• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • Improving the accuracy of signature authentication using the eight principles of yong

    Nishigori, T., Kawamoto, J. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

    Han, Y., Sakai, A., Hori, Y. & Sakurai, K., 7 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. Park, J. H., Zhan, J., Lee, C., Wang, G., Kim, T. & Yeo, S-S. (eds.). p. 105-110 6 p. (Communications in Computer and Information Science; vol. 36).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding

    Wang, T., Feng, Y. & Sakurai, K., 1 4 2021, Proceedings of the 2021 15th International Conference on Ubiquitous Information Management and Communication, IMCOM 2021. Lee, S., Choo, H. & Ismail, R. (eds.). Institute of Electrical and Electronics Engineers Inc., 9377395. (Proceedings of the 2021 15th International Conference on Ubiquitous Information Management and Communication, IMCOM 2021).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Induction and implementation of security requirements in each system block

    Kim, T. H., Sakurai, K. & Hwang, S. M., 12 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Information hiding in subcells of a two-dimensional code

    Teraura, N. & Sakurai, K., 12 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Information hiding of two-dimensional code by multi-layer optical

    Teraura, N. & Sakurai, K., 10 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Gao, P., Nishide, T., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Interactively combining 2D and 3D visualization for network traffic monitoring

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    16 被引用数 (Scopus)
  • Invalidation of mailing list address to block spam mails

    Takahashi, K., Sakai, A. & Sakurai, K., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • K2 stream cipher

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; vol. 23 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Key distribution scheme using matched filter resistant against DoS attack

    Nishi, R., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Lightweight classification of IoT malware based on image recognition

    Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 6 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    80 被引用数 (Scopus)
  • Making hash functions from block ciphers secure and efficient by using convolutional codes

    Inoue, T. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • Methodology for evaluating information security countermeasures of a system

    Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Mixed-strategy game based trust management for clustered wireless sensor networks

    Hao, D., Adhikari, A. & Sakurai, K., 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Mobile agent based security monitoring and analysis for the electric power infrastructure

    David, M. W. & Sakurai, K., 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Model-based intrusion detection by abstract interpretation

    Hua, J., Nishide, T. & Sakurai, K., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and containment of search worms targeting web applications

    Hua, J. & Sakurai, K., 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Monitoring unused IP addresses on segments managed by DHCP

    Mizoguchi, S., Hori, Y. & Sakurai, K., 12 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Multi-user keyword search scheme for secure data sharing with fine-grained access control

    Zhao, F., Nishide, T. & Sakurai, K., 8 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7259 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    50 被引用数 (Scopus)
  • Multivariate signature scheme using quadratic forms

    Yasuda, T., Takagi, T. & Sakurai, K., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Neural cryptography based on the topology evolving neural networks

    Zhu, Y., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Neural Cryptography Based on the Topology Evolving Neural Networks

    Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • New semantically secure public-key cryptosystems from the rsa-primitive

    Sakurai, K. & Takagi, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

    Sakurai, K. & Itoh, T., 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 被引用数 (Scopus)
  • On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

    Okeya, K. & Sakurai, K., 1 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    37 被引用数 (Scopus)
  • On-line versus off-line in money-making strategies with brokerage

    Dannoura, E. & Sakurai, K., 1 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On revenue driven server management incloud

    Zhao, L. & Sakurai, K., 8 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

    Sakurai, K., 1 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On studying P2P topology construction based on virtual regions and its effect on search performance

    Wang, Y., Wang, W., Sakurai, K. & Hori, Y., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • On the application of clique problem for proof-of-work in cryptocurrencies

    Bag, S., Ruj, S. & Sakurai, K., 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (eds.). Springer Verlag, p. 260-279 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9589).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

    Yanbe, A. & Sakurai, K., 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Cai, J-Y., Wong, C. K. & Wong, C. K. (eds.). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1090).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On the complexity of constant round ZKIP of possession of knowledge

    Itoh, T. & Sakurai, K., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • On the complexity of hyperelliptic discrete logarithm problem

    Shizuya, H., Itoh, T. & Sakurai, K., 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 547 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • On the discrepancy between serial and parallel of zero-knowledge protocols

    Sakurai, K. & Itoh, T., 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (ed.). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 740 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 被引用数 (Scopus)
  • On the power of multidoubling in speeding up elliptic scalar multiplication

    Sakai, Y. & Sakurai, K., 2001, Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. Vaudenay, S. & Youssef, A. M. (eds.). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2259).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • On the robustness of visual cryptographic schemes

    Dutta, S., Roy, P. S., Adhikari, A. & Sakurai, K., 1 1 2017, Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Kim, H. J., Liu, F., Perez-Gonzalez, F. & Shi, Y. Q. (eds.). Springer Verlag, p. 251-262 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10082 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • On the security of a modified paillier public-key primitive

    Sakurai, K. & Takagi, T., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • On the security of SELinux with a simplified policy

    Sueyasu, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On threshold RSA-signing with no dealer

    Miyazaki, S., Sakurai, K. & Yung, M., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • On unconditionally binding code-based commitment schemes

    Morozov, K., Roy, P. S. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 101. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • On zero-knowledge proofs: "From membership to decision" (extended abstract)

    Di Crescenzo, G., Sakurai, K. & Yung, M., 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Over Fp vs. Over F2n and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

    Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

    You, X., Feng, Y. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 522-528 7 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    12 被引用数 (Scopus)
  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

    Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., 2 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Parameter manipulation attack prevention and detection by using web application deception proxy

    Ishikawa, T. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 74. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)