If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2008
3 Citations (Scopus)

Granularity considering in a trust model for P2P networks

Li, M., Ren, Y., Sakurai, K., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Invalidation of mailing list address to block spam mails

Takahashi, K., Sakai, A. & Sakurai, K., Jan 1 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

K2 stream cipher

Kiyomoto, S., Tanaka, T. & Sakurai, K., Dec 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; vol. 23 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback control
Clocks
1 Citation (Scopus)

Key distribution scheme using matched filter resistant against DoS attack

Nishi, R., Hori, Y. & Sakurai, K., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Matched filters
Glossaries
Local area networks
Network protocols
Denial-of-service attack
1 Citation (Scopus)

Methodology for evaluating information security countermeasures of a system

Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
methodology
Industry
Countermeasures
Information security
1 Citation (Scopus)

Monitoring unused IP addresses on segments managed by DHCP

Mizoguchi, S., Hori, Y. & Sakurai, K., Dec 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Monitoring
Internet
7 Citations (Scopus)

Security policy pre-evaluation towards risk analysis

Yi, H., Hori, Y. & Sakurai, K., Sep 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 415-420 6 p. 4511603. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

security policy
Risk analysis
evaluation
Evaluation
Security policy

Thoughts on multi-disciplinary inspired research on open network and information system

Yufeng, W., Hori, Y. & Sakurai, K., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
Economics
Telecommunication networks
Macros

Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., Dec 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anchors
Authentication
6 Citations (Scopus)

Trust similarity measure in trust model for P2P networks

Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., Dec 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

Research output: Chapter in Book/Report/Conference proceedingConference contribution

reputation
2007
1 Citation (Scopus)

An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reputation System
Activation
Chemical activation
Attack
Metric
20 Citations (Scopus)

Analysis of privacy disclosure in DNS query

Zhao, F., Hori, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Internet

An approach of program analysis prevention for information protection

Takahashi, K., Liu, Z. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
2 Citations (Scopus)

An approach of trusted program generation for user-responsible privacy

Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., Dec 1 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Internet
Leakage
3 Citations (Scopus)

An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., Aug 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Mobile phones
Integrated circuits
Servers

An intrusion detection system which can restore altered data

Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., Dec 3 2007, Fourth International Conference on Information Technology and Applications, ICITA 2007. p. 29-34 6 p. (Fourth International Conference on Information Technology and Applications, ICITA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Intrusion detection
Data storage equipment
4 Citations (Scopus)

A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption

Hada, S. & Sakurai, K., Dec 1 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Encryption
Cryptography
Transform
Obfuscation
1 Citation (Scopus)

A policy language for the extended reference monitor in trusted operating systems

Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., Aug 29 2007, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007. p. 1160-1166 7 p. 4159922. (Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Semantics

A practical proxy device for protecting RFID tag's identifier

Yeo, S. S., Sakurai, K. & Kwak, J., 2007, Proceedings - 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007. p. 55-58 4 p. 4290939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Consumer electronics
Automobiles
Radio frequency identification
Tag
2 Citations (Scopus)

A proposal of efficient scheme of key management using ID-based encryption and biometrics

Izumi, A., Ueshige, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 29-34 6 p. 4197245. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Cryptography
Authentication
Public key cryptography
Electronic document identification systems
21 Citations (Scopus)

Bot detection based on traffic analysis

Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 303-306 4 p. 4438445. (Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Information systems
Network protocols
Communication
Botnet
7 Citations (Scopus)

Economic-inspired truthful reputation feedback mechanism in P2P networks

Wang, Y., Hori, Y. & Sakurai, K., Aug 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Economics
Security of data
1 Citation (Scopus)

Enforcement of integrated security policy in trusted operating systems

Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., Dec 1 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Policy
Access control
Operating Systems
Monitor
Access Control
1 Citation (Scopus)

Forward secure privacy protection scheme for RFID system using advanced encryption standard

Yeo, S. S., Sakurai, K., Cho, S., Yang, K. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Vol. 4743 LNCS. p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio Frequency Identification Device
Advanced Encryption Standard
Privacy Protection
Privacy
Radio Frequency Identification

