If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Article
2010
6 Citations (Scopus)

ESS-FH: Enhanced security scheme for fast handover in hierarchical mobile IPv6

You, I., Lee, J. H., Sakurai, K. & Hori, Y., Jan 1 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1096-1105 10 p.

Research output: Contribution to journalArticle

Improved subset difference method with ternary tree

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., Jan 1 2010, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E93-A, 11, p. 2034-2044 11 p.

Research output: Contribution to journalArticle

Ternary
Difference Method
Labels
Coalitions
Subset
1 Citation (Scopus)

Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus

Zhao, H., Li, M., Sakurai, K. & Ren, Y., Jun 1 2010, In : ICIC Express Letters. 4, 3, p. 1053-1058 6 p.

Research output: Contribution to journalArticle

Semantics

Special section on trust, security and privacy for pervasive applications

Wang, G., Yang, L. T. & Sakurai, K., Jan 1 2010, In : IEICE Transactions on Information and Systems. E93-D, 3, p. 409-410 2 p.

Research output: Contribution to journalArticle

Electronic equipment
Engineers
Communication
2 Citations (Scopus)

Towards a fairness multimedia transmission using layered-based multicast protocol

Sukocof, H., Hori, Y., Hendrawan & Sakurai, K., Nov 2010, In : IEICE Transactions on Information and Systems. E93-D, 11, p. 2953-2961 9 p.

Research output: Contribution to journalArticle

Network protocols
Internet
Packet loss
Jitter
Throughput
2009

An adaptive reputation-based algorithm for grid virtual organization formation

Cui, Y., Li, M., Ren, Y. & Sakurai, K., 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, p. 1339-1346 8 p.

Research output: Contribution to journalArticle

Virtual Organization
Grid
Attack
Collusion Attack
Evaluation
4 Citations (Scopus)

An enhanced security protocol for fast mobile IPv6

You, I., Sakurai, K. & Hori, Y., Jan 1 2009, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1979-1982 4 p.

Research output: Contribution to journalArticle

Costs
Denial-of-service attack

A new secret sharing scheme based on the multi-dealer

Guo, C., Li, M. & Sakurai, K., Jan 1 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, p. 1373-1378 6 p.

Research output: Contribution to journalArticle

Threshold Scheme
Secret Sharing Scheme
Cryptography
Discrete Logarithm Problem
Public-key Cryptosystem
3 Citations (Scopus)

A security analysis on Kempf-Koodli's security scheme for Fast Mobile IPv6

You, I., Sakurai, K. & Hori, Y., Jun 2009, In : IEICE Transactions on Communications. E92-B, 6, p. 2287-2290 4 p.

Research output: Contribution to journalArticle

Costs
Denial-of-service attack

Distributed noise generation for density estimation based clustering without trusted third party

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., Jan 1 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 8, p. 1868-1871 4 p.

Research output: Contribution to journalArticle

Kernel Density Estimation
Density Estimation
Clustering
Data Perturbation
Perturbation techniques

Modeling security bridge certificate authority architecture

Ren, Y., Li, M. & Sakurai, K., Jan 1 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 6, p. 1544-1547 4 p.

Research output: Contribution to journalArticle

Certificate
Modeling
Public Key Infrastructure
Certification
Simplification
8 Citations (Scopus)

Security and correctness analysis on privacy-preserving k-means clustering schemes

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., Jan 1 2009, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 4, p. 1246-1250 5 p.

Research output: Contribution to journalArticle

Privacy Preserving
K-means Clustering
Data mining
Correctness
Internet
2008
2 Citations (Scopus)

Achieving evenhandedness in certified email system for contract signing

Imamoto, K., Zhou, J. & Sakurai, K., May 20 2008, In : International Journal of Information Security. 7, 6, p. 383-394 12 p.

Research output: Contribution to journalArticle

Electronic mail
Electronic commerce
Internet
5 Citations (Scopus)

Analysis of program obfuscation schemes with variable encoding technique

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2008, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 1, p. 316-329 14 p.

Research output: Contribution to journalArticle

Obfuscation
Encoding
Linear transformations
Attack
Data Dependency
1 Citation (Scopus)

A study on security level management model description

Kim, T. H. & Sakurai, K., Dec 1 2008, In : International Journal of Multimedia and Ubiquitous Engineering. 3, 1, p. 87-94 8 p.

Research output: Contribution to journalArticle

Information systems
25 Citations (Scopus)

Characterizing economic and social properties of trust and reputation systems in P2P environment

Wang, Y. F., Hori, Y. & Sakurai, K., Jan 1 2008, In : Journal of Computer Science and Technology. 23, 1, p. 129-140 12 p.

Research output: Contribution to journalArticle

Reputation System
Economics
Feedback
P2P Systems
Economic Model
1 Citation (Scopus)

Optimization of group key management structure with a client join-leave mechanism

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., Jan 1 2008, In : Journal of information processing. 16, p. 130-141 12 p.

Research output: Contribution to journalArticle

Costs
Communication
Joining
Communication systems
1 Citation (Scopus)

Reliable key distribution scheme for lossy channels

Nishi, R., Hori, Y. & Sakurai, K., Jan 1 2008, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1485-1488 4 p.

Research output: Contribution to journalArticle

Ethernet
Communication
1 Citation (Scopus)

Toward a scalable visualization system for network traffic monitoring

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., May 2008, In : IEICE Transactions on Information and Systems. E91-D, 5, p. 1300-1310 11 p.

Research output: Contribution to journalArticle

Visualization
Monitoring
Computer networks
Explosions
Bandwidth
2007
1 Citation (Scopus)

A framework for user privacy protection using trusted programs

Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., Dec 1 2007, In : International Journal of Security and its Applications. 1, 2, p. 59-70 12 p.

Research output: Contribution to journalArticle

Ubiquitous computing
2 Citations (Scopus)

A proposal of key management scheme and its operation using: Anonymous biometrics on ID-based infrastructure

Izumi, A., Ueshige, Y. & Sakurai, K., Jan 1 2007, In : International Journal of Security and its Applications. 1, 1, p. 83-94 12 p.

Research output: Contribution to journalArticle

Biometrics
Authentication
Cryptography
Concretes
Costs
2 Citations (Scopus)

On effectiveness of clock control in stream ciphers

Kiyomoto, S., Fukushima, K., Tanaka, T. & Sakurai, K., Jan 1 2007, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E90-A, 9, p. 1780-1787 8 p.

Research output: Contribution to journalArticle

Stream Ciphers
Clocks
Linear Feedback Shift Register
Distinguishing Attack
Attack
2006

Security countermeasure design for information systems by using block model

Kim, T. H. & Sakurai, K., Dec 1 2006, In : International Journal of Multimedia and Ubiquitous Engineering. 1, 2, p. 30-33 4 p.

Research output: Contribution to journalArticle

Information systems
Personnel

Security protocol for IMT-2000-based contents service

Yeo, S. S., Lee, D. G. & Sakurai, K., 2006, In : International Journal of Multimedia and Ubiquitous Engineering. 1, 4, p. 11-20 10 p.

Research output: Contribution to journalArticle

Authentication
Network protocols
Communication
Telecommunication
Wire
7 Citations (Scopus)
Mersenne prime
Elliptic Curve Cryptosystem
Power Analysis
Cryptography
Montgomery multiplication
2005
2 Citations (Scopus)
Role-based Access Control
Distributed Environment
Access control
Operating Systems
Scalability
1 Citation (Scopus)

Analysis and comparison of cryptographic techniques in e-voting and e-auction

Her, Y. S., Imamoto, K. & Sakurai, K., Sep 1 2005, In : Research Reports on Information Science and Electrical Engineering of Kyushu University. 10, 2, p. 91-96 6 p.

Research output: Contribution to journalArticle

Costs
1 Citation (Scopus)

Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers

Kiyomoto, S., Tanaka, T. & Sakurai, K., Oct 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 10, p. 2778-2791 14 p.

