• 2736 引用
  • 24 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
会議での発言
会議での発言

4 move perfect ZKIP of knowledge with no assumption

Saito, T., Kurosawa, K. & Sakurai, K., 1 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (版). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 739 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

A behavior-based detection method for outbreaks of low-rate attacks

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

A behavior based malware detection scheme for avoiding false positive

Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

研究成果: 著書/レポートタイプへの貢献会議での発言

20 引用 (Scopus)

A behavior-based method for detecting DNS amplification attacks

Cai, L., Feng, Y., Kawamoto, J. & Sakurai, K., 12 21 2016, Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016. Xhafa, F., Barolli, L. & Uchida, N. (版). Institute of Electrical and Electronics Engineers Inc., p. 608-613 6 p. 7794541. (Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

A behavior-based online engine for detecting distributed cyber-attacks

Feng, Y., Hori, Y. & Sakurai, K., 1 1 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley, S. (版). Springer Verlag, p. 79-89 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10144 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

A certified E-mail system with receiver’s selective usage of delivery authority

Imamoto, K. & Sakurai, K., 1 1 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Sarkar, P. & Menezes, A. (版). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2551).

研究成果: 著書/レポートタイプへの貢献会議での発言

21 引用 (Scopus)

Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

Liao, X., Hao, D. & Sakurai, K., 12 1 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

Acquisition of evidence of web storage in HTML5 web browsers from memory image

Matsumoto, S. & Sakurai, K., 1 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Active attack against oblivious RAM

Nakano, Y., Hidano, S., Kiyomoto, S. & Sakurai, K., 8 9 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018. Barolli, L., Enokido, T., Ogiela, M. R., Ogiela, L., Javaid, N. & Takizawa, M. (版). Institute of Electrical and Electronics Engineers Inc., p. 744-751 8 p. 8432314. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; 巻数 2018-May).

研究成果: 著書/レポートタイプへの貢献会議での発言

Actively modifying control flow of program for efficient anormaly detection

Tatara, K., Tabata, T. & Sakurai, K., 1 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4252 LNAI - II).

研究成果: 著書/レポートタイプへの貢献会議での発言

Adaptive and composable non-committing encryptions

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6168 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Adaptive and composable non-interactive string-commitment protocols

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

研究成果: 著書/レポートタイプへの貢献会議での発言

Adaptive and composable non-interactive string-commitment protocols

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; 巻数 222 CCIS).

研究成果: 著書/レポートタイプへの貢献会議での発言

A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

Imamoto, K. & Sakurai, K., 7 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (版). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); 巻数 1).

研究成果: 著書/レポートタイプへの貢献会議での発言

8 引用 (Scopus)

A design of history based traffic filtering with probabilistic packet marking against DoS attacks

Kiuchi, T., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

Feng, Y., Hori, Y. & Sakurai, K., 1 1 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings. Atiquzzaman, M., Yan, Z., Choo, K-K. R. & Wang, G. (版). Springer Verlag, p. 461-473 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10656 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

Hao, D. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

研究成果: 著書/レポートタイプへの貢献会議での発言

16 引用 (Scopus)

A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

Su, C. & Sakurai, K., 12 1 2008, Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings. p. 170-181 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5139 LNAI).

研究成果: 著書/レポートタイプへの貢献会議での発言

8 引用 (Scopus)

A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, 巻 2288. p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2288).

研究成果: 著書/レポートタイプへの貢献会議での発言

23 引用 (Scopus)

A framework for protecting private information through user-trusted-program and its realizability

Takahashi, K., Sakurai, K. & Amamiya, M., 12 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3823 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

A framework for the user-oriented personal information protection

Takahashi, K. & Sakurai, K., 12 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

Hao, D., Ren, Y. & Sakurai, K., 11 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6802 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

A generic evaluation method for key management schemes in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tamura, T., Sakurai, K. & Matsumoto, T., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (版). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1787).

