• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • On studying P2P topology construction based on virtual regions and its effect on search performance

    Wang, Y., Wang, W., Sakurai, K. & Hori, Y., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

    Sakurai, K., 1 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On revenue driven server management incloud

    Zhao, L. & Sakurai, K., 8 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On-line versus off-line in money-making strategies with brokerage

    Dannoura, E. & Sakurai, K., 1 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

    Okeya, K. & Sakurai, K., 1 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    37 被引用数 (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 被引用数 (Scopus)
  • On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

    Sakurai, K. & Itoh, T., 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • New semantically secure public-key cryptosystems from the rsa-primitive

    Sakurai, K. & Takagi, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    15 被引用数 (Scopus)
  • Neural Cryptography Based on the Topology Evolving Neural Networks

    Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Neural cryptography based on the topology evolving neural networks

    Zhu, Y., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Multivariate signature scheme using quadratic forms

    Yasuda, T., Takagi, T. & Sakurai, K., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Multi-user keyword search scheme for secure data sharing with fine-grained access control

    Zhao, F., Nishide, T. & Sakurai, K., 8 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7259 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    50 被引用数 (Scopus)
  • Monitoring unused IP addresses on segments managed by DHCP

    Mizoguchi, S., Hori, Y. & Sakurai, K., 12 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Modeling and containment of search worms targeting web applications

    Hua, J. & Sakurai, K., 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Model-based intrusion detection by abstract interpretation

    Hua, J., Nishide, T. & Sakurai, K., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Mobile agent based security monitoring and analysis for the electric power infrastructure

    David, M. W. & Sakurai, K., 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Mixed-strategy game based trust management for clustered wireless sensor networks

    Hao, D., Adhikari, A. & Sakurai, K., 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Methodology for evaluating information security countermeasures of a system

    Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Making hash functions from block ciphers secure and efficient by using convolutional codes

    Inoue, T. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 6 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    89 被引用数 (Scopus)
  • Lightweight classification of IoT malware based on image recognition

    Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. p. 664-669 6 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Key distribution scheme using matched filter resistant against DoS attack

    Nishi, R., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • K2 stream cipher

    Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; vol. 23 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Invalidation of mailing list address to block spam mails

    Takahashi, K., Sakai, A. & Sakurai, K., 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Interactively combining 2D and 3D visualization for network traffic monitoring

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    16 被引用数 (Scopus)
  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Gao, P., Nishide, T., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Information hiding of two-dimensional code by multi-layer optical

    Teraura, N. & Sakurai, K., 10 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Information hiding in subcells of a two-dimensional code

    Teraura, N. & Sakurai, K., 12 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Induction and implementation of security requirements in each system block

    Kim, T. H., Sakurai, K. & Hwang, S. M., 12 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding

    Wang, T., Feng, Y. & Sakurai, K., 1 4 2021, Proceedings of the 2021 15th International Conference on Ubiquitous Information Management and Communication, IMCOM 2021. Lee, S., Choo, H. & Ismail, R. (eds.). Institute of Electrical and Electronics Engineers Inc., 9377395. (Proceedings of the 2021 15th International Conference on Ubiquitous Information Management and Communication, IMCOM 2021).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

    Han, Y., Sakai, A., Hori, Y. & Sakurai, K., 7 13 2009, Advances in Information Security and Its Application: Third International Conference, ISA 2009, Proceedings. Park, J. H., Zhan, J., Lee, C., Wang, G., Kim, T. & Yeo, S-S. (eds.). p. 105-110 6 p. (Communications in Computer and Information Science; vol. 36).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Improving the accuracy of signature authentication using the eight principles of yong

    Nishigori, T., Kawamoto, J. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 32. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Improving linear cryptanalysis of LOKI91 by probabilistic counting method

    Sakurai, K. & Furuya, S., 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 被引用数 (Scopus)
  • Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

    Zhao, L. & Sakurai, K., 1 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Improvement on secrecy capacity of wireless LAN using matched filter

    Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., 12 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Improved proxy re-encryption scheme for symmetric key cryptography

    Syalim, A., Nishide, T. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Importance of data standardization in privacy-preserving k-means clustering

    Su, C., Zhan, J. & Sakurai, K., 2009, Database Systems for Advanced Applications - DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD. p. 276-286 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5667 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

    Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Takizawa, M., Enokido, T., Barolli, L. & Xhafa, F. (eds.). Springer Verlag, p. 458-469 12 p. (Advances in Intelligent Systems and Computing; vol. 926).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Implementation of efficient operations over GF(232) using graphics processing units

    Tanaka, S., Yasuda, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Image splicing verification based on pixel-based alignment method

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 9 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Zhao, L., Xiao, D. & Sakurai, K., 7 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Identity-embedding method for decentralized public-key infrastructure

    Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

    Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • How to utilize the transformability of digital signatures for solving the oracle problem

    Mambo, M., Sakurai, K. & Okamoto, E., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • How to sign multiple versions of digital documents

    Syalim, A. & Sakurai, K., 1 29 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • How intractable is the discrete logarithm for a general finite group?

    Okamoto, T., Sakurai, K. & Shizuya, H., 1 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Host independent and distributed detection system of the network attack by using OpenFlow

    Miyazaki, R., Kawamoto, J., Matsumoto, S. & Sakurai, K., 4 13 2017, 31st International Conference on Information Networking, ICOIN 2017. IEEE Computer Society, p. 236-241 6 p. 7899511. (International Conference on Information Networking).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution