• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • 2012

    Efficient implementation of evaluating multivariate quadratic system with GPUs

    Tanaka, S., Nishide, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 1 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Information hiding in subcells of a two-dimensional code

    Teraura, N. & Sakurai, K., 12 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Information hiding of two-dimensional code by multi-layer optical

    Teraura, N. & Sakurai, K., 10 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Mixed-strategy game based trust management for clustered wireless sensor networks

    Hao, D., Adhikari, A. & Sakurai, K., 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Multi-user keyword search scheme for secure data sharing with fine-grained access control

    Zhao, F., Nishide, T. & Sakurai, K., 8 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7259 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    50 被引用数 (Scopus)
  • On revenue driven server management incloud

    Zhao, L. & Sakurai, K., 8 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Preventing the access of fraudulent WEB sites by using a special two-dimensional code

    Teraura, N. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 645-650 6 p. 6296930. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Proposal of the hierarchical file server groups for implementing mandatory access control

    Sakuraba, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 639-644 6 p. 6296929. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Reducing the key size of rainbow using non-commutative rings

    Yasuda, T., Sakurai, K. & Takagi, T., 3 8 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. p. 68-83 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7178 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 12 1 2012, E-Business and Telecommunications: International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers. Sevillano, J. L. & Filipe, J. (eds.). p. 233-248 16 p. (Communications in Computer and Information Science; vol. 314).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure keyword search using bloom filter with specified character positions

    Suga, T., Nishide, T. & Sakurai, K., 9 14 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings. p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7496 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Weakness of provably secure searchable encryption against frequency analysis

    Suga, T., Nishide, T. & Sakurai, K., 12 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • 2013

    Analysis of methods for detecting compromised nodes and its countermeasures

    Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., 2013, IT Convergence and Security 2012. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A proposal for the privacy leakage verification tool for android application developers

    Matsumoto, S. & Sakurai, K., 4 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Yamauchi, K., Hori, Y. & Sakurai, K., 1 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Detection of android API call using logging mechanism within android framework

    Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Efficient computing over GF(216) using graphics processing unit

    Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 10 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Image splicing verification based on pixel-based alignment method

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 9 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

    Zhao, L. & Sakurai, K., 1 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Multivariate signature scheme using quadratic forms

    Yasuda, T., Takagi, T. & Sakurai, K., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

    Tsuda, W., Hori, Y. & Sakurai, K., 2013, Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013. p. 570-574 5 p. 6690949. (Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

    Ruj, S. & Sakurai, K., 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 402-407 6 p. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Supporting secure provenance update by keeping "provenance" of the provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • The development of radiation-resistant rf TAGS for use at nuclear power plants

    Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., 1 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Upper bound of the length of information embedd in RSA public key efficiently

    Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • 2014

    Acquisition of evidence of web storage in HTML5 web browsers from memory image

    Matsumoto, S. & Sakurai, K., 1 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • An efficient robust secret sharing scheme with optimal cheater resiliency

    Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Chakraborty, R. S., Matyas, V. & Schaumont, P. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A parameterless learning algorithm for behavior-based detection

    Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., 1 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Attribute-based signatures without pairings via the Fiat-Shamir paradigm

    Anada, H., Arita, S. & Sakurai, K., 1 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • A zero-watermarking-like steganography and potential applications

    Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., 12 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Efficient variant of rainbow without triangular matrix representation

    Yasuda, T., Takagi, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

    Teraura, N. & Sakurai, K., 12 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Fine-grained conditional proxy re-encryption and application

    Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Liu, J. K., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    19 被引用数 (Scopus)
  • Implementation of efficient operations over GF(232) using graphics processing units

    Tanaka, S., Yasuda, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Security model and analysis of fhmqv, Revisited

    Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., 1 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Survey and new idea for attribute-based identification scheme secure against reset attacks

    Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards "receipt-freeness" in remote biometric authentication

    Ueshige, Y. & Sakurai, K., 12 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • 2015

    A proposal for detecting distributed cyber-attacks using automatic thresholding

    Feng, Y., Hori, Y. & Sakurai, K., 2015, Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 152-159 8 p. 7153950. (Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

    Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., 3 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 104-109 6 p. 7057865. (International Conference on Information Networking; vol. 2015-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Detection of illegal players in massively multiplayer online role playing game by classification algorithms

    Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., 4 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Takizawa, M., Barolli, L., Xhafa, F., Enokido, T. & Park, J. H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 406-413 8 p. 7097999. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2015-April).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

    Tanaka, S., Cheng, C. M. & Sakurai, K., 1 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

    Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Identity-embedding method for decentralized public-key infrastructure

    Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

    Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., 2 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Privacy-aware cloud-based input method editor

    Kawamoto, J. & Sakurai, K., 1 12 2015, 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014. Institute of Electrical and Electronics Engineers Inc., p. 209-213 5 p. 7008273. (2014 IEEE/CIC International Conference on Communications in China, ICCC 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

    Teraura, N. & Sakurai, K., 9 14 2015, 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Institute of Electrical and Electronics Engineers Inc., 7266514

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Reconstructing and visualizing evidence of artifact from firefox sessionstorage

    Matsumoto, S., Onitsuka, Y., Kawamoto, J. & Sakurai, K., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 83-94 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution