Updated on 2024/10/06

Information

 

写真a

 
SAKURAI KOUICHI
 
Organization
Faculty of Information Science and Electrical Engineering Department of Informatics Professor
Cyber Security Center (Joint Appointment)
School of Engineering Department of Electrical Engineering and Computer Science(Joint Appointment)
Graduate School of Information Science and Electrical Engineering Department of Information Science and Technology(Joint Appointment)
Joint Graduate School of Mathematics for Innovation (Joint Appointment)
Title
Professor
Profile
Kouichi Sakurai received the B.S. degree in mathematics from the Faculty of Science, Kyushu University in 1986. He received the M.S. degree in applied science in 1988, and the Doctorate in engineering in 1993 from the Faculty of Engineering, Kyushu University. He was engaged in research and development on cryptography and information security at the Computer and Information Systems Laboratory at Mitsubishi Electric Corporation from 1988 to 1994. From 1994, he worked for the Dept. of Computer Science of Kyushu University in the capacity of associate professor, and became a full professor there in 2002. He is concurrently working also with the Institute of Systems & Information Technologies and Nanotechnologies, as the chief of Information Security laboratory, for promoting research co-oporations among the industry, university and government under the theme "Enhancing IT-security in social systems". He has been successful in generating such co-operation between Japan, China and Korea for security technologies as the leader of a Cooperative International Research Project supported by the National Institute of Information and Communications Technology (NICT) during 2005-2006. Moreover, in March 2006, he established research co-oporations under a Memorandum of Understanding in the field of information security with Professor Bimal Kumar Roy, the first time Japan has partnered with The Cryptology Research Society of India (CRSI). Professor Sakurai has published more than 450 academic papers around cryptography and information security (See:https://dblp.org/pid/16/3865.html)

Research Areas

  • Informatics / Information security

Degree

  • PhD (Doctor of Engineering)

Research History

  • 三菱電機・情報電子研究所(1988Apr~1993Feb)

    三菱電機・情報電子研究所(1988Apr~1993Feb)

Research Interests・Research Keywords

  • Research theme:Quantum Cryptography

    Keyword:Quantum Cryptography

    Research period: 2024

  • Research theme:Cryptography

    Keyword:Cryptography

    Research period: 2024

  • Research theme:Trust

    Keyword:Trust

    Research period: 2024

  • Research theme:CryptoCurrecny

    Keyword:CryptoCurrecny

    Research period: 2024

  • Research theme:AI Crypto theory

    Keyword:AI Crypto theory

    Research period: 2024

  • Research theme:AI

    Keyword:AI

    Research period: 2024

  • Research theme:Privacy

    Keyword:Privacy

    Research period: 2024

  • Research theme:Blockchain

    Keyword:Blockchain

    Research period: 2024

  • Research theme:Cyber Security

    Keyword:Cyber Security

    Research period: 2024

  • Research theme:NFT(Non-Fungible Token)

    Keyword:NFT(Non-Fungible Token)

    Research period: 2022.4 - 2024.5

  • Research theme:Ai Cryptography

    Keyword:deep learning, Cryptography

    Research period: 2021.4 - 2022.7

  • Research theme:Blockchain for Social Infrastructure

    Keyword:Smart contact, e-voting

    Research period: 2020.1 - 2020.6

  • Research theme:Crypto Currency and Blockchain

    Keyword:bitcoin

    Research period: 2018.4 - 2021.8

  • Research theme:AI-security

    Keyword:Artificial Intelligence, Adversarial Machine Learning

    Research period: 2017.4 - 2018.6

  • Research theme:Cyber Security

    Keyword:Network, AI

    Research period: 2015.4 - 2016.5

  • Research theme:Network Security Economics

    Keyword:Game Theory

    Research period: 2010.8 - 2011.8

  • Research theme:Design and Analysis of Cryptographic Algorithms

    Keyword:common-key cryptosyetms, security evaluation

    Research period: 2005.4 - 2012.10

  • Research theme:Cryptography and Informatin Security

    Keyword:Information Security, Cryptography, Internet Protocol, Mobile Technology, Web Application, Operating System

    Research period: 1994.3

Awards

  • SCAT 会長賞

    2019.1   (一財)テレコム先端技術研究支援センター   「超高速暗号 KCipher-2 の研究開発と実用化」

     More details

    SCAT表彰は、ICT(情報通信技術)の研究開発により国民生活の安全安心に寄与するなど多大な貢献のあった研究者に授与する趣旨で、
    2019年度から公募・他薦によって実施している。
    本年度の表彰は、会長大賞 2件、 会長賞 2件、 優秀賞 1件の合計5件であった。
    下名の受賞は、KDDI総合研究所3名との共同研究開発・国際標準化に対して贈られた。

    清本 晋作1、田中 俊昭1、仲野 有登1、櫻井 幸一2 (1: KDDI 総合研究所、2: 九州大学)

  • 平成27年度電子情報通信学会業績賞

    2016.5   電子情報通信学会   超高速暗号 KCipher-2 の開発と標準化 田中 俊昭(KDDI研) 清本 晋作(KDDI研) 櫻井 幸一(九州大学)

  • 貢献賞(国際会議)

    2015.9   電子情報通信学会・基礎境界ソサイエティ   国際会議IWSEC2015(The 9th International Workshop on Security)の運営に関する貢献

  • DICOMO2015優秀論文賞

    2015.9   情報処理学会・マルチメディア、分散、協調とモバイルシンポジウム・プログラム委員会   「ネットワーク攻撃に対する端末非依存型検知方式のOpenFlowコントローラ上への実装と評価」 宮﨑亮輔†,川本淳平†,松本晋一*,櫻井幸一† (†九州大学,*九州先端科学技術研究所)に対する論文賞

     More details

    ネットワーク仮想化技術であるSoftware-Dened Network (SDN) において,マルチエー
    ジェントを用いてサイバー攻撃を検知する手法を提案する.我々がこれまでに提案してきた手法では,SDN
    内に単一のエージェントを配置し攻撃検知を行っていた.しかし,単一エージェントでは検知結果にノイ
    ズが含まれることが問題であった.本稿では,監視するネットワークデータに関する多様性,異常と判断
    する閾値に関する多様性並びにエージェントの寿命に関する多様性を導入し,単一エージェントによる過
    度な検出を抑え複数の異常傾向を考慮した検知を提案する.また,比較評価実験により,多様性の導入に
    よって検知結果ノイズが削減できたことを確認した.

  • The Second International Symposium on Computing and Networking – Across Practical Development and Theoretical Research- (CANDAR’14)

    2014.12   “Parallelization of QUAD Stream Cipher using Linear Recurring Sequences on Graphics Processing Units” Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda and Kouichi Sakurai

     More details

    “Parallelization of QUAD Stream Cipher using Linear Recurring Sequences on Graphics Processing Units”

  • 第26回 独創性を拓く 先端技術大賞 経済産業大臣賞

    2012.7   日本工業新聞社主催 審査委員会は文部科学省、経済産業省、フジサンケイ ビジネスアイ、フジサンケイグループ関係者から構成   2005年からKDDI研究所と共同で設計開発した 高速ストリーム暗号 アルゴリズム「KCipher-2」の標準化が、2011年に成功しISO国際標準規格として採用された。 「KCipher-2」は、KDDI研と下名が共同で設計し、KDDI研によって商用化された高速ストリーム暗号アルゴリズムである。 「KCipher-2」は、携帯電話機等の小型で処理能力が限られた機器や大容量データの高速処理向けに設計し、暗号化と復号に同じ鍵を使用する共通鍵暗号方式である。 共通鍵暗号方式で米国標準のAES と比べて、最大10倍の速さで暗号化と復元を実現している。 KDDIとKDDI研は現在、「KCipher-2」の高速・軽量という特徴を生かし、マルチメディアコンテンツ配信やデータセンターなど大容量のデータを扱う分野や、 携帯電話やICカードなどリソースが限られた中で高速な処理を求められる分野に積極的に展開している。 この業績により 2012年に第26回 独創性を拓く 先端技術大賞経済大臣賞をKDDI研究所ともに櫻井は受賞した。

  • JWIS論文賞

    2010.9   IEICE ICSS研究会   2010年 9月 The 5th Joint Workshop on Information Security (JWIS 2010) Examination about the application to the color image of the digital watermark based on Benford’s Law (論文賞受賞) Jointwork with K.Noda and Y.Ueshige

  • 第4回コンピュータセキュリティシンポジウム優秀論文賞

    2001.11   情報処理学会  

  • 坂井特別記念賞授賞

    2000.5   情報処理学会  

  • 情報処理学会論文賞授賞

    2000.5   情報処理学会  

▼display all

Papers

  • A statistical verification method of random permutations for hiding countermeasure against side-channel attacks, Reviewed International coauthorship

    Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai

    Journal of Information Security and Applications,   84   2024.8   ISSN:2214-2126

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier  

    Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today’s Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its “shufflability” in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher–Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called “approximate permutation criterion” (“APC”). We use it to examine some known cases of misused FY shuffling (i–iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called “kth order permutation verification”, the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (χ2) distribution test.
    Keywords: Side channel attack; Countermeasure; Shuffling; Hiding method; Random permutation; Post-quantum cryptography

    DOI: https://doi.org/10.1016/j.jisa.2024.103797

    Open data URL: https://www.sciencedirect.com/science/article/pii/S2214212624001005

  • Learning asymmetric encryption using adversarial neural networks. Reviewed International journal

    Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai

    Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023)   2023.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/10.1016/j.engappai.2023.106220

    Other Link: https://www.sciencedirect.com/science/article/abs/pii/S0952197623004049?via%3Dihub

  • Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. Invited Reviewed International journal

    #Haibo ZHANG, @Kouichi SAKURAI

    IEEE Access 9: 48157-48173 (2021)   2021.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 0.1109/ACCESS.2021.3065872.

    Other Link: https://ieeexplore.ieee.org/document/9378511

  • Neural Networks-Based Cryptography: A Survey. Reviewed International journal

    #Ishak Meraouche, @Sabyasachi Dutta, @Haowen Tan, @Kouichi Sakurai:

    IEEE Access 9: 124727-124740 (2021)   2021.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2021.3109635

  • One Pixel Attack for Fooling Deep Neural Networks Reviewed International journal

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    IEEE Transactions on Evolutionary Computation   23 ( 5 )   828 - 841   2019.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TEVC.2019.2890858

  • Light Weight Write Mechanism for Cloud Data Reviewed International journal

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TPDS.2017.2782253

  • A proposal of event study methodology with Twitter sentimental analysis for risk management. Reviewed International journal

    Tomohisa ISHIKAWA, Kouichi Sakurai

    Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017, Beppu, Japan, January 5-7, 2017. ACM 2017,   2017.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Other Link: http://dl.acm.org/citation.cfm?id=3022240

  • Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. Reviewed International journal

    Takanori SSUGA, Takashi NISHIDE, Kouichi Sakurai

    Security and Communication Networks   9 ( (12) )   1717 - 1725   2016.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: DOI: 10.1002/sec.876

    Other Link: http://onlinelibrary.wiley.com/doi/10.1002/sec.876/abstract

  • A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints Invited Reviewed International journal

    Chunlu Chen, Hiroaki ANADA, Junpei Kawamoto, Kouichi Sakurai

    Journal of Internet Services and Information Security, Volume 6   2016.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • PLAINTEXT CHECKABLE ENCRYPTION WITH DESIGNATED CHECKER Reviewed International journal

    Angsuman Das, Avisheck Adhikari, Kouichi Sakurai

    ADVANCES IN MATHEMATICS OF COMMUNICATIONS   9 ( 1 )   2015.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3934/amc.2015.9.37

  • Fast Implementation of KCipher-2 for Software and Hardware Reviewed

    Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake,, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Trans.   97 ( D(1) )   43 - 52   2014.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Secure and Privacy Preserving Hierarchical Wireless Sensor Networks using Hybrid Key Management Technique

    Sushimita Ruj, Kouichi Sakurai

    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)   2013.12

     More details

    Language:English  

    DOI: 10.1109/GLOCOM.2013.6831104

  • K2: A Stream Cipher Algorithm using Dynamic Feedback Control. Reviewed International journal

    Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:

    SECRYPT 2007   2007.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Addressing causality: participatory evaluation on improvisational drama workshops for people with dementia and their carers

    Nakamura, M; Sejima, K; Sakurai, K; Nagashima, Y; Yao, YY

    CULTURAL TRENDS   2024.9   ISSN:0954-8963 eISSN:1469-3690

  • FOREWORD

    SAKURAI Kouichi

    IEICE Transactions on Information and Systems   E107.D ( 9 )   1110 - 1111   2024.9   ISSN:09168532 eISSN:17451361

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.1587/transinf.2023bcf0001

    CiNii Research

  • Special Section on Security and Privacy in Blockchain

    Sakurai, K

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E107D ( 9 )   1110 - 1111   2024.9   ISSN:0916-8532 eISSN:1745-1361

     More details

  • A statistical verification method of random permutations for hiding countermeasure against side-channel attacks

    Park, JY; Ju, JW; Lee, WN; Kang, BG; Kachi, Y; Sakurai, K

    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS   84   2024.8   ISSN:2214-2126 eISSN:2214-2134

     More details

    Publisher:Journal of Information Security and Applications  

    Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today's Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its “shufflability” in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher–Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called “approximate permutation criterion” (“APC”). We use it to examine some known cases of misused FY shuffling (i–iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called “kth order permutation verification”, the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (χ2) distribution test.

    DOI: 10.1016/j.jisa.2024.103797

    Web of Science

    Scopus

  • A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy Reviewed

    Yiluo Liu, Yaokai Feng, Kouichi Sakurai

    The 18th International Conference on Ubiquitous Information Management and Communication, IEEE   1 - 8   2024.1   ISBN:9798350331011

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Proceedings of the 2024 18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024  

    The accelerated advancement and ubiquitous adoption of smart vehicles, coupled with the Internet of Things (IoT), has propelled the Internet of Vehicles (IoV) to prominence as a pivotal and expansive area of research within the IoT sphere. An important challenge in IoV design lies in the efficient execution of data storage and sharing mechanisms. The successful implementation of blockchain technology across various disciplines has sparked intrigue amongst researchers to unearth its potential applicability within the IoV context. In the related works, Blockchain-based IoV systems are usually composed of three layers: the vehicle layer, the roadside units (RSUs) layer, and the blockchain or cloud layer. The RSUs layer is often required to perform numerous tasks throughout the system. Stability during rush hours is worth considering. RSUs need to receive a lot of data during rush hours and may also undertake data computing tasks. Based on the characteristics of distributed ledges, the issue of substantial storage overhead looms as a complex problem with the escalating size of the block list. Although some solutions are being proposed, such as fragmented ledger, there are still security concerns. Data security cannot be guaranteed while reducing storage overhead. To combat the stability and cost concerns associated with Roadside Units (RSUs), we delegate the majority of RSU functionalities to other layers of the system. Further, we incorporate a secure blockchain strategy - deploying an outer and inner blockchain to fortify the security and resilience of the overall blockchain network. Based on the autonomous execution characteristics of smart contracts, we try to use smart contracts for data transmission. We use Solidity to write the smart contract and test it on the Remix IDE with the aim of testing the smart contract's operability in terms of data transmission. We scrutinise the data transmission process via smart contracts, and the empirical results corroborate the effectiveness of our uniquely designed process.

    DOI: 10.1109/IMCOM60618.2024.10418375

    Scopus

    researchmap

  • SoK: Directions and Issues in Formal Verification of Payment Protocols

    Sakurada, H; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024   202   111 - 119   2024   ISSN:2367-4512 ISBN:978-3-031-57915-8

     More details

    Publisher:Lecture Notes on Data Engineering and Communications Technologies  

    Consumers use various payment methods to purchase goods and services from retailers, such as cash, credit cards, debit cards, prepaid cards, and barcodes/two-dimensional codes. In the past, in the case of in-store payments using credit cards, the in-store terminal read the card number from the magnetic strip on the card and sent it with other purchase information to the credit card network. Recently, to prevent counterfeiting, the IC chip on the credit card and the in-store terminal communicates to authenticate each other and process the payment transaction. The medium of communication is not only contact but also contactless (“touch" payment), Moreover, the in-store terminal may process the payment either online or offline and optionally may require the customer to input their PIN. Various protocols and protocol flows are used depending on the medium and how the payment is processed. Credit cards are also used for remotely purchasing goods or services; in this case, other protocols and protocol flows are used. In some such protocols, researchers found serious security flaws that allow a malicious party to fraudulently purchase goods in such a way that is not allowed for legitimate customers. Such flaws must be fixed, but it is hard to fix and deploy protocols after they are widely used. Formal verification is a method to analyze and verify the security of such protocols and to detect flaws before they are widely deployed. In this paper, we will discuss the research trends in formal verification of the security of various cashless payment protocols, as well as future issues.

    DOI: 10.1007/978-3-031-57916-5_10

    Web of Science

    Scopus

  • Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks

    Sakurada H., Sakurai K.

    Communications in Computer and Information Science   2095 CCIS   248 - 259   2024   ISSN:18650929 ISBN:9789819744640

     More details

    Publisher:Communications in Computer and Information Science  

    This paper reviews current research trends in the formal verification of computer network configurations, specifically focusing on formal verification for software-defined networking (SDN). We explore the challenges encountered when applying formal verification, comparing its application to pre-SDN network verification efforts. Additionally, we discuss the potential application of formal verification in mobile networks. We first provide an overview of research on the formal verification of virtual LAN (VLAN) configurations, which predates the emergence of SDN. We next illustrate SDN and existing research applying formal verification to SDN. Finally, we briefly examine potential scenarios for applying formal verification to mobile networks.

    DOI: 10.1007/978-981-97-4465-7_18

    Scopus

  • Extension of Resource Authorization Method with SSI in Edge Computing

    Watanabe, R; Kubota, A; Kurihara, J; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024   204   385 - 394   2024   ISSN:2367-4512 ISBN:978-3-031-57941-7

  • Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies

    Zhang, HB; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024   201   151 - 162   2024   ISSN:2367-4512 ISBN:978-3-031-57869-4

  • Enhancing Security and Efficiency: A Lightweight Federated Learning Approach

    Chen, CL; Wang, KIK; Li, P; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024   202   349 - 359   2024   ISSN:2367-4512 ISBN:978-3-031-57915-8

     More details

    Publisher:Lecture Notes on Data Engineering and Communications Technologies  

    Recently, as big data and AI technology advance, data privacy and security are increasingly critical. Federated Learning (FL) has become a key solution in machine learning to address these concerns. In this paper, we present a secure and lightweight FL scheme. It employs masking and Secret Sharing (SS) to securely aggregate data from distributed clients, thereby reducing the demands of model training on system resources. The scheme also computes data similarity among clients to evaluate each client’s contribution, defending against challenges posed by malicious clients. This approach safeguards privacy, facilitates accurate model updates, and addresses the challenges of limited resources in edge computing environments. We subjected our framework to rigorous validation using MNIST datasets. Experimental outcomes unequivocally substantiate the efficacy of our proposed methodology.

    DOI: 10.1007/978-3-031-57916-5_30

    Web of Science

    Scopus

  • Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds

    Lyu, Y; Feng, YK; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024   202   133 - 144   2024   ISSN:2367-4512 ISBN:978-3-031-57915-8

     More details

    Publisher:Lecture Notes on Data Engineering and Communications Technologies  

    The DDoS attack remains one of the leading attacks today. To reduce the number of resource-consuming detection algorithm calls, the trigger-based two-stage detection approach has been proposed. In such systems, trigger mechanisms, including trigger features and threshold update algorithms, play an important role in detection performance. It is also important what features are used in the second stage of detection. In this study, 1) we introduce a Riemannian manifold metric (work) as a trigger feature for the first time since it was proven that traffic data is a Riemannian manifold; 2) we propose a new mechanism to update the trigger threshold based on historical flow data and the feedback of the second-stage detection results; 3) the feature selection algorithm ECOFS is used for the second stage detection. Experimental results using public datasets show that our proposal calls much less of the second-stage detection than the latest trigger-based two-step detection systems.

    DOI: 10.1007/978-3-031-57916-5_12

    Web of Science

    Scopus

  • A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments

    Chen Chunlu, Wang Kevin I-Kai, Li Peng, Sakurai Kouichi

    International Journal of Networking and Computing   14 ( 2 )   123 - 144   2024   ISSN:21852839 eISSN:21852847

     More details

    Language:English   Publisher:IJNC Editorial Committee  

    In the rapidly evolving field of machine learning, the adoption of traditional approaches often encounters limitations, such as increased computational costs and the challenge of catastrophic forgetting, particularly when models undergo retraining with new datasets. This issue is especially pronounced in environments that require the ability to swiftly adapt to changing data landscapes. Continual learning emerges as a pivotal solution to these challenges, empowering models to assimilate new information while preserving the knowledge acquired from previous learning phases. Despite its benefits, the continual learning process's inherent need to retain prior knowledge introduces a potential risk for information leakage.

    Addressing these challenges, we propose a Federated Continual Learning (FCL) framework with a multi-head neural network model. This approach blends the privacy-preserving capabilities of Federated Learning (FL) with the adaptability of continual learning, ensuring both data privacy and continuous learning in edge computing environments. Moreover, this framework enhances our approach to adversarial training, as the constant influx of diverse and complex training data allows the model to improve its understanding and adaptability, thereby strengthening its defenses against adversarial threats.
    Our system features a architecture with dedicated fully-connected layers for each task, ensuring that unique features pertinent to each task are accurately captured and preserved over the model's lifetime. Data undergoes processing through these task-specific layers before a final label is determined, based on the highest prediction value. This method exploits the model's full range of knowledge, significantly boosting prediction accuracy. We have conducted thorough evaluations of our FCL framework on two benchmark datasets, MNIST and CIFAR-10, with the results clearly validating the effectiveness of our approach.

    DOI: 10.15803/ijnc.14.2_123

    CiNii Research

  • Secured tracing for group signatures from attribute-based encryption

    Perera, MNS; Matsunaka, T; Yokoyama, H; Sakurai, K

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE   36 ( 15 )   2023.12   ISSN:1532-0626 eISSN:1532-0634

     More details

    Publisher:Concurrency and Computation: Practice and Experience  

    This article presents a tracing mechanism for group signatures answering the security threats of malicious authorities and users' forgeries. The proposal weakens the high trust placed on the centralized tracing party in previous group signatures by decentralizing tracing power using a multiple tracer setting and limiting the tracers' access using attribute-based encryption and the requirement of the group manager's agreement. We allow the group manager to control tracers identifying his group users. Instead of a centralized tracer, our setting has multiple tracers possessing attribute sets. Thus, after getting the group manager's permission, a tracer should satisfy the access policy in a given signature to identify the signer. On the other hand, our group signature scheme decentralizes the tracing key generation and removes the group manager's tracing ability. Thus, it ensures that only the attribute-satisfying and permitted tracers can identify the signer. Moreover, this article delivers security against malicious users. It presents a verification process of access policy of the signatures to prevent users from utilizing invalid attributes for signing. In addition, the article delivers a collaborative tracing mechanism to satisfy attribute sets that a tracer fails to fulfill alone for identifying a signer. Thus, our tracing mechanism ensures security against malicious authorities and group users in group signatures. The article gives the general construction of the scheme and discusses the security.

    DOI: 10.1002/cpe.7986

    Web of Science

    Scopus

  • An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks

    Tan, HW; Zheng, WY; Vijayakumar, P; Sakurai, K; Kumar, N

    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS   24 ( 12 )   15590 - 15600   2023.12   ISSN:1524-9050 eISSN:1558-0016

     More details

    Publisher:IEEE Transactions on Intelligent Transportation Systems  

    In recent years, growing research interest from both industry and academia has been aroused to the vehicular networks, which is regarded as the fundamental component of the modern intelligent transportation system (ITS). Lots of remarkable research outputs with respect to secure vehicular data interactions and user privacy preservation has been witnessed. However, the existing schemes all focus on the common vehicular communication scenarios where facilities are deployed, whereas the secure data exchange in the abnormal infrastructure-less vehicular environment has not been properly investigated. To deal with unpredictable abnormal situations caused by artificial or natural disasters such as earthquakes and floods, a distinctive vehicle-assisted aggregate authentication mechanism for infrastructure-less vehicular networks is presented in this paper. With assistance from the neighboring vehicles, the homomorphic signature involving all requesting vehicles is generated and forwarded to the remaining functional RSUs. Meanwhile, vehicular group communication among the validated entities is enabled. Additionally, the fault-tolerant verification method is adopted such that the ineffective entities can be easily distinguished and removed without interfering with other requesting vehicles. The security proofs and discussions regarding vital security properties are presented, while the performance analysis follows. Compared with the state-of-the-art, advantages in terms of security and performance properties can be proved.

    DOI: 10.1109/TITS.2022.3176406

    Web of Science

    Scopus

  • Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT): Exploring Designated Confirmer Signatures and Blockchain Technology for Non-Fungible Token (NFT) Implementation

    Ikebe K., Hata Y., Nakamura T., Isohara T., Sakurai K.

    ACM International Conference Proceeding Series   119 - 125   2023.10   ISBN:9798400708534

     More details

    Publisher:ACM International Conference Proceeding Series  

    The ERC721 standard defines a Non-Fungible Token (NFT) as an identifier that uniquely identifies digital data recorded on a blockchain. The NFT currently in use claim to ensure the uniqueness of the contents associated with the NFT by taking advantage of the tamper-resistant characteristics of the blockchain data. Besides, digital signatures based on public-key encryption is a representative technique to prevent digital data from being falsified, and its application to NFT is also discussed. In this study, we first consider an NFT implementation by applying a designated confirmer signature using an interactive verification method without using blockchain technology. We design an NFT issuance protocol that guarantees the uniqueness of data with a designated confirmer signature, and evaluate the security of the protocol. Moreover, we compare it with existing blockchain implementations. By analyzing the both methods, we aim to provide insights into the potential applications and performance in using designated confirmer signatures for NFT. Our findings contribute to the ongoing research on secure and efficient mechanisms for ensuring the integrity and uniqueness of digital assets in decentralized systems.

    DOI: 10.1145/3634814.3634831

    Scopus

  • Phoenix: A Live Upgradable Blockchain Client

    Wang, CM; Li, P; Fan, XP; Tang, ZY; Zeng, YL; Sakurai, K

    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING   8 ( 4 )   703 - 714   2023.10   ISSN:2377-3782

     More details

    Publisher:IEEE Transactions on Sustainable Computing  

    Blockchain is an important supporting technology for various sustainable systems. It relies on a number of distributed nodes running blockchain client software, which is responsible for some critical tasks, such as communicating with other nodes and generating new blocks. However, the quick evolution of blockchain technology brings crucial challenges to blockchain client design. After carefully examining existing blockchain client software, we have identified a critical weakness: Blockchain clients are weak in supporting live upgrades, resulting in a blockchain fork that incurs security concerns and risks. In this article, we propose Phoenix, a novel blockchain client design that is live upgradable. Phoenix uses blockchain service encapsulation to decouple blockchain services. Based on service encapsulation, we propose a live upgrade scheme that packs upgrade codes into blockchain transactions and uses a Just-In-Time engine to avoid service interruption. A parallel execution engine is developed to increase service efficiency. We evaluated Phoenix on a 51-node blockchain, and experimental results show that Phoenix outperforms existing solutions in overhead and upgrade latency.

    DOI: 10.1109/TSUSC.2023.3282586

    Web of Science

    Scopus

  • Learning asymmetric encryption using adversarial neural networks

    Meraouche, I; Dutta, S; Tan, HW; Sakurai, K

    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE   123   2023.8   ISSN:0952-1976 eISSN:1873-6769

     More details

    Publisher:Engineering Applications of Artificial Intelligence  

    We propose a multi-agent adversarial neural networks model where a sender (Alice) and a receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their communication from one or more attackers/eavesdroppers. Existing work in the field required shared symmetric information between Alice and Bob before initiating the training process. To the best of our knowledge, this is the first work in which Alice and Bob with asymmetric information can train themselves to protect their communication. Our initial model setup contains five agents: sender Alice, receiver Bob, eavesdropper Eve and two neural networks (we call them public keys generator and private keys generator) that, based on a (secret) random noise from Bob, will generate a pair of public/private keys that allows Alice to encrypt a message with the public key and Bob to decrypt the message with the private key while preventing Eve from decrypting the secret message using the public key. We show that the neural networks are able to establish a communication and secure it from Eve. Finally, we consider adversaries stronger than Eve to model leakage attacks, chosen plaintext attacks (CPA) and test the distinguishability between ciphertexts. The last three experiments show that neural networks (with asymmetric information) can secure the communication providing stronger security guarantees and resilience to leakage attacks which may include leakage from the private key.

    DOI: 10.1016/j.engappai.2023.106220

    Web of Science

    Scopus

  • Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection

    Soni, S; Seal, A; Mohanty, SK; Sakurai, K

    BIOMEDICAL SIGNAL PROCESSING AND CONTROL   85   2023.8   ISSN:1746-8094 eISSN:1746-8108

     More details

    Publisher:Biomedical Signal Processing and Control  

    Today, depression is a psychological condition that affects many individuals globally and, if untreated, can negatively impact one's emotions and lifestyle quality. Machine learning (ML) techniques have lately been used to identify mental illnesses using Electroencephalography (EEG) data. These signals are difficult and time-consuming to interpret visually because they are intricate, non-static, and irregular. As a result, computer-assisted early depression detection systems are highly desirable. The study proposes a feature extraction method for each EEG signal channel by building a sparse graph from the complete complex network using a k-round minimum spanning tree. The subjects in the dataset depict the graph's nodes, and their relationship represents the edge weights, which are determined using the Euclidean distance. Then, features from the sparse graph are extracted using the Node2vec approach and fed into classifiers to get a probability score. Finally, a fuzzy ensemble strategy is exploited at the decision level for integrating probability scores to distinguish depressed subjects from healthy people. Several experiments comparing the proposed method to seven other approaches on four publicly available datasets demonstrate the importance and superiority of the proposed strategy. The K-Nearest Neighbor classifier used in the suggested method produces the highest classification accuracy across the four datasets, with scores of 0.916, 0,960, and 0.940 respectively.

