• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • 2007

    Forward secure privacy protection scheme for RFID system using advanced encryption standard

    Yeo, S. S., Sakurai, K., Cho, S. E., Yang, K. S. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Springer Verlag, p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Induction and implementation of security requirements in each system block

    Kim, T. H., Sakurai, K. & Hwang, S. M., 12 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Privacy-preserving two-party K-means clustering via secure approximation

    Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 10 18 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 385-391 7 p. 4221090. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    18 被引用数 (Scopus)
  • Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 10 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Study on trust inference and emergence of economical small-world phenomena in P2P environment

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Two-party privacy-preserving agglomerative document clustering

    Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Two-servers PIR based DNS query scheme with privacy-preserving

    Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    21 被引用数 (Scopus)
  • 2008

    A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

    Su, C. & Sakurai, K., 12 1 2008, Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings. p. 170-181 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5139 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Analyzing maximum length of instruction sequence in network packets for polymorphic worm detection

    Tatara, K., Hori, Y. & Sakurai, K., 9 12 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 485-489 5 p. 4505774. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A new scheme for distributed density estimation based privacy-preserving clustering

    Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 8 14 2008, ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings. p. 112-119 8 p. 4529328. (ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

    Chou, B. H., Tatara, K., Sakuraba, T., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 421-426 6 p. 4511604. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Exploring security countermeasures along the attack sequence

    Sakuraba, T., Chou, B. H., Domyo, S. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 427-432 6 p. 4511605. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • FPGA-targeted hardware implementations of K2

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings. p. 270-277 8 p. (SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Granularity considering in a trust model for P2P networks

    Li, M., Ren, Y., Kouichi, S., Cui, Y. & Wang, Z., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 307-312 6 p. 4482931. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Invalidation of mailing list address to block spam mails

    Takahashi, K., Sakai, A. & Sakurai, K., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • K2 stream cipher

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; vol. 23 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Key distribution scheme using matched filter resistant against DoS attack

    Nishi, R., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Methodology for evaluating information security countermeasures of a system

    Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Monitoring unused IP addresses on segments managed by DHCP

    Mizoguchi, S., Hori, Y. & Sakurai, K., 12 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Security policy pre-evaluation towards risk analysis

    Yi, H., Hori, Y. & Sakurai, K., 9 15 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 415-420 6 p. 4511603. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Thoughts on multi-disciplinary inspired research on open network and information system

    Yufeng, W., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

    Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., 12 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Trust similarity measure in trust model for P2P networks

    Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., 12 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2. p. 107-112 6 p. 4755215

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • 2009

    A signature scheme associated with universal re-signcryption

    Tatara, K. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 780-785 6 p. 5066564. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    You, I., Sakurai, K. & Hori, Y., 12 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

    Syalim, A., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    33 被引用数 (Scopus)
  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., 7 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Design and object-oriented implementation of an intelligence entity sharing pool

    Huang, R., Ma, J., Takahashi, K. & Sakurai, K., 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient intrusion detection based on static analysis and stack walks

    Hua, J., Li, M., Sakurai, K. & Ren, Y., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Enhancing cooperative behavior for online reputation systems by group selection

    Ren, Y., Li, M., Cui, Y., Guo, C. & Sakurai, K., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 568-573 6 p. 5319136. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 12 1 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Formal verification for access control in web information sharing system

    Sakai, A., Hori, Y. & Sakurai, K., 11 9 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Grouping provenance information to improve efficiency of access Control

    Syalim, A., Hori, Y. & Sakurai, K., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Importance of data standardization in privacy-preserving k-means clustering

    Su, C., Zhan, J. & Sakurai, K., 2009, Database Systems for Advanced Applications - DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD. p. 276-286 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5667 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

    Han, Y., Sakai, A., Hori, Y. & Sakurai, K., 7 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. Park, J. H., Zhan, J., Lee, C., Wang, G., Kim, T. & Yeo, S-S. (eds.). p. 105-110 6 p. (Communications in Computer and Information Science; vol. 36).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Polymorphic worm detection by analyzing maximum length of instruction sequence in network packets

    Tatara, K., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 972-977 6 p. 5066596. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Reconsidering data logging in light of digital forensics

    Chou, B. H., Takahashi, K., Hori, Y. & Sakurai, K., 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. p. 111-118 8 p. (Communications in Computer and Information Science; vol. 36).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Secrecy capacity of wireless LAN

    Nishi, R., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 905-910 6 p. 5066585. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Security analysis for P2P routing protocols

    Fujii, T., Ren, Y., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 899-904 6 p. 5066584. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Ternary subset difference method and its quantitative analysis

    Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • The optimal choice by resource consumers in Grid market

    Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    A behavior based malware detection scheme for avoiding false positive

    Fukushima, Y., Sakai, A., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 79-84 6 p. 5634444. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • Adaptive and composable non-committing encryptions

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 135-144 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 354-361 8 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Kiuchi, T., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 261-264 4 p. 5598129. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Behavior control based on dynamic code translation

    Sakai, A., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 375-378 4 p. 5598037. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Darknet monitoring on real-operated networks

    Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Zhao, L., Ren, Y., Xiang, Y. & Sakurai, K., 2010, Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010. p. 434-441 8 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    52 被引用数 (Scopus)