If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Article
Article
9 Citations (Scopus)

A behavior-based method for detecting distributed scan attacks in darknets

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., Jul 19 2013, In : Journal of information processing. 21, 3, p. 527-538 12 p.

Research output: Contribution to journalArticle

Internet
2 Citations (Scopus)

Achieving evenhandedness in certified email system for contract signing

Imamoto, K., Zhou, J. & Sakurai, K., May 20 2008, In : International Journal of Information Security. 7, 6, p. 383-394 12 p.

Research output: Contribution to journalArticle

Electronic mail
Electronic commerce
Internet
2 Citations (Scopus)
Role-based Access Control
Distributed Environment
Access control
Operating Systems
Scalability

A competitive three-level pruning technique for information security

Chowdhury, M., Abawajy, J., Kelarev, A. & Sakurai, K., Jan 1 2014, In : Communications in Computer and Information Science. 490, p. 25-32 8 p.

Research output: Contribution to journalArticle

Information Security
Security of data
Pruning
Classifiers
Ranking
6 Citations (Scopus)
Electronic commerce
Public key
Certificate
Communication
Public Key Infrastructure
1 Citation (Scopus)
Cryptography
Packaging
Encryption
Digital Rights Management
Framework
1 Citation (Scopus)

A finite equivalence of verifiable multi-secret sharing

Zhao, H., Li, M., Sakurai, K., Ren, Y., Sun, J. Z. & Wang, F., Feb 2012, In : International Journal of Computational Intelligence Systems. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Equational Theory
Secret Sharing
Semantics
Equivalence
Rewriting Systems
1 Citation (Scopus)

A framework for user privacy protection using trusted programs

Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., Dec 1 2007, In : International Journal of Security and its Applications. 1, 2, p. 59-70 12 p.

Research output: Contribution to journalArticle

Ubiquitous computing
1 Citation (Scopus)
Hash functions
Security Analysis
Hash Function
Black Box
Collision
14 Citations (Scopus)
Public-key Cryptosystem
Encryption
Cryptography
Polynomial Maps
Public key

A multivariate quadratic challenge toward post-quantum generation cryptography

Yasuda, T., Dahan, X., Huang, Y. J., Takagi, T. & Sakurai, K., Sep 1 2015, In : ACM Communications in Computer Algebra. 49, 3, p. 105-107 3 p.

Research output: Contribution to journalArticle

Cryptography
Signature
Quantum Cryptography
One-way Function
Public Key Cryptography

An adaptive reputation-based algorithm for grid virtual organization formation

Cui, Y., Li, M., Ren, Y. & Sakurai, K., 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, p. 1339-1346 8 p.

Research output: Contribution to journalArticle

Virtual Organization
Grid
Attack
Collusion Attack
Evaluation
1 Citation (Scopus)

Analysis and comparison of cryptographic techniques in e-voting and e-auction

Her, Y. S., Imamoto, K. & Sakurai, K., Sep 1 2005, In : Research Reports on Information Science and Electrical Engineering of Kyushu University. 10, 2, p. 91-96 6 p.

Research output: Contribution to journalArticle

Costs

Analysis and Design for Private Message Board Systems

Imamotoh, K. & Sakurai, K., Jan 1 2004, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 204-211 8 p.

Research output: Contribution to journalArticle

Electronic mail
Confidentiality
Anonymity
Electronic Mail
Fairness
Hash functions
Security of data
Authentication
3 Citations (Scopus)

Analysis of existing privacy-preserving protocols in domain name system

Zhao, F., Hori, Y. & Sakurai, K., Jan 1 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1031-1043 13 p.

Research output: Contribution to journalArticle

Erosion
5 Citations (Scopus)

Analysis of program obfuscation schemes with variable encoding technique

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2008, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 1, p. 316-329 14 p.

Research output: Contribution to journalArticle

Obfuscation
Encoding
Linear transformations
Attack
Data Dependency

Analytic hierarchy process aided key management schemes evaluation in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., Feb 8 2012, In : Journal of Networks. 7, 1, p. 88-100 13 p.

Research output: Contribution to journalArticle

Analytic hierarchy process
Wireless sensor networks
Sensor nodes
Authentication
Cryptography
Scalar multiplication
Elliptic Curves
Scalar
Network protocols
Computational efficiency
10 Citations (Scopus)

An enhanced audio ownership protection scheme based on visual cryptography

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., Jan 1 2014, In : Eurasip Journal on Information Security. 2014, 2.

Research output: Contribution to journalArticle

Cryptography
Audio signal processing
Discrete cosine transforms
Discrete wavelet transforms
Transparency
4 Citations (Scopus)

An enhanced security protocol for fast mobile IPv6

You, I., Sakurai, K. & Hori, Y., Jan 1 2009, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1979-1982 4 p.

Research output: Contribution to journalArticle

Costs
Denial-of-service attack
3 Citations (Scopus)
Leakage
Cryptography
Exponent
Attack
Side Channel Attacks

A new secret sharing scheme based on the multi-dealer

Guo, C., Li, M. & Sakurai, K., Jan 1 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, p. 1373-1378 6 p.

Research output: Contribution to journalArticle

Threshold Scheme
Secret Sharing Scheme
Cryptography
Discrete Logarithm Problem
Public-key Cryptosystem
8 Citations (Scopus)

An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy

Dannoura, E. & Sakurai, K., Apr 15 1998, In : Information Processing Letters. 66, 1, p. 27-33 7 p.

