If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference article
2015
3 Citations (Scopus)

Evaluation of a zero-watermarking-type steganography

Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., Jan 1 2015, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9023, p. 613-624 12 p.

Research output: Contribution to journalConference article

Steganography
Visual System
Image Compression
Watermark
Watermarking
2005

A probabilistic method for detecting anomalous program behavior

Tatara, K., Tabata, T. & Sakurai, K., Sep 1 2005, In : Lecture Notes in Computer Science. 3325, p. 87-98 12 p.

Research output: Contribution to journalConference article

Probabilistic Methods
Bayesian networks
Anomalous
Bayesian Networks
Prediction Model
8 Citations (Scopus)

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic

Imamoto, K. & Sakurai, K., Jul 5 2005, In : Electronic Notes in Theoretical Computer Science. 135, 1, p. 79-94 16 p.

Research output: Contribution to journalConference article

Authenticated Key Exchange
Key Exchange
Diffie-Hellman
Attack
Logic
1 Citation (Scopus)

Key-exchange protocol using pre-agreed session-ID

Imamoto, K. & Sakurai, K., Sep 1 2005, In : Lecture Notes in Computer Science. 3325, p. 375-387 13 p.

Research output: Contribution to journalConference article

Key Exchange
Network protocols
Radio communication
Privacy
Internet
23 Citations (Scopus)

Security analysis of a 2/3-rate double length compression function in the black-box model

Nandi, M., Lee, W., Sakurai, K. & Lee, S., Oct 17 2005, In : Lecture Notes in Computer Science. 3557, p. 243-254 12 p.

Research output: Contribution to journalConference article

Compression Function
Security Analysis
Black Box
Collision Attack
Model

Some fitting of naive Bayesian spam filtering for Japanese environment

Iwanaga, M., Tabata, T. & Sakurai, K., Sep 1 2005, In : Lecture Notes in Computer Science. 3325, p. 135-143 9 p.

Research output: Contribution to journalConference article

Spam
Electronic mail
Electronic Mail
Filtering
Experimental Results