Induction and implementation of security requirements in each system block

Kim, T. H., Sakurai, K. & Hwang, S. M., Dec 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Proof by induction
Requirements
Customers
Software

On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ad hoc networks
Ad Hoc Networks
Incentives
Routing
Incentive Compatibility
1 Citation (Scopus)

On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Activation
Chemical activation
Attack
Model
Recommendations
13 Citations (Scopus)

Privacy-preserving two-party K-means clustering via secure approximation

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., Oct 18 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 385-391 7 p. 4221090. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
K-means Clustering
Approximation
Standardization
Cryptography
1 Citation (Scopus)

Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

Wang, Y., Hori, Y. & Sakurai, K., Oct 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless Ad Hoc Networks
Wireless ad hoc networks
Hazards
Routing
Economics

Study on trust inference and emergence of economical small-world phenomena in P2P environment

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Small World
Macros
Small-world networks
Costs
Structural properties
5 Citations (Scopus)

Two-party privacy-preserving agglomerative document clustering

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., Dec 20 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Document Clustering
Privacy Preserving
Cryptography
Data mining
Hypertext
11 Citations (Scopus)

Two-servers PIR based DNS query scheme with privacy-preserving

Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information retrieval
Erosion
Servers
2006

Actively modifying control flow of program for efficient anormaly detection

Tatara, K., Tabata, T. & Sakurai, K., Jan 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow Control
Flow control
Buffer Overflow
Anomaly Detection
Intrusion detection
1 Citation (Scopus)

A framework for the user-oriented personal information protection

Takahashi, K. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Computer terminals
Information use
1 Citation (Scopus)

An intrusion detection system using alteration of data

Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., Nov 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 243-248 6 p. 1620199. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Data storage equipment
1 Citation (Scopus)

An RFID system based MCLT system with improved privacy

Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., Jan 1 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tracking System
Radio Frequency Identification
Radio frequency identification (RFID)
Privacy
Security systems
1 Citation (Scopus)

Application and evaluation of Bayesian filter for Chinese spam

Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spam
Electronic mail
Electronic Mail
Filtering
Filter
9 Citations (Scopus)

A proactive secret sharing for server assisted threshold signatures

Yang, J. P., Rhee, K. H. & Sakurai, K., Jan 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Signature
Secret Sharing
Threshold Scheme
Servers
Server
10 Citations (Scopus)

A proposal of one-time biometric authentication

Ueshige, Y. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Internet
Communication
2 Citations (Scopus)

Ciphertext-auditable public key encryption

Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, Vol. 4266 LNCS. p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Public key
Cryptography
Scenarios
Attack
2 Citations (Scopus)

Design and implementation of an extended reference monitor for trusted operating systems

Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., Jul 10 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Organizational Policy
Behavior Control
Confidentiality
Semantics
Access control

Distributing security-mediated PKI revisited

Yang, J. P., Sakurai, K. & Rhee, K. H., Jan 1 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial of Service
Threshold Cryptography
Attack
Revocation
Scanning electron microscopy
5 Citations (Scopus)

Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Key Exchange
Password
Glossaries
Attack
Network protocols

Enhanced privacy in key-exchange protocols by one-time ID

Imamoto, K. & Sakurai, K., Dec 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Wireless networks
Denial-of-service attack
3 Citations (Scopus)

Grid based network address space browsing for network traffic visualization

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., Jan 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Visualization
Statistical methods
Processing
13 Citations (Scopus)

Interactively combining 2D and 3D visualization for network traffic monitoring

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Monitoring
Computer networks
Communication
5 Citations (Scopus)

One-round protocol for two-party verifier-based password-authenticated key exchange

Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Key Exchange
Password
Network protocols
Security Protocols
Server
4 Citations (Scopus)

On studying P2P topology construction based on virtual regions and its effect on search performance

Wang, Y., Wang, W., Sakurai, K. & Hori, Y., Jan 1 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Topology
Overlay networks
Proximity
Semantic Similarity
3 Citations (Scopus)

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; vol. 270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Management information systems
Local area networks
Network protocols
Authentication
Availability

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; vol. 270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Management information systems
Local area networks
Network protocols
Authentication
Availability