• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • A signature scheme associated with universal re-signcryption

    Tatara, K. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 780-785 6 p. 5066564. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A sequential scheme for detecting cyber attacks in IoT environment

    Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 8 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 8890502. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Yasuda, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

    Chou, B. H., Tatara, K., Sakuraba, T., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 421-426 6 p. 4511604. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 1 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    28 被引用数 (Scopus)
  • A robust and compression-combined digital image encryption method based on compressive sensing

    Huang, R. & Sakurai, K., 12 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    53 被引用数 (Scopus)
  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Zhao, L., Ren, Y. & Sakurai, K., 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    15 被引用数 (Scopus)
  • A proposal of one-time biometric authentication

    Ueshige, Y. & Sakurai, K., 12 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

    Ishikawa, T. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 14. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A proposal of efficient scheme of key management using ID-based encryption and biometrics

    Izumi, A., Ueshige, Y. & Sakurai, K., 12 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 29-34 6 p. 4197245. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A proposal for the privacy leakage verification tool for android application developers

    Matsumoto, S. & Sakurai, K., 4 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • A proposal for detecting distributed cyber-attacks using automatic thresholding

    Feng, Y., Hori, Y. & Sakurai, K., 2015, Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 152-159 8 p. 7153950. (Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A proposal for cyber-attack trace-back using packet marking and logging

    Li, P., Feng, Y., Kawamoto, J. & Sakurai, K., 12 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 603-607 5 p. 7794540. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A progress report on subliminal-free channels

    Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., 1 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    12 被引用数 (Scopus)
  • A proactive secret sharing for server assisted threshold signatures

    Yang, J. P., Rhee, K. H. & Sakurai, K., 1 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • A practical proxy device for protecting RFID tag's identifier

    Yeo, S. S., Sakurai, K. & Kwak, J., 2007, Proceedings - 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007. p. 55-58 4 p. 4290939

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Application of scalar multiplication of edwards curves to pairing-based cryptography

    Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. Vol. 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Application of NTRU using group rings to partial decryption technique

    Yasuda, T., Anada, H. & Sakurai, K., 1 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 203-213 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Application and evaluation of Bayesian filter for Chinese spam

    Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A policy language for the extended reference monitor in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 8 29 2007, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007. p. 1160-1166 7 p. 4159922. (Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A parameterless learning algorithm for behavior-based detection

    Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., 1 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Any language in IP has a divertible ZKIP

    Itoh, T., Sakurai, K. & Shizuya, H., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • An RFID system based MCLT system with improved privacy

    Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption

    Hada, S. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • An intrusion detection system which can restore altered data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 2007, Fourth International Conference on Information Technology and Applications, ICITA 2007. p. 29-34 6 p. (Fourth International Conference on Information Technology and Applications, ICITA 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • An intrusion detection system using alteration of data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 11 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 243-248 6 p. 1620199. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • An IND-CCA2 public-key cryptosystem with fast decryption

    Buchmann, J., Sakurai, K. & Takagi, T., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • An image splicing detection based on interpolation analysis

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 12 27 2012, Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings. p. 390-401 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7674 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

    Ahuja, R., Mohanty, S. K. & Sakurai, K., 12 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 39-47 9 p. 7782056. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 10 17 2017, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Hamdan, H., Hidoussi, F. & Boubiche, D. E. (eds.). Association for Computing Machinery, a35. (ACM International Conference Proceeding Series).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    19 被引用数 (Scopus)
  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Zhao, L., Adhikari, A. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A new scheme for distributed density estimation based privacy-preserving clustering

    Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 8 14 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 112-119 8 p. 4529328. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A New Design for Evaluating Moving Target Defense System

    Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A new design for evaluating moving target defense system

    Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • An evenhanded certified email system for contract signing

    Imamoto, K., Zhou, J. & Sakurai, K., 12 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • An efficient robust secret sharing scheme with optimal cheater resiliency

    Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Chakraborty, R. S., Matyas, V. & Schaumont, P. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 8 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • An efficient key generation method in audio zero-watermarking

    Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., 12 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • An approach of trusted program generation for user-responsible privacy

    Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • An approach of program analysis prevention for information protection

    Takahashi, K., Liu, Z. & Sakurai, K., 12 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

    Sakurai, K. & Miyazaki, S., 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    48 被引用数 (Scopus)
  • An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

    Zhao, H., Feng, Y., Koide, H. & Sakurai, K., 11 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 8958477. (Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • An analysis of IT assessment security maturity in higher education institution

    Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D. & Sakurai, K., 2016, Information Science and Applications, ICISA 2016. Kim, K. J. & Joukov, N. (eds.). Springer Verlag, p. 701-713 13 p. (Lecture Notes in Electrical Engineering; vol. 376).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection

    Tatara, K., Hori, Y. & Sakurai, K., 9 12 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 485-489 5 p. 4505774. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Analysis of variance of graph-clique mining for scalable proof of work

    Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (eds.). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

    Ueshige, Y. & Sakurai, K., 5 19 2016, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016. Barolli, L., Enokido, T., Takizawa, M., Jara, A. J. & Bocchi, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 769-775 7 p. 7474167. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2016-May).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis of privacy disclosure in DNS query

    Zhao, F., Hori, Y. & Sakurai, K., 12 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    30 被引用数 (Scopus)
  • Analysis of methods for detecting compromised nodes and its countermeasures

    Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., 2013, IT Convergence and Security 2012. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

    Su, C., Wang, G. & Sakurai, K., 11 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)