    DOI: 10.1016/j.bspc.2023.104873

    Web of Science

    Scopus

  • Ameliorative effects of Fingolimod (FTY720) on microglial activation and psychosis-related behavior in short term cuprizone exposed mice

    Li, SY; Sakurai, K; Ohgidani, M; Kato, TA; Hikida, T

    MOLECULAR BRAIN   16 ( 1 )   59   2023.7   eISSN:1756-6606

     More details

  • Current Perspectives on Securing Critical Infrastructures' Supply Chains

    Roman, R; Alcaraz, C; Lopez, J; Sakurai, K

    IEEE SECURITY & PRIVACY   21 ( 4 )   29 - 38   2023.7   ISSN:1540-7993 eISSN:1558-4046

     More details

    Publisher:IEEE Security and Privacy  

    Digitalization and industrial paradigms are transforming the landscape of critical infrastructures and supply chains. With emerging technologies, it is possible to deploy services to enhance trust and transparency, but they are susceptible to threats, as discussed in this article.

    DOI: 10.1109/MSEC.2023.3247946

    Web of Science

    Scopus

  • A Review on Machine Unlearning

    Zhang H., Nakamura T., Isohara T., Sakurai K.

    SN Computer Science   4 ( 4 )   2023.7   ISSN:2662995X

     More details

    Publisher:SN Computer Science  

    Recently, an increasing number of laws have governed the useability of users’ privacy. For example, Article 17 of the General Data Protection Regulation (GDPR), the right to be forgotten, requires machine learning applications to remove a portion of data from a dataset and retrain it if the user makes such a request. Furthermore, from the security perspective, training data for machine learning models, i.e., data that may contain user privacy, should be effectively protected, including appropriate erasure. Therefore, researchers propose various privacy-preserving methods to deal with such issues as machine unlearning. This paper provides an in-depth review of the security and privacy concerns in machine learning models. First, we present how machine learning can use users’ private data in daily life and the role that the GDPR plays in this problem. Then, we introduce the concept of machine unlearning by describing the security threats in machine learning models and how to protect users’ privacy from being violated using machine learning platforms. As the core content of the paper, we introduce and analyze current machine unlearning approaches and several representative results and discuss them in the context of the data lineage. Furthermore, we also discuss the future research challenges in this field.

    DOI: 10.1007/s42979-023-01767-4

    Scopus

  • 小さな直腸神経内分泌腫瘍に対する縫縮法併用内視鏡的粘膜下層切除術と内視鏡的粘膜下層剥離術の比較 多施設後方視的検討(Comparison of endoscopic submucosal resection with ligation and endoscopic submucosal dissection for small rectal neuroendocrine tumors: A multicenter retrospective study)

    Matsuno Kenshi, Miyamoto Hideaki, Kitada Hideki, Yoshimatsu Shinichi, Tamura Fumio, Sakurai Kouichi, Fukubayashi Kotaro, Shono Takashi, Setoyama Hiroko, Matsuyama Taichi, Suko Shinichiro, Narita Rei, Honda Munenori, Tateyama Masakuni, Naoe Hideaki, Morinaga Jun, Tanaka Yasuhito, Gushima Ryosuke

    DEN Open   3 ( 1 )   1 of 8 - 8 of 8   2023.4

     More details

    Language:English   Publisher:John Wiley & Sons Australia, Ltd  

    縫縮法併用内視鏡的粘膜下層切除術(ESMR-L)および内視鏡的粘膜下層剥離術(ESD)はともに<10mmの直腸神経内分泌腫瘍(NET)に対する標準的治療であるが、どちらの成績が良好かに関する合意は得られていない。本稿では、直腸NETに対するESMR-LとESDの有用性を比較した。本研究は、多施設共同後方視的コホート研究で、検討対象は小さな直腸NETに対してESMR-LまたはESDを施行した205例とした。治療成績を単変量解析、多変量解析および傾向スコアを用いた逆確率治療重み付け法(IPTW)で評価した。サブグループ解析として、技術的成功率に対する内視鏡医の経験の影響を評価した。89例がESMR-Lで、116例がESDで治療された。RO切除率には両群間で有意差は認められなかった(90%対92%、P=0.73)。処置時間はESMR-LがESDよりも有意に短く(17分対52分、P<0.01)、入院期間もESMR-L群がESD群よりも有意に短かった(3日対5日、P<0.01)。これらの結果は、IPTW補正後の多変量解析によっても確認された。ESDの処置時間は、経験の浅い内視鏡医で有意に長かったが(49分対70分、P=0.02)、ESMR-Lでは経験による影響は認められなかった(17分対17分、P=0.27)。小さな直腸NETに対して、完全切除率はESMR-LおよびESDのどちらも同様に高かった。しかし、処置時間が短いこと、入院期間が短いことから、ESMR-Lが、特に経験の浅い内視鏡医にとって、より有用性の高い治療法である。

  • A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection

    Lyu Yang, Feng Yaokai, Sakurai Kouichi

    Information   14 ( 3 )   191   2023.3   eISSN:20782489

     More details

    Language:English  

    Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce training costs, improve detection performance, and make the detection system lightweight. Many techniques related to feature selection for cyber attack detection have been proposed, and each technique has advantages and disadvantages. Determining which technology should be selected is a challenging problem for many researchers and system developers, and although there have been several survey papers on feature selection techniques in the field of cyber security, most of them try to be all-encompassing and are too general, making it difficult for readers to grasp the concrete and comprehensive image of the methods. In this paper, we survey the filter-based feature selection technique in detail and comprehensively for the first time. The filter-based technique is one popular kind of feature selection technique and is widely used in both research and application. In addition to general descriptions of this kind of method, we also explain in detail search algorithms and relevance measures, which are two necessary technical elements commonly used in the filter-based technique.

