• 2706 引用
  • 23 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
会議での発言

Supporting secure provenance update by keeping "provenance" of the provenance

Syalim, A., Nishide, T. & Sakurai, K., 3 25 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7804 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Suppressing chain size of blockchain-based information sharing for swarm robotic systems

Nishida, Y., Kaneko, K., Sharma, S. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 524-528 5 p. 8590956. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Survey and new idea for attribute-based identification scheme secure against reset attacks

Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., 1 1 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (版). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

Ternary subset difference method and its quantitative analysis

Fukushima, K., Kiyomoto, S., Tanaka, T. & Sakurai, K., 11 9 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5379 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

The development of radiation-resistant rf TAGS for use at nuclear power plants

Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., 1 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; 巻数 1).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

The optimal choice by resource consumers in Grid market

Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

研究成果: 著書/レポートタイプへの貢献会議での発言

Thoughts on multi-disciplinary inspired research on open network and information system

Yufeng, W., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

研究成果: 著書/レポートタイプへの貢献会議での発言

Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Springer Verlag, 巻 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1560).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Towards countermeasure of insider threat in network security

Hori, Y., Nishide, T. & Sakurai, K., 12 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Towards optimal revocation and tracing schemes - The power of the ternary tree

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 9 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Towards "receipt-freeness" in remote biometric authentication

Ueshige, Y. & Sakurai, K., 12 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Traceback framework against botmaster by sharing network communication pattern information

Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Trends and issues for security of home-network based on power line communication

Nishi, R., Morioka, H. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. 巻 2. p. 655-660 6 p. 1423770

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., 12 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

Trust similarity measure in trust model for P2P networks

Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., 12 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. 巻 2. p. 107-112 6 p. 4755215

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

Two-party privacy-preserving agglomerative document clustering

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 12 20 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4464 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Two-servers PIR based DNS query scheme with privacy-preserving

Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

研究成果: 著書/レポートタイプへの貢献会議での発言

13 引用 (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; 巻数 222 CCIS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., 6 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

研究成果: 著書/レポートタイプへの貢献会議での発言

Upper bound of the length of information embedd in RSA public key efficiently

Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., 5 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Weakness of provably secure searchable encryption against frequency analysis

Suga, T., Nishide, T. & Sakurai, K., 12 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Yet another note on block withholding attack on bitcoin mining pools

Bag, S. & Sakurai, K., 1 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (版). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9866 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)