• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Chapter

検索結果

  • 2020

    3-Party Adversarial Cryptography

    Meraouche, I., Dutta, S. & Sakurai, K., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 247-258 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    1 被引用数 (Scopus)
  • Blockchain for IoT-Based Digital Supply Chain: A Survey

    Zhang, H. & Sakurai, K., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 564-573 10 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    6 被引用数 (Scopus)
  • Classification of Malicious Domains by Their LIFETIME

    Hara, D., Sakurai, K. & Musashi, Y., 2020, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 334-341 8 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 47).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

  • 2017

    A comprehensive security analysis checksheet for openflow networks

    Hori, Y., Mizoguchi, S., Miyazaki, R., Yamada, A., Feng, Y., Kubota, A. & Sakurai, K., 2017, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 231-242 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    2 被引用数 (Scopus)
  • 2012

    Workflow scheduling with fault tolerance

    Zhao, L. & Sakurai, K., 2012, Network and Traffic Engineering in Emerging Distributed Computing Applications. IGI Global, p. 94-123 30 p.

    研究成果: Chapter in Book/Report/Conference proceedingChapter

  • 2007

    Privacy-preservation techniques in data mining

    Su, C., Zhou, J., Bao, F., Wang, G. & Sakurai, K., 1 1 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 187-226 40 p.

    研究成果: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A distributed online certificate status protocol with a single public key

    Koga, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    7 被引用数 (Scopus)
  • A DRM framework for secure distribution of mobile contents

    Lee, K. I., Sakurai, K., Lee, J. S. & Ryou, J. C., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kahng, H-K. & Goto, S. (eds.). Springer Verlag, p. 905-914 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3090).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    1 被引用数 (Scopus)
  • A generalization of PGV-hash functions and security analysis in black-box model

    Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    2 被引用数 (Scopus)
  • A new attack with side channel leakage during exponent recoding computations

    Sakai, Y. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Joye, M. & Quisquater, J-J. (eds.). Springer Verlag, p. 298-311 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3156).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    3 被引用数 (Scopus)
  • A software fingerprinting scheme for java using classfiles obfuscation

    Fukushima, K. & Sakurai, K., 1 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chae, K. & Yung, M. (eds.). Springer Verlag, p. 303-316 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2908).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    5 被引用数 (Scopus)
  • Enhancing privacy of universal re-encryption scheme for RFID tags

    Saito, J., Ryou, J. C. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yang, L. T., Guo, M., Gao, G. R. & Jha, N. K. (eds.). Springer Verlag, p. 879-890 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3207).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    52 被引用数 (Scopus)
  • Modified power-analysis attacks on XTR and an efficient countermeasure

    Han, D. G., Izu, T., Lim, J. & Sakurai, K., 1 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    2 被引用数 (Scopus)
  • On security of XTR public key cryptosystems against side channel attacks

    Han, D. G., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 454-465 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    5 被引用数 (Scopus)
  • Pre-production methods of a response to certificates with the common status - Design and theoretical evaluation

    Koga, S., Ryou, J. C. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3093).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    2 被引用数 (Scopus)
  • 2003

    Single-path authenticated-encryption scheme based on universal hashing

    Furuya, S. & Sakurai, K., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 94-109 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    研究成果: Chapter in Book/Report/Conference proceedingChapter

    Open Access