    CiNii Research

  • 特集:「AI セキュリティの研究動向」特集「AI セキュリティの研究動向」にあたって

    大塚 玲, 櫻井 幸一

    人工知能   38 ( 2 )   178 - 179   2023.3   ISSN:21882266 eISSN:24358614

     More details

    Language:Japanese   Publisher:一般社団法人 人工知能学会  

    DOI: 10.11517/jjsai.38.2_178

    CiNii Research

  • 機械アンラーニングの研究に関する現状と課題

    張 海波, 櫻井 幸一

    人工知能   38 ( 2 )   197 - 205   2023.3   ISSN:21882266 eISSN:24358614

     More details

    Language:Japanese   Publisher:一般社団法人 人工知能学会  

    DOI: 10.11517/jjsai.38.2_197

    CiNii Research

  • A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection Reviewed

    Lyu, Y; Feng, YK; Sakurai, K

    INFORMATION   14 ( 3 )   2023.3   eISSN:2078-2489

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information (Switzerland)  

    Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce training costs, improve detection performance, and make the detection system lightweight. Many techniques related to feature selection for cyber attack detection have been proposed, and each technique has advantages and disadvantages. Determining which technology should be selected is a challenging problem for many researchers and system developers, and although there have been several survey papers on feature selection techniques in the field of cyber security, most of them try to be all-encompassing and are too general, making it difficult for readers to grasp the concrete and comprehensive image of the methods. In this paper, we survey the filter-based feature selection technique in detail and comprehensively for the first time. The filter-based technique is one popular kind of feature selection technique and is widely used in both research and application. In addition to general descriptions of this kind of method, we also explain in detail search algorithms and relevance measures, which are two necessary technical elements commonly used in the filter-based technique.

    DOI: 10.3390/info14030191

    Web of Science

    Scopus

    researchmap

  • A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds Reviewed

    Muyuan Niu, Yaokai Feng, Kouichi Sakurai

    17th International Conference on Ubiquitous Information Management and Communication, IEEE   1 - 7   2023.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IMCOM56909.2023

    researchmap

  • Cybersecurity Case for Automotive Functionalities using AI/ML

    MIZOGUCHI Seiichiro, SAKURAI Kouichi

    Proceedings of the Annual Conference of JSAI   JSAI2023 ( 0 )   4D2GS1105 - 4D2GS1105   2023   eISSN:27587347

     More details

    Language:Japanese   Publisher:The Japanese Society for Artificial Intelligence  

    <p>Vehicle manufacturers must explain that their vehicles meet cybersecurity requirements according to UN-R155 regulations. Since self-driving cars use AI/ML technology, it is necessary to consider security for AL/ML technology. This paper describes an explanatory strategy for the cybersecurity argumentation of automotive functions using AI/ML technology.</p>

    DOI: 10.11517/pjsai.jsai2023.0_4d2gs1105

    CiNii Research

  • Status and Issue of Research and Application of Machine Unlearning

    SAKURAI Kouichi

    Proceedings of the Annual Conference of JSAI   JSAI2023 ( 0 )   2L1GS1105 - 2L1GS1105   2023   eISSN:27587347

     More details

    Language:Japanese   Publisher:The Japanese Society for Artificial Intelligence  

    <p>Two topics with related machine unlearning are introduced. The first one is the pioneering domestic research in the 2010, which. was presented before proposing the notion of machine unlearning on 2015. The second one is about Federated Unlearning, which is getting hot in recent research as unlearn-version of Google’s federated learning. This report is a kind of addendum to the undersigned author’s article in the special section entitled "Research Trends in AI Security" on Artificial Intelligence Vol. 38 No. 2 (March 2023).</p>

    DOI: 10.11517/pjsai.jsai2023.0_2l1gs1105

    CiNii Research

  • Towards Evaluating the Security of Human Computable Passwords Using Neural Networks

    Murata I., He P., Gu Y., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13720 LNCS   303 - 312   2023   ISSN:03029743 ISBN:9783031256585

     More details

    Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Passwords are playing a major role for authentication in our daily life. However contemporary passwords are typically either difficult to remember or vulnerable to various attacks. In 2017, Blocki, Blum, Datta and Vempala introduced the concept of human computable passwords as a promising authentication method. The fundamental concerns for designing human computable passwords are their usability and security. So far, the security evaluation on human computable passwords authentication schemes is mainly based on complexity-theoretic analysis. In this paper, we initially investigate the security of human computable passwords against neural network-based adversarial attacks. Specifically, we employ the typical multilayer perceptron (MLP) model to attempt to attack the human computable passwords authentication scheme proposed by Blocki-Blum-Datta-Vempala. We present implementation results and the corresponding analysis as well. Our results imply that it is possible for an MLP to learn a simple function, but is difficult for an MLP to learn piecewise functions well.

    DOI: 10.1007/978-3-031-25659-2_22

    Scopus

  • POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance

    Chen, CL; Wang, KIK; Li, P; Sakurai, K

    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023   13907   685 - 689   2023   ISSN:0302-9743 ISBN:978-3-031-41180-9 eISSN:1611-3349

     More details

    Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Federated Learning (FL) and the Internet of Things (IoT) have transformed data processing and analysis, overcoming traditional cloud computing limitations. However, challenges such as catastrophic forgetting in continuous training scenarios arise. To address these, we propose an FL framework that supports continual learning while enhancing system security. We preserve critical knowledge through the incorporation of Knowledge Distillation (KD), addressing the issue of catastrophic forgetting. In addition, we have integrated encryption techniques to secure the updated parameters of clients from potential threats posed by attackers.

    DOI: 10.1007/978-3-031-41181-6_40

    Web of Science

    Scopus

  • POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses

    Haibo Zhang, Zhihua Yao, Kouichi Sakurai

    Lecture Notes in Computer Science   13907   690 - 694   2023   ISSN:0302-9743 ISBN:978-3-031-41180-9 eISSN:1611-3349

     More details

    Publishing type:Part of collection (book)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-41181-6_41

    Web of Science

    Scopus

    researchmap

  • Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme.

    Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai

    NSS   13983 LNCS   155 - 176   2023   ISSN:03029743 ISBN:9783031398278

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-031-39828-5_9

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/nss/nss2023.html#PereraNMYS23

  • Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments

    Chen C., Wang K.I.K., Li P., Sakurai K.

