If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Article
2019
2 Citations (Scopus)
Open Access
Pixels
Neural networks
Classifiers
Feedback

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust

Anada, H., Yasuda, T., Kawamoto, J., Weng, J. & Sakurai, K., Apr 1 2019, In : Journal of Information Security and Applications. 45, p. 10-19 10 p.

Research output: Contribution to journalArticle

Cryptography
Peer to peer networks
2018
1 Citation (Scopus)

Light weight and fine-grained access mechanism for secure access to outsourced data*

Jahan, M., Seneviratne, S., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., Jan 1 2018, (Accepted/In press) In : Concurrency Computation.

Research output: Contribution to journalArticle

Mobile devices
Cryptography
Network protocols
Testbeds
Access control
2 Citations (Scopus)

Light Weight Write Mechanism for Cloud Data

Jahan, M., Rezvani, M., Zhao, Q., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., May 1 2018, In : IEEE Transactions on Parallel and Distributed Systems. 29, 5, p. 1131-1146 16 p.

Research output: Contribution to journalArticle

Mobile devices
Cryptography
Outsourcing
Processing
Access control
4 Citations (Scopus)

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Jan 1 2017, In : Computers and Electrical Engineering. 57, p. 241-256 16 p.

Research output: Contribution to journalArticle

Cloud computing
Access control
Cryptography
Scalability
Industry
28 Citations (Scopus)

Bitcoin Block Withholding Attack: Analysis and Mitigation

Bag, S., Ruj, S. & Sakurai, K., Aug 1 2017, In : IEEE Transactions on Information Forensics and Security. 12, 8, p. 1967-1978 12 p., 7728010.

Research output: Contribution to journalArticle

Miners
Hash functions
Chemical analysis

Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions

Anada, H., Kawamoto, J., Ke, C., Morozov, K. & Sakurai, K., Oct 1 2017, In : Journal of Supercomputing. 73, 10, p. 4275-4301 27 p.

Research output: Contribution to journalArticle

Secret Sharing Scheme
Group Scheme
Secret Sharing
Servers
Data privacy
2 Citations (Scopus)

Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors

Sarkar, P., Chowdhury, M. U. & Sakurai, K., Dec 10 2017, In : Concurrency Computation. 29, 23, e4017.

Research output: Contribution to journalArticle

Magneto-optics
Key Pre-distribution
Magnetooptical effects
Frequency bands
Sensor networks
2016
14 Citations (Scopus)
Public-key Cryptosystem
Encryption
Cryptography
Polynomial Maps
Public key

Character-based symmetric searchable encryption and its implementation and experiment on mobile devices

Suga, T., Nishide, T. & Sakurai, K., Aug 1 2016, In : Security and Communication Networks. 9, 12, p. 1717-1725 9 p.

Research output: Contribution to journalArticle

Mobile devices
Cryptography
Experiments
Smartphones
Availability
2015

A multivariate quadratic challenge toward post-quantum generation cryptography

Yasuda, T., Dahan, X., Huang, Y. J., Takagi, T. & Sakurai, K., Sep 1 2015, In : ACM Communications in Computer Algebra. 49, 3, p. 105-107 3 p.

Research output: Contribution to journalArticle

Cryptography
Signature
Quantum Cryptography
One-way Function
Public Key Cryptography
1 Citation (Scopus)

A note on the security of KHL scheme

Weng, J., Zhao, Y., Deng, R. H., Liu, S., Yang, Y. & Sakurai, K., Oct 18 2015, In : Theoretical Computer Science. 602, p. 1-6 6 p.

Research output: Contribution to journalArticle

Cryptography
Concretes
Defects
Public key
Attack
11 Citations (Scopus)

Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"

Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., Keshavarz, H., Chaudhry, S. A. & Khan, M. K., Nov 1 2015, In : PloS one. 10, 11, 0142716.

Research output: Contribution to journalArticle

Proxy
Authentication
Wireless networks
methodology
Network protocols
2 Citations (Scopus)

Plaintext checkable encryption with designated checker

Das, A., Adhikari, A. & Sakurai, K., Jan 1 2015, In : Advances in Mathematics of Communications. 9, 1, p. 37-53 17 p.

Research output: Contribution to journalArticle

Encryption
Cryptography
Public key
Random Oracle Model
Standard Model
4 Citations (Scopus)

Provably secure anonymous authentication scheme for roaming service in global mobility networks

Wu, K. Y., Tsai, K. Y., Wu, T. C. & Sakurai, K., Mar 1 2015, In : Journal of Information Science and Engineering. 31, 2, p. 727-742 16 p.

Research output: Contribution to journalArticle

Authentication
anonymity
secrecy
2014

A competitive three-level pruning technique for information security

Chowdhury, M., Abawajy, J., Kelarev, A. & Sakurai, K., Jan 1 2014, In : Communications in Computer and Information Science. 490, p. 25-32 8 p.

