by abstract interpretation

Hua, J., Nishide, T. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Semantics
Concretes
1 Citation (Scopus)

Modeling and containment of search worms targeting web applications

Hua, J. & Sakurai, K., Aug 3 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Worm
Web Application
Modeling
Honeypot
Propagation
11 Citations (Scopus)

Preserving integrity and confidentiality of a directed acyclic graph model of provenance

Syalim, A., Nishide, T. & Sakurai, K., Oct 29 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 311-318 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provenance
Directed Acyclic Graph
Confidentiality
Graph Model
Access control
2 Citations (Scopus)

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Service-oriented
Search engines
Scheduling algorithms
Scheduling Algorithm
Quality of service
2 Citations (Scopus)

Study of log file dispersion management method

Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Redundancy
2 Citations (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2009

A signature scheme associated with universal re-signcryption

Tatara, K. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 780-785 6 p. 5066564. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computational complexity
Semantics
2 Citations (Scopus)

Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

You, I., Sakurai, K. & Hori, Y., Dec 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
24 Citations (Scopus)

Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

Syalim, A., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk analysis
Risk management
Risk assessment
Information technology
Information systems
1 Citation (Scopus)

Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., Jul 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi agent systems
Multi-agent Systems
Servers
Server
Security systems

Design and object-oriented implementation of an intelligence entity sharing pool

Huang, R., Ma, J., Takahashi, K. & Sakurai, K., Nov 17 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Processing
Decomposition
Chemical analysis
1 Citation (Scopus)

Efficient intrusion detection based on static analysis and stack walks

Hua, J., Li, M., Sakurai, K. & Ren, Y., Dec 1 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Intrusion detection
Intrusion Detection
Static Analysis
Walk

Enhancing cooperative behavior for online reputation systems by group selection

Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Online systems
Game theory
1 Citation (Scopus)

Flow traffic classification with support vector machine by using payload length

Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., Dec 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Support vector machines
Planning
Monitoring

Formal verification for access control in web information sharing system

Sakai, A., Hori, Y. & Sakurai, K., Nov 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information Sharing
Formal Verification
Access Control
Access control
Predicate Logic
10 Citations (Scopus)

Grouping provenance information to improve efficiency of access Control

Syalim, A., Hori, Y. & Sakurai, K., Nov 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provenance
Access Control
Access control
Grouping
Directed Acyclic Graph
4 Citations (Scopus)

Importance of data standardization in privacy-preserving k-means clustering

Su, C., Zhan, J. & Sakurai, K., Sep 28 2009, Database Systems for Advanced Applications - DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD. p. 276-286 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5667 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
K-means Clustering
Standardization
Data mining
Data Mining
1 Citation (Scopus)

Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

Han, Y., Sakai, A., Hori, Y. & Sakurai, K., Jul 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. Park, J. H., Zhan, J., Lee, C., Wang, G., Kim, T. & Yeo, S-S. (eds.). p. 105-110 6 p. (Communications in Computer and Information Science; vol. 36).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Firewall
Taxonomies
Taxonomy
Web Application
Attack

Polymorphic worm detection by analyzing maximum length of instruction sequence in network packets

Tatara, K., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 972-977 6 p. 5066596. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packet networks
Intrusion detection

Reconsidering data logging in light of digital forensics

Chou, B. H., Takahashi, K., Hori, Y. & Sakurai, K., Jul 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. p. 111-118 8 p. (Communications in Computer and Information Science; vol. 36).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital Forensics
Embedded systems
Shooting
Datalog
Embedded Systems
2 Citations (Scopus)

Secrecy capacity of wireless LAN

Nishi, R., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 905-910 6 p. 5066585. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Local area networks
Communication systems
Channel coding
5 Citations (Scopus)

Security analysis for P2P routing protocols

Fujii, T., Ren, Y., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 899-904 6 p. 5066584. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Patents and inventions
4 Citations (Scopus)

Ternary subset difference method and its quantitative analysis

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., Nov 9 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantitative Analysis
Ternary
Difference Method
Labels
Subset

The optimal choice by resource consumers in Grid market

Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling algorithms
Economics
Costs
Experiments
2008
8 Citations (Scopus)

A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

Su, C. & Sakurai, K., Dec 1 2008, Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings. p. 170-181 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5139 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frequent Pattern
Association Rule Mining
Privacy Preserving
Association rules
Collusion
2 Citations (Scopus)

Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection

Tatara, K., Hori, Y. & Sakurai, K., Sep 12 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 485-489 5 p. 4505774. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packet networks
Viruses
6 Citations (Scopus)

A new scheme for distributed density estimation based privacy-preserving clustering

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., Aug 14 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 112-119 8 p. 4529328. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear transformations
Gaussian distribution
Information retrieval
Data mining
Industry
1 Citation (Scopus)

A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

Chou, B. H., Tatara, K., Sakuraba, T., Hori, Y. & Sakurai, K., Sep 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 421-426 6 p. 4511604. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

virtualization
integrity
event
performance
Module
4 Citations (Scopus)

Exploring security countermeasures along the attack sequence

Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., Sep 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

threat
time
Countermeasures
Attack
Threat
1 Citation (Scopus)

FPGA-targeted hardware implementations of K2

Kiyomoto, S., Tanaka, T. & Sakurai, K., Dec 1 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field programmable gate arrays (FPGA)
Hardware
Cryptography
Feedback control