If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article

A behavior-based method for detecting distributed scan attacks in darknets

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., Jul 19 2013, In : Journal of information processing. 21, 3, p. 527-538 12 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Achieving evenhandedness in certified email system for contract signing

Imamoto, K., Zhou, J. & Sakurai, K., May 20 2008, In : International Journal of Information Security. 7, 6, p. 383-394 12 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2 Citations (Scopus)

A competitive three-level pruning technique for information security

Chowdhury, M., Abawajy, J., Kelarev, A. & Sakurai, K., Jan 1 2014, In : Communications in Computer and Information Science. 490, p. 25-32 8 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
1 Citation (Scopus)

A finite equivalence of verifiable multi-secret sharing

Zhao, H., Li, M., Sakurai, K., Ren, Y., Sun, J. Z. & Wang, F., Feb 2012, In : International Journal of Computational Intelligence Systems. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A framework for user privacy protection using trusted programs

Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., Dec 1 2007, In : International Journal of Security and its Applications. 1, 2, p. 59-70 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
1 Citation (Scopus)
16 Citations (Scopus)

A multivariate quadratic challenge toward post-quantum generation cryptography

Yasuda, T., Dahan, X., Huang, Y. J., Takagi, T. & Sakurai, K., Sep 1 2015, In : ACM Communications in Computer Algebra. 49, 3, p. 105-107 3 p.

Research output: Contribution to journalArticle

An adaptive reputation-based algorithm for grid virtual organization formation

Cui, Y., Li, M., Ren, Y. & Sakurai, K., 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, p. 1339-1346 8 p.

Research output: Contribution to journalArticle

Analysis and comparison of cryptographic techniques in e-voting and e-auction

Her, Y. S., Imamoto, K. & Sakurai, K., Sep 1 2005, In : Research Reports on Information Science and Electrical Engineering of Kyushu University. 10, 2, p. 91-96 6 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Analysis and Design for Private Message Board Systems

Imamotoh, K. & Sakurai, K., Jan 1 2004, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 204-211 8 p.

Research output: Contribution to journalArticle

Analysis of existing privacy-preserving protocols in domain name system

Zhao, F., Hori, Y. & Sakurai, K., Jan 1 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1031-1043 13 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Analysis of program obfuscation schemes with variable encoding technique

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2008, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 1, p. 316-329 14 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Analytic hierarchy process aided key management schemes evaluation in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., Feb 8 2012, In : Journal of Networks. 7, 1, p. 88-100 13 p.

Research output: Contribution to journalArticle

An enhanced audio ownership protection scheme based on visual cryptography

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Jan 1 2014, In : Eurasip Journal on Information Security. 2014, 2.

Research output: Contribution to journalArticle

11 Citations (Scopus)

An enhanced security protocol for fast mobile IPv6

You, I., Sakurai, K. & Hori, Y., Jan 1 2009, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1979-1982 4 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
3 Citations (Scopus)

A new secret sharing scheme based on the multi-dealer

Guo, C., Li, M. & Sakurai, K., Jan 1 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, p. 1373-1378 6 p.

Research output: Contribution to journalArticle

An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy

Dannoura, E. & Sakurai, K., Apr 15 1998, In : Information Processing Letters. 66, 1, p. 27-33 7 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

A note on the security of KHL scheme

Weng, J., Zhao, Y., Deng, R. H., Liu, S., Yang, Y. & Sakurai, K., Oct 18 2015, In : Theoretical Computer Science. 602, p. 1-6 6 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2 Citations (Scopus)
1 Citation (Scopus)

A proposal of key management scheme and its operation using: Anonymous biometrics on ID-based infrastructure

Izumi, A., Ueshige, Y. & Sakurai, K., Jan 1 2007, In : International Journal of Security and its Applications. 1, 1, p. 83-94 12 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
5 Citations (Scopus)

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

Hao, D., Liao, X., Adhikari, A., Sakurai, K. & Yokoo, M., Oct 1 2012, In : Computer Communications. 35, 17, p. 2125-2137 13 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Jan 1 2017, In : Computers and Electrical Engineering. 57, p. 241-256 16 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
6 Citations (Scopus)

A security analysis on Kempf-Koodli's security scheme for Fast Mobile IPv6

You, I., Sakurai, K. & Hori, Y., Jun 2009, In : IEICE Transactions on Communications. E92-B, 6, p. 2287-2290 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A short certificate of the number of universal optimal strategies for stopping simple stochastic games

Yanbe, A. & Sakurai, K., Jan 15 1996, In : Information Processing Letters. 57, 1, p. 17-24 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
1 Citation (Scopus)
5 Citations (Scopus)

A structural comparison of the computational difficulty of breaking discrete log cryptosystems

Sakurai, K. & Shizuya, H., Jan 1 1998, In : Journal of Cryptology. 11, 1, p. 29-43 15 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

A study on security level management model description

Kim, T. H. & Sakurai, K., Dec 1 2008, In : International Journal of Multimedia and Ubiquitous Engineering. 3, 1, p. 87-94 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A theory of demonstrating program result-correctness with cryptographic applications

Sakuralt, K., Jan 1 2001, In : IEICE Transactions on Information and Systems. E84-D, 1, p. 4-14 11 p.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

Bitcoin Block Withholding Attack: Analysis and Mitigation

Bag, S., Ruj, S. & Sakurai, K., Aug 2017, In : IEEE Transactions on Information Forensics and Security. 12, 8, p. 1967-1978 12 p., 7728010.

Research output: Contribution to journalArticle

39 Citations (Scopus)

Botnet command and control based on Short Message Service and human mobility

Hua, J. & Sakurai, K., Feb 4 2013, In : Computer Networks. 57, 2, p. 579-597 19 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Character-based symmetric searchable encryption and its implementation and experiment on mobile devices

Suga, T., Nishide, T. & Sakurai, K., Aug 1 2016, In : Security and Communication Networks. 9, 12, p. 1717-1725 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Characterizing economic and social properties of trust and reputation systems in P2P environment

Wang, Y. F., Hori, Y. & Sakurai, K., Jan 1 2008, In : Journal of Computer Science and Technology. 23, 1, p. 129-140 12 p.

Research output: Contribution to journalArticle

25 Citations (Scopus)

Collaborative agglomerative document clustering with limited information disclosure

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., Jan 1 2014, In : Security and Communication Networks. 7, 6, p. 964-978 15 p.

Research output: Contribution to journalArticle