研究成果: 著書/レポートタイプへの貢献会議での発言

A hidden cryptographic assumption in no-transferable indentification schemes

Sakurai, K., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1163).

研究成果: 著書/レポートタイプへの貢献会議での発言

Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

Sakai, Y. & Sakurai, K., 1 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (版). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2433).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

Gao, Y., Feng, Y., Kawamoto, J. & Sakurai, K., 12 12 2016, Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016. Institute of Electrical and Electronics Engineers Inc., p. 80-86 7 p. 7782062. (Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

A merging method of certification authorities without using cross-certifications

Koga, S. & Sakurai, K., 7 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (版). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

9 引用 (Scopus)

A method for embedding secret key information in RSA public key and its application

Kitahara, M., Nishide, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

Miyazaki, S. & Sakurai, K., 1 1 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (版). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1465).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723

研究成果: 著書/レポートタイプへの貢献会議での発言

9 引用 (Scopus)

An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

Wang, Y., Hori, Y. & Sakurai, K., 12 1 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4610 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

Su, C., Wang, G. & Sakurai, K., 11 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Analysis of methods for detecting compromised nodes and its countermeasures

Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., 2 26 2013, IT Convergence and Security 2012. 巻 215 LNEE. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; 巻数 215 LNEE).

研究成果: 著書/レポートタイプへの貢献会議での発言

Analysis of privacy disclosure in DNS query

Zhao, F., Hori, Y. & Sakurai, K., 12 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

研究成果: 著書/レポートタイプへの貢献会議での発言

22 引用 (Scopus)

Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

Ueshige, Y. & Sakurai, K., 5 19 2016, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016. Barolli, L., Enokido, T., Takizawa, M., Jara, A. J. & Bocchi, Y. (版). Institute of Electrical and Electronics Engineers Inc., p. 769-775 7 p. 7474167. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; 巻数 2016-May).

研究成果: 著書/レポートタイプへの貢献会議での発言

Analysis of variance of graph-clique mining for scalable proof of work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 1 1 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Yung, M., Huang, X. & Guo, F. (版). Springer Verlag, p. 101-114 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11449 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection

Tatara, K., Hori, Y. & Sakurai, K., 9 12 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 485-489 5 p. 4505774. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

An analysis of IT assessment security maturity in higher education institution

Suwito, M. H., Matsumoto, S., Kawamoto, J., Gollmann, D. & Sakurai, K., 1 1 2016, Information Science and Applications, ICISA 2016. Kim, K. J. & Joukov, N. (版). Springer Verlag, p. 701-713 13 p. (Lecture Notes in Electrical Engineering; 巻数 376).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

Zhao, H., Feng, Y., Koide, H. & Sakurai, K., 11 2019, Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 8958477. (Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019).

研究成果: 著書/レポートタイプへの貢献会議での発言

An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

Sakurai, K. & Miyazaki, S., 1 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (版). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1841).

研究成果: 著書/レポートタイプへの貢献会議での発言

45 引用 (Scopus)

An approach of program analysis prevention for information protection

Takahashi, K., Liu, Z. & Sakurai, K., 12 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

研究成果: 著書/レポートタイプへの貢献会議での発言

An approach of trusted program generation for user-responsible privacy

Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., 12 1 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4611 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

An efficient key generation method in audio zero-watermarking

Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., 12 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 8 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

An efficient robust secret sharing scheme with optimal cheater resiliency

Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., 1 1 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Schaumont, P., Chakraborty, R. S. & Matyas, V. (版). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8804).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

An evenhanded certified email system for contract signing

Imamoto, K., Zhou, J. & Sakurai, K., 12 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3783 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

A new design for evaluating moving target defense system

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 561-563 3 p. 8590965. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

A New Design for Evaluating Moving Target Defense System

Oo, W. K. K., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 561-563 3 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

A new scheme for distributed density estimation based privacy-preserving clustering

Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 8 14 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 112-119 8 p. 4529328. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)