• 2648 引用
  • 23 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
会議での発言
会議での発言

Preserving integrity and confidentiality of a directed acyclic graph model of provenance

Syalim, A., Nishide, T. & Sakurai, K., 10 29 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 311-318 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6166 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

12 引用 (Scopus)

Preventing the access of fraudulent WEB sites by using a special two-dimensional code

Teraura, N. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 645-650 6 p. 6296930. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Privacy-aware cloud-based input method editor

Kawamoto, J. & Sakurai, K., 1 12 2015, 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014. Institute of Electrical and Electronics Engineers Inc., p. 209-213 5 p. 7008273. (2014 IEEE/CIC International Conference on Communications in China, ICCC 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

Privacy-preserving two-party K-means clustering via secure approximation

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 10 18 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 385-391 7 p. 4221090. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

16 引用 (Scopus)

Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

Fukushima, Y., Hori, Y. & Sakurai, K., 12 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 352-361 10 p. 6120839. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

Program obfuscation scheme using random numbers to complicate control flow

Toyofuku, T., Tabata, T. & Sakurai, K., 12 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 916-925 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3823 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

10 引用 (Scopus)

Proof of disease: A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

Talukder, A. K., Chaitanya, M., Arnold, D. & Sakurai, K., 12 4 2018, Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018. Loulergue, F., Wang, G., Bhuiyan, M. Z. A., Ma, X., Li, P., Roveri, M., Han, Q. & Chen, L. (版). Institute of Electrical and Electronics Engineers Inc., p. 257-262 6 p. 8560057. (Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Proposal and evaluation of a security incident response training method using programming

Nagai, K., Koide, H. & Sakurai, K., 9 26 2019, SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, 1 p. (SIGITE 2019 - Proceedings of the 20th Annual Conference on Information Technology Education).

研究成果: 著書/レポートタイプへの貢献会議での発言

公開

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

Teraura, N. & Sakurai, K., 9 14 2015, 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Institute of Electrical and Electronics Engineers Inc., 7266514

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Proposal of the hierarchical file server groups for implementing mandatory access control

Sakuraba, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 639-644 6 p. 6296929. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

David, M. W. & Sakurai, K., 6 28 2004, Proceedings - 2004 Iternational Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004. p. 497-498 2 p. (Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004).

研究成果: 著書/レポートタイプへの貢献会議での発言

Protection of data and delegated keys in digital distribution

Mambo, M., Okamoto, E. & Sakurai, K., 1 1 1997, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Pieprzyk, J., Varadharajan, V. & Mu, Y. (版). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1270).

研究成果: 著書/レポートタイプへの貢献会議での発言

Query forwarding algorithm supporting initiator anonymity in GNUnet

Tatara, K., Hori, Y. & Sakurai, K., 9 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (版). 巻 2. p. 235-239 5 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

Zhao, F., Nishide, T. & Sakurai, K., 5 26 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6672 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

53 引用 (Scopus)

Realizing proxy re-encryption in the symmetric world

Syalim, A., Nishide, T. & Sakurai, K., 12 12 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 版 p. 259-274 16 p. (Communications in Computer and Information Science; 巻数 251 CCIS, 番号 PART 1).

研究成果: 著書/レポートタイプへの貢献会議での発言

18 引用 (Scopus)

Reassignment scheme of an RFID tag's key for owner transfer

Saito, J., Imamoto, K. & Sakurai, K., 12 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 1303-1312 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3823 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

41 引用 (Scopus)

Reconsidering data logging in light of digital forensics

Chou, B. H., Takahashi, K., Hori, Y. & Sakurai, K., 7 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. p. 111-118 8 p. (Communications in Computer and Information Science; 巻数 36).

研究成果: 著書/レポートタイプへの貢献会議での発言

Reconstructing and visualizing evidence of artifact from firefox sessionstorage

Matsumoto, S., Onitsuka, Y., Kawamoto, J. & Sakurai, K., 1 1 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (版). Springer Verlag, p. 83-94 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8909).

研究成果: 著書/レポートタイプへの貢献会議での発言

Reducing the key size of rainbow using non-commutative rings

Yasuda, T., Sakurai, K. & Takagi, T., 3 8 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. p. 68-83 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7178 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

10 引用 (Scopus)

Reliable decentralized oracle with mechanisms for verification and disputation

Ma, L., Kaneko, K., Sharma, S. & Sakurai, K., 11 2019, Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019. Institute of Electrical and Electronics Engineers Inc., p. 346-352 7 p. 8951647. (Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019).

