Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2023

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
会議への寄与

検索結果

  • 2007

    Enforcement of integrated security policy in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Forward secure privacy protection scheme for RFID system using advanced encryption standard

    Yeo, S. S., Sakurai, K., Cho, S. E., Yang, K. S. & Kim, S. K., 2007, Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops. ISPA 2007 International Workshops - SSDSN, UPWN, WISH, SGC, ParDMCom,HiPCoMB, and IST-AWSN, Proceedings. Springer Verlag, p. 245-254 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4743 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Induction and implementation of security requirements in each system block

    Kim, T. H., Sakurai, K. & Hwang, S. M., 12月 1 2007, Advances in Multimedia Modeling - 13th International Multimedia Modeling Conference, MMM 2007, Proceedings. PART 2 ed. p. 694-701 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4352 LNCS, no. PART 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Privacy-preserving two-party K-means clustering via secure approximation

    Su, C., Bao, F., Zhou, J., Takagi, T. & Sakurai, K., 10月 18 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. p. 385-391 7 p. 4221090. (Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07; vol. 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    21 被引用数 (Scopus)
  • Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network

    Wang, Y., Hori, Y. & Sakurai, K., 10月 29 2007, Theory and Applications of Models of Computation - 4th International Conference, TAMC 2007, Proceedings. p. 362-373 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4484 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Study on trust inference and emergence of economical small-world phenomena in P2P environment

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 502-514 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Two-party privacy-preserving agglomerative document clustering

    Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. Springer Verlag, p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Two-servers PIR based DNS query scheme with privacy-preserving

    Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    21 被引用数 (Scopus)
  • 2006

    Actively modifying control flow of program for efficient anormaly detection

    Tatara, K., Tabata, T. & Sakurai, K., 1月 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A framework for the user-oriented personal information protection

    Takahashi, K. & Sakurai, K., 12月 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • An intrusion detection system using alteration of data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 11月 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 243-248 6 p. 1620199. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • An RFID system based MCLT system with improved privacy

    Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    Open Access
    1 被引用数 (Scopus)
  • Application and evaluation of Bayesian filter for Chinese spam

    Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • A proactive secret sharing for server assisted threshold signatures

    Yang, J. P., Rhee, K. H. & Sakurai, K., 1月 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    10 被引用数 (Scopus)
  • A proposal of one-time biometric authentication

    Ueshige, Y. & Sakurai, K., 12月 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    13 被引用数 (Scopus)
  • Ciphertext-auditable public key encryption

    Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Design and implementation of an extended reference monitor for trusted operating systems

    Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. Springer Verlag, p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Distributing security-mediated PKI revisited

    Yang, J. P., Sakurai, K. & Rhee, K. H., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1月 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Enhanced privacy in key-exchange protocols by one-time ID

    Imamoto, K. & Sakurai, K., 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Grid based network address space browsing for network traffic visualization

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 1月 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Interactively combining 2D and 3D visualization for network traffic monitoring

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 12月 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    16 被引用数 (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1月 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    Open Access
    5 被引用数 (Scopus)
  • On studying P2P topology construction based on virtual regions and its effect on search performance

    Wang, Y., Wang, W., Sakurai, K. & Hori, Y., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., 12月 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; vol. 270).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., 12月 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; vol. 270).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • 2005

    A framework for protecting private information through user-trusted-program and its realizability

    Takahashi, K., Sakurai, K. & Amamiya, M., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • An evenhanded certified email system for contract signing

    Imamoto, K., Zhou, J. & Sakurai, K., 12月 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository

    Ueshige, Y. & Sakurai, K., 2005, Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005. Zhou, J., Kang, M-C., Bao, F. & Pang, H-H. (eds.). IOS Press BV, p. 155-168 14 p. (Frontiers in Artificial Intelligence and Applications; vol. 128).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Generic, optimistic, and efficient schemes for fair certified email delivery

    Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    Open Access
    2 被引用数 (Scopus)
  • Grouping proof for RFID tags

    Saito, J. & Sakurai, K., 12月 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    149 被引用数 (Scopus)
  • Group key distribution scheme for reducing required rekey message size

    Nishi, R. & Sakurai, K., 9月 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Program obfuscation scheme using random numbers to complicate control flow

    Toyofuku, T., Tabata, T. & Sakurai, K., 12月 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 916-925 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    12 被引用数 (Scopus)
  • Query forwarding algorithm supporting initiator anonymity in GNUnet

    Tatara, K., Hori, Y. & Sakurai, K., 9月 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). Vol. 2. p. 235-239 5 p.

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Reassignment scheme of an RFID tag's key for owner transfer

    Saito, J., Imamoto, K. & Sakurai, K., 12月 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 1303-1312 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    47 被引用数 (Scopus)
  • Simple power analysis on fast modular reduction with NIST recommended elliptic curves

    Sakai, Y. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    6 被引用数 (Scopus)
  • Some remarks on security of receipt-free E-auction

    Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. p. 560-563 4 p. 1489023. (Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005; vol. II).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Trends and issues for security of home-network based on power line communication

    Nishi, R., Morioka, H. & Sakurai, K., 12月 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • 2004

    A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

    Imamoto, K. & Sakurai, K., 7月 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    9 被引用数 (Scopus)
  • A merging method of certification authorities without using cross-certifications

    Koga, S. & Sakurai, K., 7月 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    9 被引用数 (Scopus)
  • Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

    David, M. W. & Sakurai, K., 2004, Proceedings - 2004 Iternational Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004. p. 497-498 2 p. (Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • 2003

    A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723. (Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    9 被引用数 (Scopus)
  • Certified e-mail systems using public notice board

    Imamoto, K. & Sakurai, K., 1月 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

    David, M. W. & Sakurai, K., 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

    Iwanaga, M., Tabata, T. & Sakurai, K., 12月 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

    Fukushima, K., Tabata, T. & Sakurai, K., 12月 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Mobile agent based security monitoring and analysis for the electric power infrastructure

    David, M. W. & Sakurai, K., 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • On the security of SELinux with a simplified policy

    Sueyasu, K., Tabata, T. & Sakurai, K., 12月 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)