Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2023

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。

検索結果

  • 2008

    Characterizing economic and social properties of trust and reputation systems in P2P environment

    Wang, Y. F., Hori, Y. & Sakurai, K., 1月 2008, In: Journal of Computer Science and Technology. 23, 1, p. 129-140 12 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    26 被引用数 (Scopus)
  • Definition of security practices in security management part of security level management model

    Kim, T. H. & Sakurai, K., 12月 1 2008, In: International Journal of Security and its Applications. 2, 1, p. 63-71 9 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    1 被引用数 (Scopus)
  • Exploring security countermeasures along the attack sequence

    Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., 9月 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • FPGA-targeted hardware implementations of K2

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Granularity considering in a trust model for P2P networks

    Li, M., Ren, Y., Kouichi, S., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • IMIS 2008 message from the workshop organizers MUE 2008

    Yoo, S. M., Kim, B., Hsu, H. H., You, I., Park, J. H., Guo, M., Hsu, C. H., Simplot-Ryl, D., Sha, E. H. M., Jin, H., Lopez, J., Chen, S. C., Yamazaki, T., Yang, J., Huang, W. T., Nadamoto, A., Zhang, C., Wang, C. S., Rong, C., Sandnes, F. E., & 27 othersMin, G., Leung, H., Ahn, H., Kim, H., Ray, I., Simplot-Ryl, I., Ibrahim, I. K., García-Villalba, J., Abawajy, J. H., Guo, J., Youn, J., Sakurai, K., Shih, K. P., Deng, L. Y., Shyu, M. L., Al-Shurman, M., Kwon, O. H., Ruiz, P. M., Herrero, P., Shi, Q., Jin, Q., Park, S., Son, S. H., Chen, W. E., Pedrycz, W., Chen, X. & Huang, Y. F., 2008, In: Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. xxii-xxiii 4505681.

    研究成果: ジャーナルへの寄稿編集査読

  • Intrusion detection using third-parties support

    Fujii, M., Takahashi, K., Hori, Y. & Sakurai, K., 2008, p. 206-212. 7 p.

    研究成果: 会議への寄与タイプ学会誌査読

  • Invalidation of mailing list address to block spam mails

    Takahashi, K., Sakai, A. & Sakurai, K., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • K2 stream cipher

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12月 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; vol. 23 CCIS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • Key distribution scheme using matched filter resistant against DoS attack

    Nishi, R., Hori, Y. & Sakurai, K., 9月 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Methodology for evaluating information security countermeasures of a system

    Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Monitoring unused IP addresses on segments managed by DHCP

    Mizoguchi, S., Hori, Y. & Sakurai, K., 12月 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Optimization of group key management structure with a client join-leave mechanism

    Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2008, In: Journal of information processing. 16, p. 130-141 12 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    3 被引用数 (Scopus)
  • Reliable key distribution scheme for lossy channels

    Nishi, R., Hori, Y. & Sakurai, K., 5月 2008, In: IEICE Transactions on Information and Systems. E91-D, 5, p. 1485-1488 4 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    Open Access
    1 被引用数 (Scopus)
  • Security policy pre-evaluation towards risk analysis

    Yi, H., Hori, Y. & Sakurai, K., 9月 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 415-420 6 p. 4511603. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Thoughts on multi-disciplinary inspired research on open network and information system

    Yufeng, W., Hori, Y. & Sakurai, K., 9月 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Toward a scalable visualization system for network traffic monitoring

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 5月 2008, In: IEICE Transactions on Information and Systems. E91-D, 5, p. 1300-1310 11 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    1 被引用数 (Scopus)
  • Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

    Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., 12月 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Trust similarity measure in trust model for P2P networks

    Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., 12月 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    6 被引用数 (Scopus)
  • 2007

    A framework for user privacy protection using trusted programs

    Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., 12月 1 2007, In: International Journal of Security and its Applications. 1, 2, p. 59-70 12 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    1 被引用数 (Scopus)
  • An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Analysis of privacy disclosure in DNS query

    Zhao, F., Hori, Y. & Sakurai, K., 12月 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    30 被引用数 (Scopus)
  • An approach of program analysis prevention for information protection

    Takahashi, K., Liu, Z. & Sakurai, K., 12月 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • An approach of trusted program generation for user-responsible privacy

    Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 8月 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • An intrusion detection system which can restore altered data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 2007, Fourth International Conference on Information Technology and Applications, ICITA 2007. p. 29-34 6 p. (Fourth International Conference on Information Technology and Applications, ICITA 2007).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption

    Hada, S. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • A policy language for the extended reference monitor in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 8月 29 2007, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007. p. 1160-1166 7 p. 4159922. (Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • A practical proxy device for protecting RFID tag's identifier

    Yeo, S. S., Sakurai, K. & Kwak, J., 2007, Proceedings - 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007. p. 55-58 4 p. 4290939

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A proposal of efficient scheme of key management using ID-based encryption and biometrics

    Izumi, A., Ueshige, Y. & Sakurai, K., 12月 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 29-34 6 p. 4197245. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • A proposal of key management scheme and its operation using: Anonymous biometrics on ID-based infrastructure

    Izumi, A., Ueshige, Y. & Sakurai, K., 1月 1 2007, In: International Journal of Security and its Applications. 1, 1, p. 83-94 12 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    2 被引用数 (Scopus)
  • Bot detection based on traffic analysis

    Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 303-306 4 p. 4438445. (Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    24 被引用数 (Scopus)
  • Economic-inspired truthful reputation feedback mechanism in P2P networks

    Wang, Y., Hori, Y. & Sakurai, K., 8月 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Efficient verifier-based password-authenticated key exchange in the three-party setting

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 7月 2007, In: Computer Standards and Interfaces. 29, 5, p. 513-520 8 p.

    研究成果: ジャーナルへの寄稿総説査読

    32 被引用数 (Scopus)
  • Enforcement of integrated security policy in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Forward secure privacy protection scheme for RFID system using advanced encryption standard

    Yeo, S. S., Sakurai, K., Cho, S. E., Yang, K. S. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Springer Verlag, p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Induction and implementation of security requirements in each system block

    Kim, T. H., Sakurai, K. & Hwang, S. M., 12月 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • K2: A stream cipher algorithm using dynamic feedback control

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12月 1 2007, p. 204-213. 10 p.

    研究成果: 会議への寄与タイプ学会誌査読

    32 被引用数 (Scopus)
  • On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • On effectiveness of clock control in stream ciphers

    Kiyomoto, S., Fukushima, K., Tanaka, T. & Sakurai, K., 1月 1 2007, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E90-A, 9, p. 1780-1787 8 p.

    研究成果: ジャーナルへの寄稿学術誌査読

    2 被引用数 (Scopus)
  • On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Privacy-preservation techniques in data mining

    Su, C., Zhou, J., Bao, F., Wang, G. & Sakurai, K., 1月 1 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 187-226 40 p.

    研究成果: 書籍/レポート タイプへの寄稿

  • Privacy-preserving two-party K-means clustering via secure approximation

    Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 10月 18 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 385-391 7 p. 4221090. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; vol. 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    21 被引用数 (Scopus)
  • Special section on cryptography and information security

    Morii, M., Moriai, S., Hanaoka, G., Akishita, T., Izu, T., Iwata, T., Okada, K., Kaneko, T., Kikuchi, H., Kim, K., Kiyomoto, S., Kunthiro, N., Koga, H., Kobara, K., Sakai, R., Sakurai, K., Sako, K., Satoh, T., Shiozaki, A., Shizuya, H., & 13 othersTakagi, T., Tada, M., Tanaka, K., Doi, H., Nakanishi, T., Hirose, S., Fujisaki, E., Furuya, S., Matsui, M., Matsuzaki, N., Matsumoto, T., Miyaji, A. & Yoshida, M., 1月 2007, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E90-A, 1, p. 1 1 p.

    研究成果: ジャーナルへの寄稿編集査読

  • Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 10月 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Study on trust inference and emergence of economical small-world phenomena in P2P environment

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Two-party privacy-preserving agglomerative document clustering

    Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Two-servers PIR based DNS query scheme with privacy-preserving

    Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    21 被引用数 (Scopus)
  • 2006

    Actively modifying control flow of program for efficient anormaly detection

    Tatara, K., Tabata, T. & Sakurai, K., 1月 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A framework for the user-oriented personal information protection

    Takahashi, K. & Sakurai, K., 12月 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)