• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • Differential fault analysis of full lblock

    Zhao, L., Nishide, T. & Sakurai, K., 6 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • Detection of illegal players in massively multiplayer online role playing game by classification algorithms

    Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., 4 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. & Park, J. H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 406-413 8 p. 7097999. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2015-April).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Detection of android API call using logging mechanism within android framework

    Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

    Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., 3 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 104-109 6 p. 7057865. (International Conference on Information Networking; vol. 2015-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Yamauchi, K., Hori, Y. & Sakurai, K., 1 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Komiya, R., Feng, Y. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

    Sakai, Y. & Sakurai, K., 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    23 被引用数 (Scopus)
  • Design and object-oriented implementation of an intelligence entity sharing pool

    Huang, R., Ma, J., Takahashi, K. & Sakurai, K., 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., 7 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Design and implementation of document access control model based on role and security policy

    Mao, L., Yao, S., Zhang, K. & Sakurai, K., 11 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of an extended reference monitor for trusted operating systems

    Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. Springer Verlag, p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Design and implementation of a forced encryption kernel module

    Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

    Nishioka, M., Satoh, H. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    16 被引用数 (Scopus)
  • Deniable Secret Handshake Protocol - Revisited

    Panja, S., Dutta, S. & Sakurai, K., 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Darknet monitoring on real-operated networks

    Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Cyberbullying detection using parent-child relationship between comments

    Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., 11 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Indrawan-Santiago, M., Anderst-Kotsis, G., Steinbauer, M. & Khalil, I. (eds.). Association for Computing Machinery, p. 325-334 10 p. (ACM International Conference Proceeding Series).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Customized program protection for a user customized data protection framework

    Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., 8 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

    Sakurai, K. & Zheng, Y., 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Asano, T., Igarashi, Y., Nagamochi, H., Miyano, S. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 11 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. Wu, C-K., Lin, D. & Yung, M. (eds.). Springer Verlag, p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Cross-group secret sharing for secure cloud storage service

    Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., 1 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Xu, Y. & Sakurai, K., 5 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

    Yasuda, T., Takagi, T. & Sakurai, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Computational soundness of uniformity properties for multi-party computation based on LSSS

    Zhao, H. & Sakurai, K., 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

    Syalim, A., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    34 被引用数 (Scopus)
  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Nakamura, S., Hori, Y. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    You, I., Sakurai, K. & Hori, Y., 12 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

    Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., 4 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399. (Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

    David, M. W. & Sakurai, K., 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings

    Dutta, S., Sardar, M. K., Adhikari, A., Ruj, S. & Sakurai, K., 2020, Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Kanhere, S., Patil, V. T., Sural, S. & Gaur, M. S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 198-217 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12553 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Collaborative behavior visualization and its detection by observing darknet traffic

    Akimoto, S., Hori, Y. & Sakurai, K., 12 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Classification on attacks in wireless ad hoc networks: A game theoretic view

    Liao, X., Hao, D. & Sakurai, K., 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    13 被引用数 (Scopus)
  • Ciphertext-auditable public key encryption

    Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

    Di Crescenzo, G., Sakurai, K. & Yung, M., 1998, Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings. Springer Verlag, p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Certified e-mail systems using public notice board

    Imamoto, K. & Sakurai, K., 1 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • CCA-secure keyed-fully homomorphic encryption

    Lai, J., Deng, R. H., Ma, C., Sakurai, K. & Weng, J., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Persiano, G., Cheng, C-M., Chung, K-M. & Yang, B-Y. (eds.). Springer Verlag, p. 70-98 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • C&C session detection using random forest

    Lu, L., Feng, Y. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 34. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Bot detection based on traffic analysis

    Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 303-306 4 p. 4438445. (Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    23 被引用数 (Scopus)
  • Blind decoding, blind undeniable signatures, and their applications to privacy protection

    Sakurai, K. & Yamane, Y., 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • Behavior control based on dynamic code translation

    Sakai, A., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Barrier: A lightweight hypervisor for protecting kernel integrity via memory isolation

    Hua, J. & Sakurai, K., 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 1470-1477 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • A zero-watermarking-like steganography and potential applications

    Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., 12 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Chen, C-M., Pan, J-S. & Chao, H-C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Attribute-based two-tier signatures: Definition and construction

    Anada, H., Arita, S. & Sakurai, K., 2016, Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers. Yun, A. & Kwon, S. (eds.). Springer Verlag, p. 36-49 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Attribute-based signatures without pairings via the Fiat-Shamir paradigm

    Anada, H., Arita, S. & Sakurai, K., 1 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • A traceable signcryption scheme for secure sharing of data in cloud storage

    Ahuja, R., Mohanty, S. K. & Sakurai, K., 3 10 2017, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. Institute of Electrical and Electronics Engineers Inc., p. 524-531 8 p. 7876382. (Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A study of security management with cyber insurance

    Ishikawa, T. & Sakurai, K., 1 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a68. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A study of communication route selection considering route security

    Etoh, F., Hori, Y. & Sakurai, K., 9 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A SMS-based mobile botnet using flooding algorithm

    Hua, J. & Sakurai, K., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    30 被引用数 (Scopus)