Research output: Contribution to journalArticle

Information Security
Security of data
Pruning
Classifiers
Ranking
10 Citations (Scopus)

An enhanced audio ownership protection scheme based on visual cryptography

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Jan 1 2014, In : Eurasip Journal on Information Security. 2014, 2.

Research output: Contribution to journalArticle

Cryptography
Audio signal processing
Discrete cosine transforms
Discrete wavelet transforms
Transparency

Collaborative agglomerative document clustering with limited information disclosure

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., Jan 1 2014, In : Security and Communication Networks. 7, 6, p. 964-978 15 p.

Research output: Contribution to journalArticle

Cryptography
Data mining
Scalability
Computational complexity
Processing

Comparison of access pattern protection schemes and proposals for efficient implementation

Nakano, Y., Kiyomoto, S., Miyake, Y. & Sakurai, K., Oct 1 2014, In : IEICE Transactions on Information and Systems. E97D, 10, p. 2576-2585 10 p.

Research output: Contribution to journalArticle

Random access storage
Information retrieval
Computer systems
Servers
Data storage equipment
10 Citations (Scopus)

Efficient variant of Rainbow using sparse secret keys

Yasuda, T., Takagi, T. & Sakurai, K., Sep 1 2014, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5, 3, p. 3-13 11 p.

Research output: Contribution to journalArticle

Cryptography
Quantum cryptography
Electronic document identification systems
1 Citation (Scopus)

Fast implementation of Kcipher-2 for software and hardware

Nakano, Y., Fukushima, K., Kiyomoto, S., Ishiguro, T., Miyake, Y., Tanaka, T. & Sakurai, K., Jan 1 2014, In : IEICE Transactions on Information and Systems. E97-D, 1, p. 43-52 10 p.

Research output: Contribution to journalArticle

Hardware
Shift registers
Field programmable gate arrays (FPGA)
Throughput
Feedback
7 Citations (Scopus)

Fine-grained access control aware multi-user data sharing with secure keyword search

Zhao, F., Nishide, T. & Sakurai, K., Jan 1 2014, In : IEICE Transactions on Information and Systems. E97-D, 7, p. 1790-1803 14 p.

Research output: Contribution to journalArticle

Access control
Servers
1 Citation (Scopus)

Security of multivariate signature scheme using non-commutative rings?

Yasuda, T., Takagi, T. & Sakurai, K., Jan 1 2014, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97-A, 1, p. 245-252 8 p.

Research output: Contribution to journalArticle

Non-commutative Rings
Public-key Cryptosystem
Signature Scheme
Cryptography
Attack
2013
8 Citations (Scopus)

A behavior-based method for detecting distributed scan attacks in darknets

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., Jul 19 2013, In : Journal of information processing. 21, 3, p. 527-538 12 p.

Research output: Contribution to journalArticle

Internet
14 Citations (Scopus)

Botnet command and control based on Short Message Service and human mobility

Hua, J. & Sakurai, K., Feb 4 2013, In : Computer Networks. 57, 2, p. 579-597 19 p.

Research output: Contribution to journalArticle

Smartphones
Bluetooth
Botnet
Topology
Communication
4 Citations (Scopus)

Efficient implementation for QUAD stream cipher with GPUs

Tanaka, S., Nishide, T. & Sakurai, K., Apr 1 2013, In : Computer Science and Information Systems. 10, 2 SPL, p. 897-911 15 p.

Research output: Contribution to journalArticle

Cryptography
Hardness
Polynomials
Computational complexity
Graphics processing unit
8 Citations (Scopus)

Evolution of cooperation in reputation system by group-based scheme

Ren, Y., Li, M., Xiang, Y., Cui, Y. & Sakurai, K., Jan 1 2013, In : Journal of Supercomputing. 63, 1, p. 171-190 20 p.

Research output: Contribution to journalArticle

Reputation System
Evolution of Cooperation
Online systems
Game theory
Distribution functions
2 Citations (Scopus)

Exploiting reference images for image splicing verification

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Jan 1 2013, In : Digital Investigation. 10, 3, p. 246-258 13 p.

Research output: Contribution to journalArticle

Image registration
Membership functions
Software
Concretes
Detectors
5 Citations (Scopus)

General fault attacks on multivariate public key cryptosystems

Hashimoto, Y., Takagi, T. & Sakurai, K., Jan 1 2013, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E96-A, 1, p. 196-205 10 p.

Research output: Contribution to journalArticle

Fault Attacks
Public-key Cryptosystem
Cryptography
Attack
Triangular Systems
19 Citations (Scopus)

Reliable workflow scheduling with less resource redundancy

Zhao, L., Ren, Y. & Sakurai, K., Jul 23 2013, In : Parallel Computing. 39, 10, p. 567-585 19 p.

