• 2736 引用
  • 24 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
Conference article

A probabilistic method for detecting anomalous program behavior

Tatara, K., Tabata, T. & Sakurai, K., 9 1 2005, : : Lecture Notes in Computer Science. 3325, p. 87-98 12 p.

研究成果: ジャーナルへの寄稿Conference article

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic

Imamoto, K. & Sakurai, K., 7 5 2005, : : Electronic Notes in Theoretical Computer Science. 135, 1, p. 79-94 16 p.

研究成果: ジャーナルへの寄稿Conference article

9 引用 (Scopus)

Evaluation of a zero-watermarking-type steganography

Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., 1 1 2015, : : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9023, p. 613-624 12 p.

研究成果: ジャーナルへの寄稿Conference article

3 引用 (Scopus)

Key-exchange protocol using pre-agreed session-ID

Imamoto, K. & Sakurai, K., 9 1 2005, : : Lecture Notes in Computer Science. 3325, p. 375-387 13 p.

研究成果: ジャーナルへの寄稿Conference article

1 引用 (Scopus)

Security analysis of a 2/3-rate double length compression function in the black-box model

Nandi, M., Lee, W., Sakurai, K. & Lee, S., 10 17 2005, : : Lecture Notes in Computer Science. 3557, p. 243-254 12 p.

研究成果: ジャーナルへの寄稿Conference article

23 引用 (Scopus)

Some fitting of naive Bayesian spam filtering for Japanese environment

Iwanaga, M., Tabata, T. & Sakurai, K., 9 1 2005, : : Lecture Notes in Computer Science. 3325, p. 135-143 9 p.

研究成果: ジャーナルへの寄稿Conference article