Pureに変更を加えた場合、すぐここに表示されます。

研究成果 1991 2020

フィルター
会議での発言
2020

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., 1 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (版). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; 巻数 926).

研究成果: 著書/レポートタイプへの貢献会議での発言

Defects

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 1 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (版). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; 巻数 926).

研究成果: 著書/レポートタイプへの貢献会議での発言

Feature extraction
Intrusion detection
Learning systems
Classifiers
Internet of things

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kaneko, K., Sharma, S. & Sakurai, K., 1 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (版). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; 巻数 926).

研究成果: 著書/レポートタイプへの貢献会議での発言

Distributed computer systems
2019

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 1 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (版). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11449 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Clique Graphs
Analysis of variance
Analysis of variance (ANOVA)
Mining
Clique

Efficient shortest path routing algorithms for distributed XML processing

Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., 1 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (版). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

研究成果: 著書/レポートタイプへの貢献会議での発言

Routing algorithms
XML
Processing
Internet

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., 9 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

研究成果: 著書/レポートタイプへの貢献会議での発言

公開
training method
incident
programming
evaluation
questionnaire

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., 6 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

研究成果: 著書/レポートタイプへの貢献会議での発言

Text Classification
Neural Networks
Gradient methods
Information use
Attack
2018

Active attack against oblivious RAM

Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., 8 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (版). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; 巻数 2018-May).

研究成果: 著書/レポートタイプへの貢献会議での発言

Random access storage

A new design for evaluating moving target defense system

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Moving Target
Information systems
Servers
Attack
Evaluation Method

A New Design for Evaluating Moving Target Defense System

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Thresholding
Networking
Attack
Software
Historical Data

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; 巻数 2018-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

Websites
Blood
Internet

Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

Su, J., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Activation Function
Chemical activation
Neural Networks
Robustness
Neural networks

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., 10 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Feature Selection
Support vector machines
Learning systems
Feature extraction
Machine Learning

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., 1 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (版). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; 巻数 2018-March).

研究成果: 著書/レポートタイプへの貢献会議での発言

Supply chains
Risk management
Integrated circuits
Hardware security
Semiconductor materials
1 引用 (Scopus)

Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., 1 1 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (版). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11125 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Access Structure
Secret Sharing Scheme
Secret Sharing
Robustness
Scenarios

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., 巻 2018-January. p. 133-136 4 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Integrity
1 引用 (Scopus)

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; 巻数 2018-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Encryption

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). 巻 2. p. 664-669 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

8 引用 (Scopus)

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 6 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (版). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

Image recognition
Internet
Domestic appliances
Cameras
Internet of things

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Topology
Neuroevolution
Neural Networks
Neural networks

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., 巻 2018-January. p. 522-528 7 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Computer networks
Controllers
Processing
Switches
Communication
2 引用 (Scopus)

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., 12 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (版). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Health
Electronic medical equipment
Public health
Medicine
Burden
2 引用 (Scopus)

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., 1 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (版). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11281 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Access Structure
Secret Sharing Scheme
Secret Sharing
Efficient Solution
Robustness

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Swarm Robotics
Information Sharing
Robotics
Robots
Autonomous Robots

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Internet of Things
Malware
Tracing
Attack
Denial of Service

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

2017
2 引用 (Scopus)

A behavior-based online engine for detecting distributed cyber-attacks

Feng, Y., Hori, Y. & Sakurai, K., 1 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (版). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10144 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Engine
Attack
Engines
Information theory
Information Theory

A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

Feng, Y., Hori, Y. & Sakurai, K., 1 1 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (版). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10656 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Denial of Service
Normal Modes
Performance Evaluation
Attack
Information theory
6 引用 (Scopus)

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

Razouk, W., Sgandurra, D. & Sakurai, K., 10 17 2017, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Hamdan, H., Hidoussi, F. & Boubiche, D. E. (版). Association for Computing Machinery, a35. (ACM International Conference Proceeding Series).

