• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • Elliptic curves with the montgomery-form and their cryptographic applications

    Okeya, K., Kurumatani, H. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    58 被引用数 (Scopus)
  • Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

    Su, J., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

    Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Enforcement of integrated security policy in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • English vs. sealed bid in anonymous electronic auction protocols

    Hirakiuchi, D. & Sakurait, K., 1 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Enhanced privacy in key-exchange protocols by one-time ID

    Imamoto, K. & Sakurai, K., 12 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhancing cooperative behavior for online reputation systems by group selection

    Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

    Iwanaga, M., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Evaluation of gamma ray durability of RF tag and application to the radiation environment

    Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., 1 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

    Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

    Fukushima, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

    Tanaka, S., Cheng, C. M. & Sakurai, K., 1 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

    Teraura, N. & Sakurai, K., 12 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Evasion attacks against statistical code obfuscation detectors

    Su, J., Vargas, D. V. & Sakurai, K., 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Exploring security countermeasures along the attack sequence

    Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Expressive rating scheme by signatures with predications on ratees

    Anada, H., Ruj, S. & Sakurai, K., 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Yung, M., Chen, J., Su, C. & Piuri, V. (eds.). Springer Verlag, p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Face completion with pyramid semantic attention and latent codes

    Cao, S. & Sakurai, K., 11 2020, Proceedings - 2020 8th International Symposium on Computing and Networking, CANDAR 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 09394355. (Proceedings - 2020 8th International Symposium on Computing and Networking, CANDAR 2020).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    52 被引用数 (Scopus)
  • Feature selection for machine learning-based early detection of distributed cyber attacks

    Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., 10 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • Fine-grained conditional proxy re-encryption and application

    Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Liu, J. K., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    19 被引用数 (Scopus)
  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 12 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Formal verification for access control in web information sharing system

    Sakai, A., Hori, Y. & Sakurai, K., 11 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Forward secure privacy protection scheme for RFID system using advanced encryption standard

    Yeo, S. S., Sakurai, K., Cho, S. E., Yang, K. S. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Springer Verlag, p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • FPGA-targeted hardware implementations of K2

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Frame difference generative adversarial networks: Clearer contour video generating

    Qiu, R., Vargas, D. V. & Sakurai, K., 11 2019, Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019. Institute of Electrical and Electronics Engineers Inc., p. 169-175 7 p. 8951676. (Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • General fault attacks on multivariate public key cryptosystems

    Hashimoto, Y., Takagi, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Generic, optimistic, and efficient schemes for fair certified email delivery

    Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Granularity considering in a trust model for P2P networks

    Li, M., Ren, Y., Kouichi, S., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Grid based network address space browsing for network traffic visualization

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 1 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Grouping proof for RFID tags

    Saito, J. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    144 被引用数 (Scopus)
  • Grouping provenance information to improve efficiency of access Control

    Syalim, A., Hori, Y. & Sakurai, K., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Group key distribution scheme for reducing required rekey message size

    Nishi, R. & Sakurai, K., 9 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Hardware trojan cyber-physical threats to supply chains

    Sauer, K., David, M. & Sakurai, K., 1 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

    Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Host independent and distributed detection system of the network attack by using OpenFlow

    Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., 4 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • How intractable is the discrete logarithm for a general finite group?

    Okamoto, T., Sakurai, K. & Shizuya, H., 1 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • How to sign multiple versions of digital documents

    Syalim, A. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • How to utilize the transformability of digital signatures for solving the oracle problem

    Mambo, M., Sakurai, K. & Okamoto, E., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

    Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Identity-embedding method for decentralized public-key infrastructure

    Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Zhao, L., Xiao, D. & Sakurai, K., 7 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Image splicing verification based on pixel-based alignment method

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 9 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Implementation of efficient operations over GF(232) using graphics processing units

    Tanaka, S., Yasuda, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

    Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Importance of data standardization in privacy-preserving k-means clustering

    Su, C., Zhan, J. & Sakurai, K., 2009, Database Systems for Advanced Applications - DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD. p. 276-286 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5667 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Improved proxy re-encryption scheme for symmetric key cryptography

    Syalim, A., Nishide, T. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Improvement on secrecy capacity of wireless LAN using matched filter

    Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., 12 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

    Zhao, L. & Sakurai, K., 1 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving linear cryptanalysis of LOKI91 by probabilistic counting method

    Sakurai, K. & Furuya, S., 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 被引用数 (Scopus)