• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • Yet another note on block withholding attack on bitcoin mining pools

    Bag, S. & Sakurai, K., 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    21 被引用数 (Scopus)
  • Weakness of provably secure searchable encryption against frequency analysis

    Suga, T., Nishide, T. & Sakurai, K., 12 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows

    Dutta, S., Bhore, T., Sardar, M. K., Adhikari, A. & Sakurai, K., 2021, Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019. Giri, D., Ho, A. T. S., Ponnusamy, S. & Lo, N-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 19-32 14 p. (Advances in Intelligent Systems and Computing; vol. 1170).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Upper bound of the length of information embedd in RSA public key efficiently

    Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Universal Rules for Fooling Deep Neural Networks based Text Classification

    Li, D., Vargas, D. V. & Kouichi, S., 6 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Two-servers PIR based DNS query scheme with privacy-preserving

    Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    21 被引用数 (Scopus)
  • Two-party privacy-preserving agglomerative document clustering

    Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Trust similarity measure in trust model for P2P networks

    Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., 12 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

    Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., 12 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Trends and issues for security of home-network based on power line communication

    Nishi, R., Morioka, H. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Tracing MIRAI Malware in Networked System

    Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Tracing MIRAI malware in networked system

    Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Traceback framework against botmaster by sharing network communication pattern information

    Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Towards "receipt-freeness" in remote biometric authentication

    Ueshige, Y. & Sakurai, K., 12 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 9 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Towards countermeasure of insider threat in network security

    Hori, Y., Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

    Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Thoughts on multi-disciplinary inspired research on open network and information system

    Yufeng, W., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability—Revisited

    Dutta, S. & Sakurai, K., 2021, Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019. Giri, D., Ho, A. T. S., Ponnusamy, S. & Lo, N-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 97-109 13 p. (Advances in Intelligent Systems and Computing; vol. 1170).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • The optimal choice by resource consumers in Grid market

    Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • The development of radiation-resistant rf TAGS for use at nuclear power plants

    Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., 1 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Ternary subset difference method and its quantitative analysis

    Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Survey and new idea for attribute-based identification scheme secure against reset attacks

    Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Suppressing chain size of blockchain-based information sharing for swarm robotic systems

    Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Supporting secure provenance update by keeping "provenance" of the provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Subliminal channels for signature transfer and their application to signature distribution schemes

    Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Study on trust inference and emergence of economical small-world phenomena in P2P environment

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Study of log file dispersion management method

    Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 10 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • SQL injection attack detection method using expectation criterion

    Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., 1 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

    Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Some remarks on security of receipt-free E-auction

    Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. p. 560-563 4 p. 1489023. (Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005; vol. II).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Simulation system of autonomous vehicles for overtaking service using smart contract

    Kaneko, K., Yan, K. & Sakurai, K., 2021, Complex, Intelligent and Software Intensive Systems - Proceedings of the 14th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2020. Barolli, L., Poniszewska-Maranda, A. & Enokido, T. (eds.). Springer, p. 199-209 11 p. (Advances in Intelligent Systems and Computing; vol. 1194 AISC).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Simulation of Secure Volunteer Computing by Using Blockchain

    Shota, J., Kosuke, K., Sharma, S. & Kouichi, S., 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (eds.). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Simple power analysis on fast modular reduction with NIST recommended elliptic curves

    Sakai, Y. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Security policy pre-evaluation towards risk analysis

    Yi, H., Hori, Y. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 415-420 6 p. 4511603. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

    Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Security model and analysis of fhmqv, Revisited

    Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., 1 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Security issues for contactless smart cards

    David, M. W. & Sakurai, K., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Security and trust issues on digital supply chain

    Zhang, H., Nakamura, T. & Sakurai, K., 8 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 338-343 6 p. 8890486. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; vol. 270).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; vol. 270).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Security analysis for P2P routing protocols

    Fujii, T., Ren, Y., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 899-904 6 p. 5066584. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Securing sensor networks by moderating frequencies

    Sarkar, P., Mahish, P., Chowdhury, M. U. & Sakurai, K., 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 173-185 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Securing location-aware services based on online/offline signatures in VANETs

    Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data

    Sardar, L., Bansal, G., Ruj, S. & Sakurai, K., 1 5 2021, 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021. Institute of Electrical and Electronics Engineers Inc., p. 465-473 9 p. 9352809. (2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure keyword search using bloom filter with specified character positions

    Suga, T., Nishide, T. & Sakurai, K., 9 14 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings. p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7496 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)
  • Secure hyperelliptic cryptosystems and their performance

    Sakai, Y., Sakurai, K. & Ishizuka, H., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)