• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723. (Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

    Miyazaki, S. & Sakurai, K., 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A method for embedding secret key information in RSA public key and its application

    Kitahara, M., Nishide, T. & Sakurai, K., 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A merging method of certification authorities without using cross-certifications

    Koga, S. & Sakurai, K., 7 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

    Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., 12 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    12 被引用数 (Scopus)
  • Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

    Sakai, Y. & Sakurai, K., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • A hidden cryptographic assumption in no-transferable indentification schemes

    Sakurai, K., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

    Tamura, T., Sakurai, K. & Matsumoto, T., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A generic evaluation method for key management schemes in wireless sensor network

    Na, R., Ren, Y., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

    Hao, D., Ren, Y. & Sakurai, K., 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A framework for the user-oriented personal information protection

    Takahashi, K. & Sakurai, K., 12 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A framework for protecting private information through user-trusted-program and its realizability

    Takahashi, K., Sakurai, K. & Amamiya, M., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

    Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    26 被引用数 (Scopus)
  • A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

    Su, C. & Sakurai, K., 12 1 2008, Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings. p. 170-181 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5139 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • A Distributed Ledger Management Mechanism for Storing and Selling Private Data

    Dutta, S., Paul, A., Ozaki, R. H., Ranzan, C. P. & Sakurai, K., 1 30 2021, 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. Institute of Electrical and Electronics Engineers Inc., 9346258. (2021 IEEE Conference on Dependable and Secure Computing, DSC 2021).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

    Hao, D. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)
  • A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

    Feng, Y., Hori, Y. & Sakurai, K., 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (eds.). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10656 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Kiuchi, T., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

    Imamoto, K. & Sakurai, K., 7 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Adaptive and composable non-committing encryptions

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Actively modifying control flow of program for efficient anormaly detection

    Tatara, K., Tabata, T. & Sakurai, K., 1 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Active attack against oblivious RAM

    Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., 8 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2018-May).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Acquisition of evidence of web storage in HTML5 web browsers from memory image

    Matsumoto, S. & Sakurai, K., 1 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

    Liao, X., Hao, D. & Sakurai, K., 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A certified E-mail system with receiver’s selective usage of delivery authority

    Imamoto, K. & Sakurai, K., 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Menezes, A. & Sarkar, P. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties

    Chaudhury, S. S., Dutta, S. & Sakurai, K., 2020, Network and System Security - 14th International Conference, NSS 2020, Proceedings. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 292-308 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A behavior-based online engine for detecting distributed cyber-attacks

    Feng, Y., Hori, Y. & Sakurai, K., 1 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (eds.). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A behavior-based method for detecting DNS amplification attacks

    Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., 12 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • A behavior based malware detection scheme for avoiding false positive

    Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    24 被引用数 (Scopus)
  • A behavior-based detection method for outbreaks of low-rate attacks

    Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • 4 move perfect ZKIP of knowledge with no assumption

    Saito, T., Kurosawa, K. & Sakurai, K., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • 3-party adversarial steganography

    Meraouche, I., Dutta, S. & Sakurai, K., 2020, Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers. You, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 89-100 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12583 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution