If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
Conference contribution

Supporting secure provenance update by keeping "provenance" of the provenance

Syalim, A., Nishide, T. & Sakurai, K., Mar 25 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Survey and new idea for attribute-based identification scheme secure against reset attacks

Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., Jan 1 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ternary subset difference method and its quantitative analysis

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., Nov 9 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

The development of radiation-resistant rf TAGS for use at nuclear power plants

Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., Jan 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

The optimal choice by resource consumers in Grid market

Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., Dec 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Thoughts on multi-disciplinary inspired research on open network and information system

Yufeng, W., Hori, Y. & Sakurai, K., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Springer Verlag, Vol. 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Towards countermeasure of insider threat in network security

Hori, Y., Nishide, T. & Sakurai, K., Dec 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Towards optimal revocation and tracing schemes - The power of the ternary tree

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., Sep 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Towards "receipt-freeness" in remote biometric authentication

Ueshige, Y. & Sakurai, K., Dec 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Traceback framework against botmaster by sharing network communication pattern information

Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trends and issues for security of home-network based on power line communication

Nishi, R., Morioka, H. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., Dec 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trust similarity measure in trust model for P2P networks

Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., Dec 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Two-party privacy-preserving agglomerative document clustering

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., Dec 20 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Two-servers PIR based DNS query scheme with privacy-preserving

Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Mar 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., Dec 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., Jun 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Upper bound of the length of information embedd in RSA public key efficiently

Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., May 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Weakness of provably secure searchable encryption against frequency analysis

Suga, T., Nishide, T. & Sakurai, K., Dec 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Yet another note on block withholding attack on bitcoin mining pools

Bag, S. & Sakurai, K., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)