Research output: Contribution to journalArticle

Stream Ciphers
Guess
Experimental Analysis
Clocks
Attack

On the pseudorandomness of a modification of KASUMI type permutations

Lee, W., Sakurai, K., Hong, S. & Lee, S., 2005, In : Lecture Notes in Computer Science. 3506, p. 313-329 17 p.

Research output: Contribution to journalArticle

Pseudorandomness
Permutation
Upper bound
Arbitrary
Side Channel Attacks
Exponentiation
Vulnerability
Exponent
Cryptography
3 Citations (Scopus)

PGV-style block-cipher-based hash families and black-box analysis

Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., Jan 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 39-48 10 p.

Research output: Contribution to journalArticle

Hash functions
Block Cipher
Black Box
Hash Function
Collision
1 Citation (Scopus)

Procedural constraints in the extended RBAC and the coloured Petri net modeling

Shin, W., Lee, J. G., Klm, H. K. & Sakurai, K., Jan 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 327-330 4 p.

Research output: Contribution to journalArticle

Role-based Access Control
Colored Petri Nets
Security Analysis
Petri nets
Access control
1 Citation (Scopus)
Communication Cost
Electronic commerce
Certificate
Communication
Public key
3 Citations (Scopus)

Side channel cryptanalysis on XTR public key cryptosystem

Han, D. G., Izu, T., Lim, J. & Sakurai, K., Jan 1 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 5, p. 1214-1223 10 p.

Research output: Contribution to journalArticle

Smart cards
Public-key Cryptosystem
Exponentiation
Cryptanalysis
Cryptography

The improved risk analysis mechanism in the practical risk analysis system

Hwang, S., Lee, N., Sakurai, K., Park, G. & Ryou, J., 2005, In : Unknown Journal. 3391, p. 835-842 8 p.

Research output: Contribution to journalArticle

Risk analysis
genetic algorithm
vulnerability
Genetic algorithms
risk analysis
2004
6 Citations (Scopus)
Electronic commerce
Public key
Certificate
Communication
Public Key Infrastructure
1 Citation (Scopus)
Cryptography
Packaging
Encryption
Digital Rights Management
Framework
1 Citation (Scopus)
Hash functions
Security Analysis
Hash Function
Black Box
Collision

Analysis and Design for Private Message Board Systems

Imamotoh, K. & Sakurai, K., Jan 1 2004, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 204-211 8 p.

Research output: Contribution to journalArticle

Electronic mail
Confidentiality
Anonymity
Electronic Mail
Fairness
3 Citations (Scopus)
Leakage
Cryptography
Exponent
Attack
Side Channel Attacks
5 Citations (Scopus)
Obfuscation
Fingerprinting
Watermarking
Java
Watermark
51 Citations (Scopus)

Enhancing privacy of universal re-encryption scheme for RFID tags

Saito, J., Ryou, J. C. & Sakurai, K., 2004, In : Lecture Notes in Computer Science. 3207, p. 879-890 12 p.

Research output: Contribution to journalArticle

Radio Frequency Identification Device
Privacy
Radio Frequency Identification
Radio frequency identification (RFID)
Encryption
2 Citations (Scopus)
Power Analysis
Countermeasures
Attack
Side Channel Attacks
Electronic crime countermeasures
4 Citations (Scopus)

On security of XTR public key cryptosystems against side channel attacks

Han, D. G., Lim, J. & Sakurai, K., 2004, In : Lecture Notes in Computer Science. 3108, p. 454-465 12 p.

Research output: Contribution to journalArticle

Side Channel Attacks
Public-key Cryptosystem
Exponentiation
Cryptography
Differential Power Analysis
2003
Hash functions
Security of data
Authentication
Scalar multiplication
Elliptic Curves
Scalar
Network protocols
Computational efficiency
5 Citations (Scopus)
Timing Attack
Public-key Cryptosystem
Cryptography
Modulus
Random Oracle Model
1 Citation (Scopus)
Elliptic Curve Cryptosystem
Side Channel Attacks
Subtraction
Cryptography
Countermeasures