• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • Conference contribution

    Ciphertext-auditable public key encryption

    Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Classification on attacks in wireless ad hoc networks: A game theoretic view

    Liao, X., Hao, D. & Sakurai, K., 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    13 被引用数 (Scopus)
  • Collaborative behavior visualization and its detection by observing darknet traffic

    Akimoto, S., Hori, Y. & Sakurai, K., 12 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings

    Dutta, S., Sardar, M. K., Adhikari, A., Ruj, S. & Sakurai, K., 2020, Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Kanhere, S., Patil, V. T., Sural, S. & Gaur, M. S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 198-217 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12553 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

    David, M. W. & Sakurai, K., 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

    Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., 4 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399. (Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    You, I., Sakurai, K. & Hori, Y., 12 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Nakamura, S., Hori, Y. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

    Syalim, A., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    34 被引用数 (Scopus)
  • Computational soundness of uniformity properties for multi-party computation based on LSSS

    Zhao, H. & Sakurai, K., 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

    Yasuda, T., Takagi, T. & Sakurai, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Xu, Y. & Sakurai, K., 5 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Cross-group secret sharing for secure cloud storage service

    Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., 1 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 11 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. Wu, C-K., Lin, D. & Yung, M. (eds.). Springer Verlag, p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

    Sakurai, K. & Zheng, Y., 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Asano, T., Igarashi, Y., Nagamochi, H., Miyano, S. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Customized program protection for a user customized data protection framework

    Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., 8 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Cyberbullying detection using parent-child relationship between comments

    Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., 11 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Indrawan-Santiago, M., Anderst-Kotsis, G., Steinbauer, M. & Khalil, I. (eds.). Association for Computing Machinery, p. 325-334 10 p. (ACM International Conference Proceeding Series).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Darknet monitoring on real-operated networks

    Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Deniable Secret Handshake Protocol - Revisited

    Panja, S., Dutta, S. & Sakurai, K., 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

    Nishioka, M., Satoh, H. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    15 被引用数 (Scopus)
  • Design and implementation of a forced encryption kernel module

    Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of an extended reference monitor for trusted operating systems

    Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. Springer Verlag, p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Design and implementation of document access control model based on role and security policy

    Mao, L., Yao, S., Zhang, K. & Sakurai, K., 11 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., 7 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Design and object-oriented implementation of an intelligence entity sharing pool

    Huang, R., Ma, J., Takahashi, K. & Sakurai, K., 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

    Sakai, Y. & Sakurai, K., 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    23 被引用数 (Scopus)
  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Komiya, R., Feng, Y. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Yamauchi, K., Hori, Y. & Sakurai, K., 1 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

    Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., 3 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 104-109 6 p. 7057865. (International Conference on Information Networking; vol. 2015-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Detection of android API call using logging mechanism within android framework

    Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Detection of illegal players in massively multiplayer online role playing game by classification algorithms

    Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., 4 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Takizawa, M., Barolli, L., Xhafa, F., Enokido, T. & Park, J. H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 406-413 8 p. 7097999. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2015-April).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Differential fault analysis of full lblock

    Zhao, L., Nishide, T. & Sakurai, K., 6 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • Distributed Paillier cryptosystem without trusted dealer

    Nishide, T. & Sakurai, K., 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    21 被引用数 (Scopus)
  • Distributing security-mediated PKI revisited

    Yang, J. P., Sakurai, K. & Rhee, K. H., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Economic-inspired truthful reputation feedback mechanism in P2P networks

    Wang, Y., Hori, Y. & Sakurai, K., 8 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

    Yu, S., Vargas, D. V. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

    Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient algorithms for the construction of hyperelliptic cryptosystems

    Okamoto, T. & Sakurai, K., 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 被引用数 (Scopus)
  • Efficient computing over GF(216) using graphics processing unit

    Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 10 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

    Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Koc, C. K., Naccache, D., Paar, C. & Paar, C. (eds.). Springer Verlag, p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    48 被引用数 (Scopus)
  • Efficient implementation of evaluating multivariate quadratic system with GPUs

    Tanaka, S., Nishide, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Efficient intrusion detection based on static analysis and stack walks

    Hua, J., Li, M., Sakurai, K. & Ren, Y., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 1 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

    Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Efficient shortest path routing algorithms for distributed XML processing

    Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., 1 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient threshold secret sharing schemes secure against rushing cheaters

    Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Efficient variant of rainbow without triangular matrix representation

    Yasuda, T., Takagi, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)