• 2737 引用
  • 24 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
記事
2020

Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R. & Sakurai, K., 1 1 2020, : : Electronics (Switzerland). 9, 1, 144.

研究成果: ジャーナルへの寄稿記事

公開
2019
公開
3 引用 (Scopus)

Light weight and fine-grained access mechanism for secure access to outsourced data*

Jahan, M., Seneviratne, S., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., 12 10 2019, : : Concurrency Computation. 31, 23, e4736.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)

One Pixel Attack for Fooling Deep Neural Networks

Su, J., Vargas, D. V. & Sakurai, K., 10 2019, : : IEEE Transactions on Evolutionary Computation. 23, 5, p. 828-841 14 p., 8601309.

研究成果: ジャーナルへの寄稿記事

74 引用 (Scopus)

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust

Anada, H., Yasuda, T., Kawamoto, J., Weng, J. & Sakurai, K., 4 1 2019, : : Journal of Information Security and Applications. 45, p. 10-19 10 p.

研究成果: ジャーナルへの寄稿記事

2018

Light Weight Write Mechanism for Cloud Data

Jahan, M., Rezvani, M., Zhao, Q., Roy, P. S., Sakurai, K., Seneviratne, A. & Jha, S., 5 1 2018, : : IEEE Transactions on Parallel and Distributed Systems. 29, 5, p. 1131-1146 16 p.

研究成果: ジャーナルへの寄稿記事

2 引用 (Scopus)
6 引用 (Scopus)

Bitcoin Block Withholding Attack: Analysis and Mitigation

Bag, S., Ruj, S. & Sakurai, K., 8 2017, : : IEEE Transactions on Information Forensics and Security. 12, 8, p. 1967-1978 12 p., 7728010.

研究成果: ジャーナルへの寄稿記事

40 引用 (Scopus)

Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions

Anada, H., Kawamoto, J., Ke, C., Morozov, K. & Sakurai, K., 10 1 2017, : : Journal of Supercomputing. 73, 10, p. 4275-4301 27 p.

研究成果: ジャーナルへの寄稿記事

Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors

Sarkar, P., Chowdhury, M. U. & Sakurai, K., 12 10 2017, : : Concurrency Computation. 29, 23, e4017.

研究成果: ジャーナルへの寄稿記事

2 引用 (Scopus)
2016
16 引用 (Scopus)

Character-based symmetric searchable encryption and its implementation and experiment on mobile devices

Suga, T., Nishide, T. & Sakurai, K., 8 1 2016, : : Security and Communication Networks. 9, 12, p. 1717-1725 9 p.

研究成果: ジャーナルへの寄稿記事

2015

A multivariate quadratic challenge toward post-quantum generation cryptography

Yasuda, T., Dahan, X., Huang, Y. J., Takagi, T. & Sakurai, K., 9 1 2015, : : ACM Communications in Computer Algebra. 49, 3, p. 105-107 3 p.

研究成果: ジャーナルへの寄稿記事

A note on the security of KHL scheme

Weng, J., Zhao, Y., Deng, R. H., Liu, S., Yang, Y. & Sakurai, K., 10 18 2015, : : Theoretical Computer Science. 602, p. 1-6 6 p.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)

Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"

Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., Keshavarz, H., Chaudhry, S. A. & Khan, M. K., 11 1 2015, : : PloS one. 10, 11, 0142716.

研究成果: ジャーナルへの寄稿記事

12 引用 (Scopus)

Plaintext checkable encryption with designated checker

Das, A., Adhikari, A. & Sakurai, K., 1 1 2015, : : Advances in Mathematics of Communications. 9, 1, p. 37-53 17 p.

研究成果: ジャーナルへの寄稿記事

3 引用 (Scopus)

Provably secure anonymous authentication scheme for roaming service in global mobility networks

Wu, K. Y., Tsai, K. Y., Wu, T. C. & Sakurai, K., 3 1 2015, : : Journal of Information Science and Engineering. 31, 2, p. 727-742 16 p.

研究成果: ジャーナルへの寄稿記事

5 引用 (Scopus)
2014

A competitive three-level pruning technique for information security

Chowdhury, M., Abawajy, J., Kelarev, A. & Sakurai, K., 1 1 2014, : : Communications in Computer and Information Science. 490, p. 25-32 8 p.

研究成果: ジャーナルへの寄稿記事

An enhanced audio ownership protection scheme based on visual cryptography

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 1 1 2014, : : Eurasip Journal on Information Security. 2014, 2.

研究成果: ジャーナルへの寄稿記事

11 引用 (Scopus)

Collaborative agglomerative document clustering with limited information disclosure

Su, C., Zhou, J., Bao, F., Takagi, T. & Sakurai, K., 1 1 2014, : : Security and Communication Networks. 7, 6, p. 964-978 15 p.

研究成果: ジャーナルへの寄稿記事

Comparison of access pattern protection schemes and proposals for efficient implementation

Nakano, Y., Kiyomoto, S., Miyake, Y. & Sakurai, K., 10 1 2014, : : IEICE Transactions on Information and Systems. E97D, 10, p. 2576-2585 10 p.

研究成果: ジャーナルへの寄稿記事

Efficient variant of Rainbow using sparse secret keys

Yasuda, T., Takagi, T. & Sakurai, K., 9 1 2014, : : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5, 3, p. 3-13 11 p.

研究成果: ジャーナルへの寄稿記事

11 引用 (Scopus)

Fast implementation of Kcipher-2 for software and hardware

Nakano, Y., Fukushima, K., Kiyomoto, S., Ishiguro, T., Miyake, Y., Tanaka, T. & Sakurai, K., 1 1 2014, : : IEICE Transactions on Information and Systems. E97-D, 1, p. 43-52 10 p.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)

Fine-grained access control aware multi-user data sharing with secure keyword search

Zhao, F., Nishide, T. & Sakurai, K., 7 2014, : : IEICE Transactions on Information and Systems. E97-D, 7, p. 1790-1803 14 p.

研究成果: ジャーナルへの寄稿記事

7 引用 (Scopus)

Security of multivariate signature scheme using non-commutative rings?

Yasuda, T., Takagi, T. & Sakurai, K., 1 1 2014, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E97-A, 1, p. 245-252 8 p.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)
2013

A behavior-based method for detecting distributed scan attacks in darknets

Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 7 19 2013, : : Journal of information processing. 21, 3, p. 527-538 12 p.

研究成果: ジャーナルへの寄稿記事

9 引用 (Scopus)

Botnet command and control based on Short Message Service and human mobility

Hua, J. & Sakurai, K., 2 4 2013, : : Computer Networks. 57, 2, p. 579-597 19 p.

研究成果: ジャーナルへの寄稿記事

14 引用 (Scopus)

Efficient implementation for QUAD stream cipher with GPUs

Tanaka, S., Nishide, T. & Sakurai, K., 4 1 2013, : : Computer Science and Information Systems. 10, 2 SPL, p. 897-911 15 p.

研究成果: ジャーナルへの寄稿記事

4 引用 (Scopus)

Evolution of cooperation in reputation system by group-based scheme

Ren, Y., Li, M., Xiang, Y., Cui, Y. & Sakurai, K., 1 1 2013, : : Journal of Supercomputing. 63, 1, p. 171-190 20 p.

研究成果: ジャーナルへの寄稿記事

8 引用 (Scopus)

Exploiting reference images for image splicing verification

Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 1 1 2013, : : Digital Investigation. 10, 3, p. 246-258 13 p.

研究成果: ジャーナルへの寄稿記事

3 引用 (Scopus)

General fault attacks on multivariate public key cryptosystems

Hashimoto, Y., Takagi, T. & Sakurai, K., 1 1 2013, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E96-A, 1, p. 196-205 10 p.

研究成果: ジャーナルへの寄稿記事

5 引用 (Scopus)

Reliable workflow scheduling with less resource redundancy

Zhao, L., Ren, Y. & Sakurai, K., 7 23 2013, : : Parallel Computing. 39, 10, p. 567-585 19 p.

研究成果: ジャーナルへの寄稿記事

24 引用 (Scopus)
2012

A finite equivalence of verifiable multi-secret sharing

Zhao, H., Li, M., Sakurai, K., Ren, Y., Sun, J. Z. & Wang, F., 2 2012, : : International Journal of Computational Intelligence Systems. 5, 1, p. 1-12 12 p.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)

Analytic hierarchy process aided key management schemes evaluation in wireless sensor network

Na, R., Ren, Y., Hori, Y. & Sakurai, K., 2 8 2012, : : Journal of Networks. 7, 1, p. 88-100 13 p.

研究成果: ジャーナルへの寄稿記事

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks

Hao, D., Liao, X., Adhikari, A., Sakurai, K. & Yokoo, M., 10 1 2012, : : Computer Communications. 35, 17, p. 2125-2137 13 p.

研究成果: ジャーナルへの寄稿記事

11 引用 (Scopus)

Flexible service selection with user-specific QoS support in service-oriented architecture

Zhao, L., Ren, Y., Li, M. & Sakurai, K., 5 1 2012, : : Journal of Network and Computer Applications. 35, 3, p. 962-973 12 p.

研究成果: ジャーナルへの寄稿記事

60 引用 (Scopus)
38 引用 (Scopus)

Providing secure location-aware services for cooperative vehicular Ad Hoc networks

Sur, C., Park, Y., Sakurai, K. & Rhee, K. H., 10 8 2012, : : Journal of Internet Technology. 13, 4, p. 631-644 14 p.

研究成果: ジャーナルへの寄稿記事

6 引用 (Scopus)

Securing provenance of distributed processes in an untrusted environment

Syalim, A., Nishide, T. & Sakurai, K., 7 2012, : : IEICE Transactions on Information and Systems. E95-D, 7, p. 1894-1907 14 p.

研究成果: ジャーナルへの寄稿記事

2 引用 (Scopus)

Security analysis of offline E-cash systems with malicious insider

Nishide, T., Miyazaki, S. & Sakurai, K., 1 1 2012, : : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 3, 1-2, p. 55-71 17 p.

研究成果: ジャーナルへの寄稿記事

5 引用 (Scopus)
2011

Efficient context-sensitive intrusion detection based on state transition table

Hua, J., Li, M., Ren, Y. & Sakurai, K., 1 2011, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E94-A, 1, p. 255-264 10 p.

研究成果: ジャーナルへの寄稿記事

Enhancing MISP with fast mobile IPv6 security

You, I., Lee, J. H., Hori, Y. & Sakurai, K., 2011, : : Mobile Information Systems. 7, 3, p. 271-283 13 p.

研究成果: ジャーナルへの寄稿記事

4 引用 (Scopus)

Enhancing SVO logic for mobile IPv6 security protocols

You, I., Hori, Y. & Sakurai, K., 1 1 2011, : : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2, 3, p. 26-52 27 p.

研究成果: ジャーナルへの寄稿記事

22 引用 (Scopus)

FineTrust: A fine-grained trust model for peer-to-peer networks

Ren, Y., Li, M. & Sakurai, K., 1 1 2011, : : Security and Communication Networks. 4, 1, p. 61-69 9 p.

研究成果: ジャーナルへの寄稿記事

16 引用 (Scopus)

Towards formal analysis of wireless LAN security with MIS protocol

You, I., Hori, Y. & Sakurai, K., 3 1 2011, : : International Journal of Ad Hoc and Ubiquitous Computing. 7, 2, p. 112-120 9 p.

研究成果: ジャーナルへの寄稿記事

8 引用 (Scopus)

Using game theory to classify wireless Ad Hoc network attacks with analysis on countermeasures

Liao, X., Hao, D. & Sakurai, K., 9 1 2011, : : International Journal of Advancements in Computing Technology. 3, 8, p. 296-303 8 p.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)