Research output: Contribution to journalArticle

Work Flow
Redundancy
Scheduling
Resources
Schedule
2012
1 Citation (Scopus)

A finite equivalence of verifiable multi-secret sharing

Zhao, H., Li, M., Sakurai, K., Ren, Y., Sun, J. Z. & Wang, F., Feb 2012, In : International Journal of Computational Intelligence Systems. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Equational Theory
Secret Sharing
Semantics
Equivalence
Rewriting Systems

Analytic hierarchy process aided key management schemes evaluation in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., Feb 8 2012, In : Journal of Networks. 7, 1, p. 88-100 13 p.

Research output: Contribution to journalArticle

Analytic hierarchy process
Wireless sensor networks
Sensor nodes
Authentication
Cryptography
10 Citations (Scopus)

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

Hao, D., Liao, X., Adhikari, A., Sakurai, K. & Yokoo, M., Oct 1 2012, In : Computer Communications. 35, 17, p. 2125-2137 13 p.

Research output: Contribution to journalArticle

Wireless networks
Static analysis
Dynamic analysis
Network protocols
Denial-of-service attack
56 Citations (Scopus)

Flexible service selection with user-specific QoS support in service-oriented architecture

Zhao, L., Ren, Y., Li, M. & Sakurai, K., May 1 2012, In : Journal of Network and Computer Applications. 35, 3, p. 962-973 12 p.

Research output: Contribution to journalArticle

Service oriented architecture (SOA)
Quality of service
Cloud computing
Search engines
Scheduling algorithms
36 Citations (Scopus)
Image Encryption
Security Analysis
Encryption
Cryptography
Pixel
6 Citations (Scopus)

Providing secure location-aware services for cooperative vehicular Ad Hoc networks

Sur, C., Park, Y., Sakurai, K. & Rhee, K. H., Oct 8 2012, In : Journal of Internet Technology. 13, 4, p. 631-644 14 p.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
National security
Network protocols
Authentication
Network security
2 Citations (Scopus)

Securing provenance of distributed processes in an untrusted environment

Syalim, A., Nishide, T. & Sakurai, K., Jan 1 2012, In : IEICE Transactions on Information and Systems. E95-D, 7, p. 1894-1907 14 p.

Research output: Contribution to journalArticle

Servers
Electronic document identification systems
Access control
Cryptography
Computer systems
5 Citations (Scopus)

Security analysis of offline E-cash systems with malicious insider

Nishide, T., Miyazaki, S. & Sakurai, K., Jan 1 2012, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 3, 1-2, p. 55-71 17 p.

Research output: Contribution to journalArticle

Electronic money
2011

Efficient context-sensitive intrusion detection based on state transition table

Hua, J., Li, M., Ren, Y. & Sakurai, K., Jan 1 2011, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E94-A, 1, p. 255-264 10 p.

Research output: Contribution to journalArticle

Intrusion detection
State Transition
Intrusion Detection
Table
Model
4 Citations (Scopus)

Enhancing MISP with fast mobile IPv6 security

You, I., Lee, J. H., Hori, Y. & Sakurai, K., Jan 1 2011, In : Mobile Information Systems. 7, 3, p. 271-283 13 p.

Research output: Contribution to journalArticle

Authentication
Management information systems
Network protocols
Servers
Mobile security
19 Citations (Scopus)

Enhancing SVO logic for mobile IPv6 security protocols

You, I., Hori, Y. & Sakurai, K., Jan 1 2011, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2, 3, p. 26-52 27 p.

Research output: Contribution to journalArticle

Internet protocols
Network protocols
Public key cryptography
Mobile security
Defects
16 Citations (Scopus)

FineTrust: A fine-grained trust model for peer-to-peer networks

Ren, Y., Li, M. & Sakurai, K., Jan 1 2011, In : Security and Communication Networks. 4, 1, p. 61-69 9 p.

Research output: Contribution to journalArticle

Peer to peer networks
Quality of service
8 Citations (Scopus)

Towards formal analysis of wireless LAN security with MIS protocol

You, I., Hori, Y. & Sakurai, K., Mar 1 2011, In : International Journal of Ad Hoc and Ubiquitous Computing. 7, 2, p. 112-120 9 p.

Research output: Contribution to journalArticle

Management information systems
Local area networks
Network protocols
Internet
Denial-of-service attack
1 Citation (Scopus)
Wireless ad hoc networks
Game theory
2010
3 Citations (Scopus)

Analysis of existing privacy-preserving protocols in domain name system

Zhao, F., Hori, Y. & Sakurai, K., Jan 1 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1031-1043 13 p.

Research output: Contribution to journalArticle

Erosion
6 Citations (Scopus)

ESS-FH: Enhanced security scheme for fast handover in hierarchical mobile IPv6

You, I., Lee, J. H., Sakurai, K. & Hori, Y., Jan 1 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1096-1105 10 p.

Research output: Contribution to journalArticle