• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • A new design for evaluating moving target defense system

    Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A New Design for Evaluating Moving Target Defense System

    Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A new scheme for distributed density estimation based privacy-preserving clustering

    Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 8 14 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 112-119 8 p. 4529328. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Zhao, L., Adhikari, A. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 10 17 2017, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Hamdan, H., Hidoussi, F. & Boubiche, D. E. (eds.). Association for Computing Machinery, a35. (ACM International Conference Proceeding Series).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    18 被引用数 (Scopus)
  • An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

    Ahuja, R., Mohanty, S. K. & Sakurai, K., 12 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 39-47 9 p. 7782056. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • An image splicing detection based on interpolation analysis

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 12 27 2012, Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings. p. 390-401 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7674 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • An IND-CCA2 public-key cryptosystem with fast decryption

    Buchmann, J., Sakurai, K. & Takagi, T., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • An intrusion detection system using alteration of data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 11 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 243-248 6 p. 1620199. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • An intrusion detection system which can restore altered data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 2007, Fourth International Conference on Information Technology and Applications, ICITA 2007. p. 29-34 6 p. (Fourth International Conference on Information Technology and Applications, ICITA 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption

    Hada, S. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • An RFID system based MCLT system with improved privacy

    Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • Any language in IP has a divertible ZKIP

    Itoh, T., Sakurai, K. & Shizuya, H., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • A parameterless learning algorithm for behavior-based detection

    Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., 1 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A policy language for the extended reference monitor in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 8 29 2007, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007. p. 1160-1166 7 p. 4159922. (Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Application and evaluation of Bayesian filter for Chinese spam

    Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Application of NTRU using group rings to partial decryption technique

    Yasuda, T., Anada, H. & Sakurai, K., 1 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 203-213 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Application of scalar multiplication of edwards curves to pairing-based cryptography

    Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. Vol. 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A practical proxy device for protecting RFID tag's identifier

    Yeo, S. S., Sakurai, K. & Kwak, J., 2007, Proceedings - 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007. p. 55-58 4 p. 4290939

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A proactive secret sharing for server assisted threshold signatures

    Yang, J. P., Rhee, K. H. & Sakurai, K., 1 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • A progress report on subliminal-free channels

    Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., 1 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    12 被引用数 (Scopus)
  • A proposal for cyber-attack trace-back using packet marking and logging

    Li, P., Feng, Y., Kawamoto, J. & Sakurai, K., 12 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 603-607 5 p. 7794540. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A proposal for detecting distributed cyber-attacks using automatic thresholding

    Feng, Y., Hori, Y. & Sakurai, K., 2015, Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 152-159 8 p. 7153950. (Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A proposal for the privacy leakage verification tool for android application developers

    Matsumoto, S. & Sakurai, K., 4 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A proposal of efficient scheme of key management using ID-based encryption and biometrics

    Izumi, A., Ueshige, Y. & Sakurai, K., 12 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 29-34 6 p. 4197245. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

    Ishikawa, T. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A proposal of one-time biometric authentication

    Ueshige, Y. & Sakurai, K., 12 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Zhao, L., Ren, Y. & Sakurai, K., 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    15 被引用数 (Scopus)
  • A robust and compression-combined digital image encryption method based on compressive sensing

    Huang, R. & Sakurai, K., 12 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    53 被引用数 (Scopus)
  • A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 1 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    28 被引用数 (Scopus)
  • A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

    Chou, B. H., Tatara, K., Sakuraba, T., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 421-426 6 p. 4511604. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Yasuda, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A sequential scheme for detecting cyber attacks in IoT environment

    Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 8 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 8890502. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A signature scheme associated with universal re-signcryption

    Tatara, K. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 780-785 6 p. 5066564. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A SMS-based mobile botnet using flooding algorithm

    Hua, J. & Sakurai, K., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    30 被引用数 (Scopus)
  • A study of communication route selection considering route security

    Etoh, F., Hori, Y. & Sakurai, K., 9 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A study of security management with cyber insurance

    Ishikawa, T. & Sakurai, K., 1 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a68. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A traceable signcryption scheme for secure sharing of data in cloud storage

    Ahuja, R., Mohanty, S. K. & Sakurai, K., 3 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Attribute-based signatures without pairings via the Fiat-Shamir paradigm

    Anada, H., Arita, S. & Sakurai, K., 1 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Attribute-based two-tier signatures: Definition and construction

    Anada, H., Arita, S. & Sakurai, K., 2016, Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers. Yun, A. & Kwon, S. (eds.). Springer Verlag, p. 36-49 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • A zero-watermarking-like steganography and potential applications

    Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., 12 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Barrier: A lightweight hypervisor for protecting kernel integrity via memory isolation

    Hua, J. & Sakurai, K., 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 1470-1477 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Behavior control based on dynamic code translation

    Sakai, A., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Blind decoding, blind undeniable signatures, and their applications to privacy protection

    Sakurai, K. & Yamane, Y., 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • Bot detection based on traffic analysis

    Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 303-306 4 p. 4438445. (Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    23 被引用数 (Scopus)
  • C&C session detection using random forest

    Lu, L., Feng, Y. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • CCA-secure keyed-fully homomorphic encryption

    Lai, J., Deng, R. H., Ma, C., Sakurai, K. & Weng, J., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Persiano, G., Cheng, C-M., Chung, K-M. & Yang, B-Y. (eds.). Springer Verlag, p. 70-98 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Certified e-mail systems using public notice board

    Imamoto, K. & Sakurai, K., 1 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

    Di Crescenzo, G., Sakurai, K. & Yung, M., 1998, Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings. Springer Verlag, p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)