Pureに変更を加えた場合、すぐここに表示されます。

研究成果 1991 2020

フィルター
会議での発言
会議での発言
2 引用 (Scopus)

The development of radiation-resistant rf TAGS for use at nuclear power plants

Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., 1 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; 巻数 1).

研究成果: 著書/レポートタイプへの貢献会議での発言

Nuclear power plants
Radiation
Radiation damage
Radio frequency identification (RFID)
Dosimetry

The optimal choice by resource consumers in Grid market

Zhao, L., Li, M., Sun, W., Sakurai, K. & Ren, Y., 12 1 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 580-585 6 p. 5319124. (UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences).

研究成果: 著書/レポートタイプへの貢献会議での発言

Scheduling algorithms
Economics
Costs
Experiments

Thoughts on multi-disciplinary inspired research on open network and information system

Yufeng, W., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 241-246 6 p. 4482920. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

研究成果: 著書/レポートタイプへの貢献会議での発言

Information systems
Economics
Telecommunication networks
Macros
1 引用 (Scopus)

Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Springer Verlag, 巻 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1560).

研究成果: 著書/レポートタイプへの貢献会議での発言

Threshold Cryptography
Cryptography
Communication
Law Enforcement
Key Distribution
2 引用 (Scopus)

Towards countermeasure of insider threat in network security

Hori, Y., Nishide, T. & Sakurai, K., 12 1 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882

研究成果: 著書/レポートタイプへの貢献会議での発言

Network security
Access control
1 引用 (Scopus)

Towards optimal revocation and tracing schemes - The power of the ternary tree

Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 9 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Revocation
Tracing
Ternary
Labels
Broadcasting
2 引用 (Scopus)

Towards "receipt-freeness" in remote biometric authentication

Ueshige, Y. & Sakurai, K., 12 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

Biometrics
Authentication
Network protocols
Servers
7 引用 (Scopus)

Traceback framework against botmaster by sharing network communication pattern information

Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

Telecommunication networks
Servers
Communication
Monitoring
Botnet
1 引用 (Scopus)

Tracing MIRAI malware in networked system

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 534-538 5 p. 8590958. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Internet of Things
Malware
Tracing
Attack
Denial of Service

Tracing MIRAI Malware in Networked System

Xu, Y., Koide, H., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 534-538 5 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Trends and issues for security of home-network based on power line communication

Nishi, R., Morioka, H. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. 巻 2. p. 655-660 6 p. 1423770

研究成果: 著書/レポートタイプへの貢献会議での発言

Home networks
Local area networks
Communication

Trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6

Qiu, Y., Zhou, J., Sakurai, K. & Bao, F., 12 1 2008, Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008. p. 55-63 9 p. 4683082. (Proceedings - 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

Anchors
Authentication
6 引用 (Scopus)

Trust similarity measure in trust model for P2P networks

Ren, Y., Li, M., Guo, C., Cui, Y. & Sakurai, K., 12 1 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. 巻 2. p. 107-112 6 p. 4755215

研究成果: 著書/レポートタイプへの貢献会議での発言

reputation
5 引用 (Scopus)

Two-party privacy-preserving agglomerative document clustering

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 12 20 2007, Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings. p. 193-208 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4464 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Document Clustering
Privacy Preserving
Cryptography
Data mining
Hypertext
13 引用 (Scopus)

Two-servers PIR based DNS query scheme with privacy-preserving

Zhao, F., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 299-302 4 p. 4438444

研究成果: 著書/レポートタイプへの貢献会議での発言

Information retrieval
Erosion
Servers
2 引用 (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 12 1 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
1 引用 (Scopus)

Universally composable non-committing encryptions in the presence of adaptive adversaries

Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 274-288 15 p. (Communications in Computer and Information Science; 巻数 222 CCIS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Encryption
Cryptography
Security Model
Diffie-Hellman
Framework

Universal Rules for Fooling Deep Neural Networks based Text Classification

Li, D., Vargas, D. V. & Kouichi, S., 6 2019, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2221-2228 8 p. 8790213. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

研究成果: 著書/レポートタイプへの貢献会議での発言

Text Classification
Neural Networks
Gradient methods
Information use
Attack
3 引用 (Scopus)

Upper bound of the length of information embedd in RSA public key efficiently

Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., 5 27 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
1 引用 (Scopus)

Weakness of provably secure searchable encryption against frequency analysis

Suga, T., Nishide, T. & Sakurai, K., 12 1 2012, Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012. p. 142-147 6 p. 6516798. (Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
7 引用 (Scopus)

Yet another note on block withholding attack on bitcoin mining pools

Bag, S. & Sakurai, K., 1 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (版). Springer Verlag, p. 167-180 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9866 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Reward
Mining
Miners
Attack
Incentives