If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
Conference contribution

Privacy-aware cloud-based input method editor

Kawamoto, J. & Sakurai, K., Jan 12 2015, 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014. Institute of Electrical and Electronics Engineers Inc., p. 209-213 5 p. 7008273. (2014 IEEE/CIC International Conference on Communications in China, ICCC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
15 Citations (Scopus)

Privacy-preserving two-party K-means clustering via secure approximation

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., Oct 18 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 385-391 7 p. 4221090. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
K-means Clustering
Approximation
Standardization
Cryptography
6 Citations (Scopus)

Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

Fukushima, Y., Hori, Y. & Sakurai, K., Dec 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 352-361 10 p. 6120839. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Web browsers
Malware
10 Citations (Scopus)

Program obfuscation scheme using random numbers to complicate control flow

Toyofuku, T., Tabata, T. & Sakurai, K., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 916-925 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Random number
Flow Control
Flow control
Software
2 Citations (Scopus)

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., Dec 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Electronic medical equipment
Public health
Medicine
Burden

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., Sep 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
training method
incident
programming
evaluation
questionnaire
3 Citations (Scopus)

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

Teraura, N. & Sakurai, K., Sep 14 2015, 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Institute of Electrical and Electronics Engineers Inc., 7266514

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Color
1 Citation (Scopus)

Proposal of the hierarchical file server groups for implementing mandatory access control

Sakuraba, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 639-644 6 p. 6296929. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Servers
security policy
Formal concept analysis
Group

Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

David, M. W. & Sakurai, K., Jun 28 2004, Proceedings - 2004 Iternational Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004. p. 497-498 2 p. (Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Monitoring
Communication systems
Internet

Protection of data and delegated keys in digital distribution

Mambo, M., Okamoto, E. & Sakurai, K., Jan 1 1997, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Pieprzyk, J., Varadharajan, V. & Mu, Y. (eds.). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption
Information Systems
Distribution System
Cryptosystem
1 Citation (Scopus)

Query forwarding algorithm supporting initiator anonymity in GNUnet

Tatara, K., Hori, Y. & Sakurai, K., Sep 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). Vol. 2. p. 235-239 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Peer to peer networks
Communication
53 Citations (Scopus)

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

Zhao, F., Nishide, T. & Sakurai, K., May 26 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Access Control
Access control
Cryptography
Attribute
18 Citations (Scopus)

Realizing proxy re-encryption in the symmetric world

Syalim, A., Nishide, T. & Sakurai, K., Dec 12 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 ed. p. 259-274 16 p. (Communications in Computer and Information Science; vol. 251 CCIS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
41 Citations (Scopus)

Reassignment scheme of an RFID tag's key for owner transfer

Saito, J., Imamoto, K. & Sakurai, K., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 1303-1312 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio Frequency Identification
Radio frequency identification (RFID)
Bar codes
Privacy Protection
Radio communication

Reconsidering data logging in light of digital forensics

Chou, B. H., Takahashi, K., Hori, Y. & Sakurai, K., Jul 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. p. 111-118 8 p. (Communications in Computer and Information Science; vol. 36).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital Forensics
Embedded systems
Shooting
Datalog
Embedded Systems

Reconstructing and visualizing evidence of artifact from firefox sessionstorage

Matsumoto, S., Onitsuka, Y., Kawamoto, J. & Sakurai, K., Jan 1 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 83-94 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Digital Forensics
World Wide Web
Personal computers
File System
10 Citations (Scopus)

Reducing the key size of rainbow using non-commutative rings

Yasuda, T., Sakurai, K. & Takagi, T., Mar 8 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. p. 68-83 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7178 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Non-commutative Rings
Public-key Cryptosystem
Cryptography
RSA Cryptosystem
Quantum Cryptography

Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998, STACS 98 - 15th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings. p. 511-521 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1373 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge Proof
Proof System
Chemical analysis
Graph Isomorphism
Language
10 Citations (Scopus)

Retricoin: Bitcoin based on compact proofs of retrievability

Sengupta, B., Bag, S., Sakurai, K. & Ruj, S., Jan 4 2016, Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016. Association for Computing Machinery, a14. (ACM International Conference Proceeding Series; vol. 04-07-January-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Miners
Availability
Bandwidth
Electronic money

Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Dec 1 2012, E-Business and Telecommunications: International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers. Sevillano, J. L. & Filipe, J. (eds.). p. 233-248 16 p. (Communications in Computer and Information Science; vol. 314).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Encryption
Revocation
Tracing
Ternary
Cryptography
3 Citations (Scopus)

Risks with raw-key masking – The security evaluation of 2-key XCBC

Furuya, S. & Sakurai, K., Jan 1 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (eds.). Springer Verlag, p. 327-341 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Masking
Evaluation
Provable Security
Block Ciphers
Violate
2 Citations (Scopus)

Secrecy capacity of wireless LAN

Nishi, R., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 905-910 6 p. 5066585. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Local area networks
Communication systems
Channel coding
2 Citations (Scopus)

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., Jan 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (eds.). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Structure
Secret Sharing Scheme
Secret Sharing
Efficient Solution
Robustness
3 Citations (Scopus)

Secure and light weight fine-grained access mechanism for outsourced data

Jahan, M., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., Sep 7 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. Institute of Electrical and Electronics Engineers Inc., p. 201-209 9 p. 8029441. (Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Cryptography
Access control
Encryption
Owners
4 Citations (Scopus)

Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

Ruj, S. & Sakurai, K., Jan 1 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 402-407 6 p. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Sensor nodes
Tires
Base stations
Wireless networks
20 Citations (Scopus)

Secure hyperelliptic cryptosystems and their performance

Sakai, Y., Sakurai, K. & Ishizuka, H., Jan 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Curve
Jacobian Varieties
Discrete Logarithm Problem
17 Citations (Scopus)

Secure keyword search using bloom filter with specified character positions

Suga, T., Nishide, T. & Sakurai, K., Sep 14 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings. p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7496 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bloom Filter
Keyword Search
Cryptography
Encryption
Character
1 Citation (Scopus)

Securing location-aware services based on online/offline signatures in VANETs

Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., Sep 7 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular ad hoc networks
Vehicular Ad Hoc Networks
Signature
Signature Scheme
Network protocols
3 Citations (Scopus)

Securing sensor networks by moderating frequencies

Sarkar, P., Mahish, P., Chowdhury, M. U. & Sakurai, K., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 173-185 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Network protocols
Magnetooptical effects
Sensors
Security of data
5 Citations (Scopus)

Security analysis for P2P routing protocols

Fujii, T., Ren, Y., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 899-904 6 p. 5066584. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Patents and inventions

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; vol. 270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Management information systems
Local area networks
Network protocols
Authentication
Availability
3 Citations (Scopus)

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; vol. 270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Management information systems
Local area networks
Network protocols
Authentication
Availability

Security and trust issues on digital supply chain

Zhang, H., Nakamura, T. & Sakurai, K., Aug 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 338-343 6 p. 8890486. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply Chain
Supply chains
Supply chain management
Supply Chain Management
Information science
3 Citations (Scopus)

Security issues for contactless smart cards

David, M. W. & Sakurai, K., Jan 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart cards
Smart Card
Standardization
Encryption
Cryptography
2 Citations (Scopus)

Security model and analysis of fhmqv, Revisited

Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., Jan 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Model
Security Analysis
Provable Security
Public key cryptography
Defects
4 Citations (Scopus)

Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

Nishide, T. & Sakurai, K., Dec 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic money
7 Citations (Scopus)

Security policy pre-evaluation towards risk analysis

Yi, H., Hori, Y. & Sakurai, K., Sep 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 415-420 6 p. 4511603. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

security policy
Risk analysis
evaluation
Evaluation
Security policy
4 Citations (Scopus)

Simple power analysis on fast modular reduction with NIST recommended elliptic curves

Sakai, Y. & Sakurai, K., Dec 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Power Analysis
Elliptic Curves
Mersenne prime
Montgomery multiplication
Side Channel Attacks

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kosuke, K., Sharma, S. & Kouichi, S., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
1 Citation (Scopus)

Some remarks on security of receipt-free E-auction

Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. Vol. II. p. 560-563 4 p. 1489023

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tea
2 Citations (Scopus)

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Service-oriented
Search engines
Scheduling algorithms
Scheduling Algorithm
Quality of service
4 Citations (Scopus)

SQL injection attack detection method using expectation criterion

Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

Wang, Y., Hori, Y. & Sakurai, K., Oct 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless Ad Hoc Networks
Wireless ad hoc networks
Hazards
Routing
Economics
2 Citations (Scopus)

Study of log file dispersion management method

Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Redundancy

Study on trust inference and emergence of economical small-world phenomena in P2P environment

Wang, Y., Hori, Y. & Sakurai, K., Dec 1 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Small World
Macros
Small-world networks
Costs
Structural properties
2 Citations (Scopus)

Subliminal channels for signature transfer and their application to signature distribution schemes

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature Verification
Identification Scheme
Signature
Network protocols
One-way Function

Supporting secure provenance update by keeping "provenance" of the provenance

Syalim, A., Nishide, T. & Sakurai, K., Mar 25 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provenance
Update
Data storage equipment
Signature
Vertex of a graph

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Swarm Robotics
Information Sharing
Robotics
Robots
Autonomous Robots

Survey and new idea for attribute-based identification scheme secure against reset attacks

Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., Jan 1 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Authentication
4 Citations (Scopus)

Ternary subset difference method and its quantitative analysis

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., Nov 9 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantitative Analysis
Ternary
Difference Method
Labels
Subset