If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
Conference contribution
2 Citations (Scopus)

The development of radiation-resistant rf TAGS for use at nuclear power plants

Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., Jan 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear power plants
Radiation
Radiation damage
Radio frequency identification (RFID)
Dosimetry

The optimal choice by resource consumers in Grid market

Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling algorithms
Economics
Costs
Experiments

Thoughts on multi-disciplinary inspired research on open network and information system

Yufeng, W., Hori, Y. & Sakurai, K., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
Economics
Telecommunication networks
Macros
1 Citation (Scopus)

Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Springer Verlag, Vol. 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Cryptography
Cryptography
Communication
Law Enforcement
Key Distribution
2 Citations (Scopus)

Towards countermeasure of insider threat in network security

Hori, Y., Nishide, T. & Sakurai, K., Dec 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security
Access control
1 Citation (Scopus)

Towards optimal revocation and tracing schemes - The power of the ternary tree

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Sep 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Revocation
Tracing
Ternary
Labels
Broadcasting
2 Citations (Scopus)

Towards "receipt-freeness" in remote biometric authentication

Ueshige, Y. & Sakurai, K., Dec 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Network protocols
Servers
6 Citations (Scopus)

Traceback framework against botmaster by sharing network communication pattern information

Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telecommunication networks
Servers
Communication
Monitoring
Botnet
1 Citation (Scopus)

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of Things
Malware
Tracing
Attack
Denial of Service

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Trends and issues for security of home-network based on power line communication

Nishi, R., Morioka, H. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Home networks
Local area networks
Communication

Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., Dec 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anchors
Authentication
6 Citations (Scopus)

Trust similarity measure in trust model for P2P networks

Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., Dec 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

Research output: Chapter in Book/Report/Conference proceedingConference contribution

reputation
5 Citations (Scopus)

Two-party privacy-preserving agglomerative document clustering

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., Dec 20 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Document Clustering
Privacy Preserving
Cryptography
Data mining
Hypertext
11 Citations (Scopus)

Two-servers PIR based DNS query scheme with privacy-preserving

Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information retrieval
Erosion
Servers
2 Citations (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
1 Citation (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Security Model
Diffie-Hellman
Framework

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., Jun 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Text Classification
Neural Networks
Gradient methods
Information use
Attack
3 Citations (Scopus)

Upper bound of the length of information embedd in RSA public key efficiently

Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., May 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
1 Citation (Scopus)

Weakness of provably secure searchable encryption against frequency analysis

Suga, T., Nishide, T. & Sakurai, K., Dec 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
7 Citations (Scopus)

Yet another note on block withholding attack on bitcoin mining pools

Bag, S. & Sakurai, K., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reward
Mining
Miners
Attack
Incentives