研究成果: 著書/レポートタイプへの貢献会議での発言

Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols

Di Crescenzo, G., Sakurai, K. & Yung, M., 12 1 1998, STACS 98 - 15th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings. p. 511-521 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1373 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Retricoin: Bitcoin based on compact proofs of retrievability

Sengupta, B., Bag, S., Sakurai, K. & Ruj, S., 1 4 2016, Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016. Association for Computing Machinery, a14. (ACM International Conference Proceeding Series; 巻数 04-07-January-2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

10 引用 (Scopus)

Revocation and tracing based on ternary tree: Towards optimal broadcast encryption scheme

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 12 1 2012, E-Business and Telecommunications: International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers. Sevillano, J. L. & Filipe, J. (版). p. 233-248 16 p. (Communications in Computer and Information Science; 巻数 314).

研究成果: 著書/レポートタイプへの貢献会議での発言

Risks with raw-key masking – The security evaluation of 2-key XCBC

Furuya, S. & Sakurai, K., 1 1 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (版). Springer Verlag, p. 327-341 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2513).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Secrecy capacity of wireless LAN

Nishi, R., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 905-910 6 p. 5066585. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Secret Sharing on Evolving Multi-level Access Structure

Dutta, S., Roy, P. S., Fukushima, K., Kiyomoto, S. & Sakurai, K., 1 1 2020, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (版). Springer, p. 180-191 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11897 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

Pramanik, J., Roy, P. S., Dutta, S., Adhikari, A. & Sakurai, K., 1 1 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Ganapathy, V., Shyamasundar, R. K. & Jaeger, T. (版). Springer Verlag, p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11281 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Secure and light weight fine-grained access mechanism for outsourced data

Jahan, M., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., 9 7 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017. Institute of Electrical and Electronics Engineers Inc., p. 201-209 9 p. 8029441. (Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

Ruj, S. & Sakurai, K., 1 1 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 402-407 6 p. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Secure hyperelliptic cryptosystems and their performance

Sakai, Y., Sakurai, K. & Ishizuka, H., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (版). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1431).

研究成果: 著書/レポートタイプへの貢献会議での発言

20 引用 (Scopus)

Secure keyword search using bloom filter with specified character positions

Suga, T., Nishide, T. & Sakurai, K., 9 14 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings. p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7496 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

17 引用 (Scopus)

Securing location-aware services based on online/offline signatures in VANETs

Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., 9 7 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6908 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Securing sensor networks by moderating frequencies

Sarkar, P., Mahish, P., Chowdhury, M. U. & Sakurai, K., 1 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (版). Springer Verlag, p. 173-185 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; 巻数 153).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Security analysis for P2P routing protocols

Fujii, T., Ren, Y., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 899-904 6 p. 5066584. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; 巻数 270).

研究成果: 著書/レポートタイプへの貢献会議での発言

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; 巻数 270).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Security and trust issues on digital supply chain

Zhang, H., Nakamura, T. & Sakurai, K., 8 2019, Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019. Institute of Electrical and Electronics Engineers Inc., p. 338-343 6 p. 8890486. (Proceedings - IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019).

研究成果: 著書/レポートタイプへの貢献会議での発言

Security issues for contactless smart cards

David, M. W. & Sakurai, K., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (版). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1431).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Security model and analysis of fhmqv, Revisited

Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., 1 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (版). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8567).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

Nishide, T. & Sakurai, K., 12 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Security policy pre-evaluation towards risk analysis

Yi, H., Hori, Y. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 415-420 6 p. 4511603. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

Simple power analysis on fast modular reduction with NIST recommended elliptic curves

Sakai, Y. & Sakurai, K., 12 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3783 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Simulation of Secure Volunteer Computing by Using Blockchain

Shota, J., Kosuke, K., Sharma, S. & Kouichi, S., 1 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Enokido, T., Xhafa, F., Barolli, L. & Takizawa, M. (版). Springer Verlag, p. 883-894 12 p. (Advances in Intelligent Systems and Computing; 巻数 926).

研究成果: 著書/レポートタイプへの貢献会議での発言

Some remarks on security of receipt-free E-auction

Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. 巻 II. p. 560-563 4 p. 1489023

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

SQL injection attack detection method using expectation criterion

Xiao, L., Matsumoto, S., Ishikawa, T. & Sakurai, K., 1 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 649-654 6 p. 7818686. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

Wang, Y., Hori, Y. & Sakurai, K., 10 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4484 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Study of log file dispersion management method

Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Study on trust inference and emergence of economical small-world phenomena in P2P environment

Wang, Y., Hori, Y. & Sakurai, K., 12 1 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4819 LNAI).

研究成果: 著書/レポートタイプへの貢献会議での発言

Subliminal channels for signature transfer and their application to signature distribution schemes

Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (版). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 718 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)