• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1991 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Some remarks on security of receipt-free E-auction

    Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. p. 560-563 4 p. 1489023. (Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005; vol. II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

    Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • SQL injection attack detection method using expectation criterion

    Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., Oct 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Study of log file dispersion management method

    Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., Nov 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Study on trust inference and emergence of economical small-world phenomena in P2P environment

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Subliminal channels for signature transfer and their application to signature distribution schemes

    Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Supporting secure provenance update by keeping "provenance" of the provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Suppressing chain size of blockchain-based information sharing for swarm robotic systems

    Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Survey and new idea for attribute-based identification scheme secure against reset attacks

    Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Ternary subset difference method and its quantitative analysis

    Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • The development of radiation-resistant rf TAGS for use at nuclear power plants

    Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., Jan 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • The optimal choice by resource consumers in Grid market

    Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability—Revisited

    Dutta, S. & Sakurai, K., 2021, Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019. Giri, D., Ho, A. T. S., Ponnusamy, S. & Lo, N-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 97-109 13 p. (Advances in Intelligent Systems and Computing; vol. 1170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Thoughts on multi-disciplinary inspired research on open network and information system

    Yufeng, W., Hori, Y. & Sakurai, K., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

    Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Towards countermeasure of insider threat in network security

    Hori, Y., Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Sep 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Towards "receipt-freeness" in remote biometric authentication

    Ueshige, Y. & Sakurai, K., Dec 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Traceback framework against botmaster by sharing network communication pattern information

    Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Tracing MIRAI malware in networked system

    Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Tracing MIRAI Malware in Networked System

    Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Trends and issues for security of home-network based on power line communication

    Nishi, R., Morioka, H. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

    Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., Dec 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Trust similarity measure in trust model for P2P networks

    Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., Dec 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Two-party privacy-preserving agglomerative document clustering

    Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Two-servers PIR based DNS query scheme with privacy-preserving

    Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Universal Rules for Fooling Deep Neural Networks based Text Classification

    Li, D., Vargas, D. V. & Kouichi, S., Jun 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Upper bound of the length of information embedd in RSA public key efficiently

    Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows

    Dutta, S., Bhore, T., Sardar, M. K., Adhikari, A. & Sakurai, K., 2021, Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019. Giri, D., Ho, A. T. S., Ponnusamy, S. & Lo, N-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 19-32 14 p. (Advances in Intelligent Systems and Computing; vol. 1170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Weakness of provably secure searchable encryption against frequency analysis

    Suga, T., Nishide, T. & Sakurai, K., Dec 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Yet another note on block withholding attack on bitcoin mining pools

    Bag, S. & Sakurai, K., 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)