• 2737 引用
  • 24 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
会議での発言
会議での発言

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Enforcement of integrated security policy in trusted operating systems

Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 12 1 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4752 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

English vs. sealed bid in anonymous electronic auction protocols

Hirakiuchi, D. & Sakurait, K., 1 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; 巻数 2001-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

Enhanced privacy in key-exchange protocols by one-time ID

Imamoto, K. & Sakurai, K., 12 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; 巻数 2006).

研究成果: 著書/レポートタイプへの貢献会議での発言

Enhancing cooperative behavior for online reputation systems by group selection

Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

研究成果: 著書/レポートタイプへの貢献会議での発言

Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

Iwanaga, M., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (版). p. 214-219 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Evaluation of gamma ray durability of RF tag and application to the radiation environment

Teraura, N., Ito, K., Kobayashi, D. & Sakurai, K., 1 12 2016, 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015. Institute of Electrical and Electronics Engineers Inc., p. 147-152 6 p. 7379809. (2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015).

研究成果: 著書/レポートタイプへの貢献会議での発言

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

Ishizuka, H., Sakurai, K., Echizen, I. & Iwamura, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 457-462 6 p. 7424757. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

Fukushima, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (版). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

Tanaka, S., Cheng, C. M. & Sakurai, K., 1 1 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (版). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; 巻数 139).

研究成果: 著書/レポートタイプへの貢献会議での発言

Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

Teraura, N. & Sakurai, K., 12 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Evasion attacks against statistical code obfuscation detectors

Su, J., Vargas, D. V. & Sakurai, K., 1 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (版). Springer Verlag, p. 121-137 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10418 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Exploring security countermeasures along the attack sequence

Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Expressive rating scheme by signatures with predications on ratees

Anada, H., Ruj, S. & Sakurai, K., 1 1 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Springer Verlag, 巻 9955 LNCS. p. 363-379 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9955 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

40 引用 (Scopus)

Feature selection for machine learning-based early detection of distributed cyber attacks

Feng, Y., Akiyama, H., Lu, L. & Sakurai, K., 10 26 2018, Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018. Institute of Electrical and Electronics Engineers Inc., p. 181-186 6 p. 8511883. (Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Fine-grained conditional proxy re-encryption and application

Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., 1 1 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Hui, L. C. K., Yiu, S. M. & Liu, J. K. (版). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8782).

研究成果: 著書/レポートタイプへの貢献会議での発言

11 引用 (Scopus)

Flow traffic classification with support vector machine by using payload length

Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 12 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Formal verification for access control in web information sharing system

Sakai, A., Hori, Y. & Sakurai, K., 11 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5576 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Forward secure privacy protection scheme for RFID system using advanced encryption standard

Yeo, S. S., Sakurai, K., Cho, S., Yang, K. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. 巻 4743 LNCS. p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4743 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

FPGA-targeted hardware implementations of K2

Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Frame difference generative adversarial networks: Clearer contour video generating

Qiu, R., Vargas, D. V. & Sakurai, K., 11 2019, Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019. Institute of Electrical and Electronics Engineers Inc., p. 169-175 7 p. 8951676. (Proceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019).

研究成果: 著書/レポートタイプへの貢献会議での発言

General fault attacks on multivariate public key cryptosystems

Hashimoto, Y., Takagi, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7071 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

Generic, optimistic, and efficient schemes for fair certified email delivery

Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. 巻 3783 LNCS. p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3783 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Granularity considering in a trust model for P2P networks

Li, M., Ren, Y., Sakurai, K., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Grid based network address space browsing for network traffic visualization

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 1 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; 巻数 2006).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Grouping proof for RFID tags

Saito, J. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

143 引用 (Scopus)

Grouping provenance information to improve efficiency of access Control

Syalim, A., Hori, Y. & Sakurai, K., 11 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5576 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

10 引用 (Scopus)

Group key distribution scheme for reducing required rekey message size

Nishi, R. & Sakurai, K., 9 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (版). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

Hardware trojan cyber-physical threats to supply chains

Sauer, K., David, M. & Sakurai, K., 1 1 2018, Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018. Hurley, J. S. & Chen, J. Q. (版). Academic Conferences and Publishing International Limited, p. 448-455 8 p. (Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018; 巻数 2018-March).

研究成果: 著書/レポートタイプへの貢献会議での発言

Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness

Roy, P. S., Dutta, S., Morozov, K., Adhikari, A., Fukushima, K., Kiyomoto, S. & Sakurai, K., 1 1 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (版). Springer Verlag, p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11125 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Host independent and distributed detection system of the network attack by using OpenFlow

Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., 4 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

研究成果: 著書/レポートタイプへの貢献会議での発言

How intractable is the discrete logarithm for a general finite group?

Okamoto, T., Sakurai, K. & Shizuya, H., 1 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (版). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 658 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

How to sign multiple versions of digital documents

Syalim, A. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; 巻数 2018-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

How to utilize the transformability of digital signatures for solving the oracle problem

Mambo, M., Sakurai, K. & Okamoto, E., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (版). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1163).

研究成果: 著書/レポートタイプへの貢献会議での発言

9 引用 (Scopus)

Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., 1 1 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (版). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9357).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Identity-embedding method for decentralized public-key infrastructure

Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., 1 1 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (版). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9473).

研究成果: 著書/レポートタイプへの貢献会議での発言

Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

Zhao, L., Xiao, D. & Sakurai, K., 7 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Image splicing verification based on pixel-based alignment method

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 9 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7809 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Implementation and evaluation of bot detection scheme based on data transmission intervals

Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Implementation of efficient operations over GF(232) using graphics processing units

Tanaka, S., Yasuda, T. & Sakurai, K., 1 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8407 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 1 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (版). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; 巻数 926).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Importance of data standardization in privacy-preserving k-means clustering

Su, C., Zhan, J. & Sakurai, K., 9 28 2009, Database Systems for Advanced Applications - DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD. p. 276-286 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5667 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Improved proxy re-encryption scheme for symmetric key cryptography

Syalim, A., Nishide, T. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; 巻数 2018-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Improvement on secrecy capacity of wireless LAN using matched filter

Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., 12 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

Zhao, L. & Sakurai, K., 1 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; 巻数 367 CCIS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Improving linear cryptanalysis of LOKI91 by probabilistic counting method

Sakurai, K. & Furuya, S., 1 1 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (版). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1267).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Improving the accuracy of signature authentication using the eight principles of yong

Nishigori, T., Kawamoto, J. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

Han, Y., Sakai, A., Hori, Y. & Sakurai, K., 7 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. Park, J. H., Zhan, J., Lee, C., Wang, G., Kim, T. & Yeo, S-S. (版). p. 105-110 6 p. (Communications in Computer and Information Science; 巻数 36).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Induction and implementation of security requirements in each system block

Kim, T. H., Sakurai, K. & Hwang, S. M., 12 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 版 p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4352 LNCS, 番号 PART 2).

研究成果: 著書/レポートタイプへの貢献会議での発言