• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

    Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Hardware trojan cyber-physical threats to supply chains

    Sauer, K., David, M. & Sakurai, K., 1 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (eds.). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; vol. 2018-March).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Group key distribution scheme for reducing required rekey message size

    Nishi, R. & Sakurai, K., 9 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Grouping provenance information to improve efficiency of access Control

    Syalim, A., Hori, Y. & Sakurai, K., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Grouping proof for RFID tags

    Saito, J. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    147 被引用数 (Scopus)
  • Grid based network address space browsing for network traffic visualization

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 1 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Granularity considering in a trust model for P2P networks

    Li, M., Ren, Y., Kouichi, S., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Generic, optimistic, and efficient schemes for fair certified email delivery

    Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • General fault attacks on multivariate public key cryptosystems

    Hashimoto, Y., Takagi, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Frame difference generative adversarial networks: Clearer contour video generating

    Qiu, R., Vargas, D. V. & Sakurai, K., 11 2019, Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019. Institute of Electrical and Electronics Engineers Inc., p. 169-175 7 p. 8951676. (Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • FPGA-targeted hardware implementations of K2

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Forward secure privacy protection scheme for RFID system using advanced encryption standard

    Yeo, S. S., Sakurai, K., Cho, S. E., Yang, K. S. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Springer Verlag, p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Formal verification for access control in web information sharing system

    Sakai, A., Hori, Y. & Sakurai, K., 11 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 12 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Fine-grained conditional proxy re-encryption and application

    Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Liu, J. K., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)
  • Feature selection for machine learning-based early detection of distributed cyber attacks

    Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., 10 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    52 被引用数 (Scopus)
  • Face completion with pyramid semantic attention and latent codes

    Cao, S. & Sakurai, K., 11 2020, Proceedings - 2020 8th International Symposium on Computing and Networking, CANDAR 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 09394355. (Proceedings - 2020 8th International Symposium on Computing and Networking, CANDAR 2020).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Expressive rating scheme by signatures with predications on ratees

    Anada, H., Ruj, S. & Sakurai, K., 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Yung, M., Chen, J., Su, C. & Piuri, V. (eds.). Springer Verlag, p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Exploring security countermeasures along the attack sequence

    Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Evasion attacks against statistical code obfuscation detectors

    Su, J., Vargas, D. V. & Sakurai, K., 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

    Teraura, N. & Sakurai, K., 12 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

    Tanaka, S., Cheng, C. M. & Sakurai, K., 1 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

    Fukushima, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

    Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Evaluation of gamma ray durability of RF tag and application to the radiation environment

    Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., 1 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

    Iwanaga, M., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Enhancing cooperative behavior for online reputation systems by group selection

    Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhanced privacy in key-exchange protocols by one-time ID

    Imamoto, K. & Sakurai, K., 12 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • English vs. sealed bid in anonymous electronic auction protocols

    Hirakiuchi, D. & Sakurait, K., 1 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Enforcement of integrated security policy in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

    Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

    Su, J., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Elliptic curves with the montgomery-form and their cryptographic applications

    Okeya, K., Kurumatani, H. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    59 被引用数 (Scopus)
  • Efficient variant of rainbow without triangular matrix representation

    Yasuda, T., Takagi, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Efficient threshold secret sharing schemes secure against rushing cheaters

    Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Efficient shortest path routing algorithms for distributed XML processing

    Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., 1 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

    Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 1 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Efficient intrusion detection based on static analysis and stack walks

    Hua, J., Li, M., Sakurai, K. & Ren, Y., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Efficient implementation of evaluating multivariate quadratic system with GPUs

    Tanaka, S., Nishide, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

    Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Koc, C. K., Naccache, D., Paar, C. & Paar, C. (eds.). Springer Verlag, p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    54 被引用数 (Scopus)
  • Efficient computing over GF(216) using graphics processing unit

    Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 10 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Efficient algorithms for the construction of hyperelliptic cryptosystems

    Okamoto, T. & Sakurai, K., 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 被引用数 (Scopus)
  • Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

    Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

    Yu, S., Vargas, D. V. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Economic-inspired truthful reputation feedback mechanism in P2P networks

    Wang, Y., Hori, Y. & Sakurai, K., 8 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Distributing security-mediated PKI revisited

    Yang, J. P., Sakurai, K. & Rhee, K. H., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Distributed Paillier cryptosystem without trusted dealer

    Nishide, T. & Sakurai, K., 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    24 被引用数 (Scopus)