研究成果: 著書/レポートタイプへの貢献会議での発言

Fog
Middleware
Communication
Cloud computing
Radio frequency identification (RFID)

A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

Ishikawa, T. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Risk management
Costs

A traceable signcryption scheme for secure sharing of data in cloud storage

Ahuja, R., Mohanty, S. K. & Sakurai, K., 3 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

Servers
Cryptography
Access control
Labels
Costs
4 引用 (Scopus)

C&C session detection using random forest

Lu, L., Feng, Y. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Servers
Classifiers
Telecommunication traffic
Denial-of-service attack
Botnet

Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., 4 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (版). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399

研究成果: 著書/レポートタイプへの貢献会議での発言

Authentication
Network protocols
Mobile devices
Synchronization
Internet

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Evasion attacks against statistical code obfuscation detectors

Su, J., Vargas, D. V. & Sakurai, K., 1 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (版). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10418 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Obfuscation
Detector
Attack
Detectors
JavaScript

Host independent and distributed detection system of the network attack by using OpenFlow

Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., 4 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

研究成果: 著書/レポートタイプへの貢献会議での発言

Multi agent systems
Control systems
Controllers
1 引用 (Scopus)

Improving the accuracy of signature authentication using the eight principles of yong

Nishigori, T., Kawamoto, J. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Authentication
Smartphones

On the robustness of visual cryptographic schemes

Dutta, S., Roy, P. S., Adhikari, A. & Sakurai, K., 1 1 2017, Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Kim, H. J., Liu, F., Perez-Gonzalez, F. & Shi, Y. Q. (版). Springer Verlag, p. 251-262 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10082 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Secret Sharing Scheme
Cryptography
Robustness
Visual Cryptography
Coalitions
2 引用 (Scopus)

On unconditionally binding code-based commitment schemes

Morozov, K., Roy, P. S. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 101. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Hardness
Decoding
Cryptography
4 引用 (Scopus)

Parameter manipulation attack prevention and detection by using web application deception proxy

Ishikawa, T. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 74. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Industry
2 引用 (Scopus)

Secure and light weight fine-grained access mechanism for outsourced data

Jahan, M., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., 9 7 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. Institute of Electrical and Electronics Engineers Inc., p. 201-209 9 p. 8029441. (Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Mobile devices
Cryptography
Access control
Encryption
Owners
3 引用 (Scopus)

SQL injection attack detection method using expectation criterion

Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., 1 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

2016
3 引用 (Scopus)

A behavior-based method for detecting DNS amplification attacks

Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., 12 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (版). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

Amplification
Servers
Bandwidth
7 引用 (Scopus)

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., 12 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

Learning systems
Servers
Network protocols
Learning algorithms
Denial-of-service attack

Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

Ueshige, Y. & Sakurai, K., 5 19 2016, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016. Barolli, L., Enokido, T., Takizawa, M., Jara, A. J. & Bocchi, Y. (版). Institute of Electrical and Electronics Engineers Inc., p. 769-775 7 p. 7474167. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; 巻数 2016-May).

研究成果: 著書/レポートタイプへの貢献会議での発言

Biometrics
Authentication
Network protocols
Servers
2 引用 (Scopus)

An analysis of IT assessment security maturity in higher education institution

Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D. & Sakurai, K., 1 1 2016, Information Science and Applications, ICISA 2016. Kim, K. J. & Joukov, N. (版). Springer Verlag, p. 701-713 13 p. (Lecture Notes in Electrical Engineering; 巻数 376).

研究成果: 著書/レポートタイプへの貢献会議での発言

Information technology
Education
Information management
Monitoring
3 引用 (Scopus)

An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

Ahuja, R., Mohanty, S. K. & Sakurai, K., 12 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 39-47 9 p. 7782056

研究成果: 著書/レポートタイプへの貢献会議での発言

Cloud computing
Access control
Computer systems
Servers
Cryptography