Research output: Contribution to journalArticle

Competitive Analysis
Trading Strategies
Money
1 Citation (Scopus)

A note on the security of KHL scheme

Weng, J., Zhao, Y., Deng, R. H., Liu, S., Yang, Y. & Sakurai, K., Oct 18 2015, In : Theoretical Computer Science. 602, p. 1-6 6 p.

Research output: Contribution to journalArticle

Cryptography
Concretes
Defects
Public key
Attack
2 Citations (Scopus)
Blind Signature
Discrete Logarithm Problem
Line
Certificate
Electronics
1 Citation (Scopus)
Cryptography
2 Citations (Scopus)

A proposal of key management scheme and its operation using: Anonymous biometrics on ID-based infrastructure

Izumi, A., Ueshige, Y. & Sakurai, K., Jan 1 2007, In : International Journal of Security and its Applications. 1, 1, p. 83-94 12 p.

Research output: Contribution to journalArticle

Biometrics
Authentication
Cryptography
Concretes
Costs
5 Citations (Scopus)
Timing Attack
Public-key Cryptosystem
Cryptography
Modulus
Random Oracle Model
11 Citations (Scopus)

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

Hao, D., Liao, X., Adhikari, A., Sakurai, K. & Yokoo, M., Oct 1 2012, In : Computer Communications. 35, 17, p. 2125-2137 13 p.

Research output: Contribution to journalArticle

Wireless networks
Static analysis
Dynamic analysis
Network protocols
Denial-of-service attack
5 Citations (Scopus)

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., Jan 1 2017, In : Computers and Electrical Engineering. 57, p. 241-256 16 p.

Research output: Contribution to journalArticle

Cloud computing
Access control
Cryptography
Scalability
Industry
6 Citations (Scopus)
Elliptic Curve Cryptosystem
Scalar multiplication
Cryptography
Recovery
Elliptic Curves
3 Citations (Scopus)

A security analysis on Kempf-Koodli's security scheme for Fast Mobile IPv6

You, I., Sakurai, K. & Hori, Y., Jun 2009, In : IEICE Transactions on Communications. E92-B, 6, p. 2287-2290 4 p.

Research output: Contribution to journalArticle

Costs
Denial-of-service attack
1 Citation (Scopus)

A short certificate of the number of universal optimal strategies for stopping simple stochastic games

Yanbe, A. & Sakurai, K., Jan 15 1996, In : Information Processing Letters. 57, 1, p. 17-24 8 p.

Research output: Contribution to journalArticle

Simple Game
Stochastic Games
Game theory
Certificate
Game Theory
1 Citation (Scopus)
Elliptic Curve Cryptosystem
Side Channel Attacks
Subtraction
Cryptography
Countermeasures
5 Citations (Scopus)
Obfuscation
Fingerprinting
Watermarking
Java
Watermark
17 Citations (Scopus)

A structural comparison of the computational difficulty of breaking discrete log cryptosystems

Sakurai, K. & Shizuya, H., Jan 1 1998, In : Journal of Cryptology. 11, 1, p. 29-43 15 p.

Research output: Contribution to journalArticle

Cryptosystem
Cryptography
Reducibility
Many to one
Oblivious Transfer
1 Citation (Scopus)

A study on security level management model description

Kim, T. H. & Sakurai, K., Dec 1 2008, In : International Journal of Multimedia and Ubiquitous Engineering. 3, 1, p. 87-94 8 p.

Research output: Contribution to journalArticle

Information systems

A theory of demonstrating program result-correctness with cryptographic applications

Sakuralt, K., Jan 1 2001, In : IEICE Transactions on Information and Systems. E84-D, 1, p. 4-14 11 p.

Research output: Contribution to journalArticle

Demonstrations
3 Citations (Scopus)
Open Access
Pixels
Neural networks
Classifiers
Feedback
36 Citations (Scopus)

Bitcoin Block Withholding Attack: Analysis and Mitigation

Bag, S., Ruj, S. & Sakurai, K., Aug 2017, In : IEEE Transactions on Information Forensics and Security. 12, 8, p. 1967-1978 12 p., 7728010.

Research output: Contribution to journalArticle

Miners
Hash functions
Chemical analysis
14 Citations (Scopus)

Botnet command and control based on Short Message Service and human mobility

Hua, J. & Sakurai, K., Feb 4 2013, In : Computer Networks. 57, 2, p. 579-597 19 p.

Research output: Contribution to journalArticle

Smartphones
Bluetooth
Botnet
Topology
Communication

Character-based symmetric searchable encryption and its implementation and experiment on mobile devices

Suga, T., Nishide, T. & Sakurai, K., Aug 1 2016, In : Security and Communication Networks. 9, 12, p. 1717-1725 9 p.

Research output: Contribution to journalArticle

Mobile devices
Cryptography
Experiments
Smartphones
Availability
1 Citation (Scopus)
Interactive Proofs
Zero-knowledge Proof
Factorization
Integer
Simulation
25 Citations (Scopus)

Characterizing economic and social properties of trust and reputation systems in P2P environment

Wang, Y. F., Hori, Y. & Sakurai, K., Jan 1 2008, In : Journal of Computer Science and Technology. 23, 1, p. 129-140 12 p.

Research output: Contribution to journalArticle

Reputation System
Economics
Feedback
P2P Systems
Economic Model

Collaborative agglomerative document clustering with limited information disclosure

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., Jan 1 2014, In : Security and Communication Networks. 7, 6, p. 964-978 15 p.

Research output: Contribution to journalArticle

Cryptography
Data mining
Scalability
Computational complexity
Processing