    Proceedings - 2023 11th International Symposium on Computing and Networking, CANDAR 2023   1 - 10   2023   ISBN:9798350306705

     More details

    Publisher:Proceedings - 2023 11th International Symposium on Computing and Networking, CANDAR 2023  

    Federated Learning (FL) and the Internet of Things (IoT) have revolutionized data processing and analysis, overcoming the traditional limitations of cloud computing. However, traditional machine learning strategies lead to increased costs and catastrophic forgetting due to model retraining with new datasets. Continual learning has been proposed to counter this, enabling models to adapt to new data while preserving previous knowledge, which is beneficial for dynamic edge environments. Despite these advantages, the retention of previous knowledge during the continual learning process may lead to the information leakage. To address the inherent challenges of multitask scenarios, we present a Federated Continual Learning (FCL) framework that integrates the privacy-preserving benefits of Federated Learning (FL) into a continual learning system, ensuring both continual learning and privacy preservation in edge computing data processing and analysis. Specifically, our architecture introduces dedicated fully-connected layers for each task. This architecture ensures that distinctive features pertinent to each task are not only captured but also preserved throughout the model's lifespan. Within our framework, data is processed via task-specific layers. Subsequently, the final label is determined by associating it with the paramount prediction value, thus capitalizing on the model's comprehensive knowledge reservoir to bolster prediction accuracy. We subjected our FCL framework to rigorous validation using two benchmark datasets: MNIST and CFAR-10. Experimental outcomes unequivocally substantiate the efficacy of our proposed methodology.

    DOI: 10.1109/CANDAR60563.2023.00009

    Scopus

  • Factors associated with postpartum smoking relapse at early postpartum period of Japanese women in the Japan Environmental and Children's Study

    Anai, A; Asato, K; Tatsuta, N; Sakurai, K; Ota, C; Kuriyama, S; Sugawara, J; Arima, T; Yaegashi, N; Nakai, K

    ENVIRONMENTAL HEALTH AND PREVENTIVE MEDICINE   28   56   2023   ISSN:1342-078X eISSN:1347-4715

     More details

  • Explicit Non-malleable Codes from Bipartite Graphs

    Shohei Satake, Yujie Gu, Kouichi Sakurai

    Arithmetic of Finite Fields   13638   221 - 236   2023   ISSN:0302-9743 ISBN:978-3-031-22943-5 eISSN:1611-3349

     More details

    Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-031-22944-2_14

    Web of Science

    Scopus

    researchmap

  • Eliminating Adversarial Perturbations Using Image-to-Image Translation Method

    Haibo Zhang, Zhihua Yao, Kouichi Sakurai

    Lecture Notes in Computer Science   13907   601 - 620   2023   ISSN:0302-9743 ISBN:978-3-031-41180-9 eISSN:1611-3349

     More details

    Publishing type:Part of collection (book)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-41181-6_32

    Web of Science

    Scopus

    researchmap

  • A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds

    Niu M., Feng Y., Sakurai K.

    Proceedings of the 2023 17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023   2023   ISBN:9781665453486

     More details

    Publisher:Proceedings of the 2023 17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023  

    Software-defined networking (SDN) has received a lot of attention in academia and industry in recent years, and DDoS attacks are still one of the most dangerous threats. As cyberattacks become more sophisticated, detection systems also become more complex and computationally intensive, for example, Deep Learning-based detection. Against this background, two-stage detection is proposed, in which a trigger is introduced before the complex detection being invoked. That is, the heavy detection module is called only when the requirements in the trigger are satisfied. Clearly, the triggering mechanism plays an important role in such detection systems as it determines when the second stage is invoked. Most of the existing relevant studies utilize one feature and a fixed threshold. However, it is not easy to predefine suitable thresholds in practice, and one feature is often not sufficient for effective trigger conditions that have a significant impact on detection performance of the whole detection system. The latest related work uses dynamic thresholding, but still only one feature, and the threshold adaptation mechanism is too simplistic, which make it too difficult to be used in real applications. Moreover, the performance of the approach in the most of related works are verified only using simulated data. In this study, we increase the number of features and optimized the threshold adjustment method in the trigger. In addition, in the detection module of the second stage, six features carefully determined from traffic bytes, packets, and IP addresses are used. The performance of the proposal is demonstrated in a simulated SDN environment using a public dataset. The experimental results indicate that the times of calling the computationally intensive detection module is significantly reduced, while at the same time the detection performance of the overall system is not degraded.

    DOI: 10.1109/IMCOM56909.2023.10035661

    Scopus

  • A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network

    Pengju He, Haibo Zhang, Yaokai Feng, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   14299   513 - 523   2023   ISSN:0302-9743 ISBN:978-3-031-45932-0 eISSN:1611-3349

     More details

    Publishing type:Research paper (international conference proceedings)  

    Temporal Convolution Network(TCN) has recently been introduced in the cybersecurity field, where two types of TCNs that consider causal relationships are used: causal TCN and non-causal TCN. Previous researchers have utilized causal and non-causal TCNs separately. Causal TCN can predict real-time outcomes, but it ignores traffic data from the time when the detection is activated. Non-causal TCNs can forecast results more globally, but they are less real-time. Employing either causal TCN or non-causal TCN individually has its drawbacks, and overcoming these shortcomings has become an important topic. In this research, we propose a method that combines causal and non-causal TCN in a contingent form to improve detection accuracy, maintain real-time performance, and prevent long detection time. Additionally, we use two datasets to evaluate the performance of the proposed method: NSL-KDD, a well-known dataset for evaluating network intrusion detection systems, and MQTT-IoT-2020, which simulates the MQTT protocol, a standard protocol for IoT machine-to-machine communication. The proposed method in this research increased the detection time by about 0.1ms compared to non-causal TCN when using NSL-KDD, but the accuracy improved by about 1.5%, and the recall improved by about 4%. For MQTT-IoT-2020, the accuracy improved by about 3%, and the recall improved by about 7% compared to causal TCN, but the accuracy decreased by about 1% compared to non-causal TCN. The required time was shortened by 30ms (around 30%), and the recall was improved by about 7%.

    DOI: 10.1007/978-3-031-45933-7_30

    Web of Science

    Scopus

    researchmap

  • On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms

    Gu, YJ; Akao, S; Esfahani, NN; Miao, Y; Sakurai, K

    IEEE TRANSACTIONS ON INFORMATION THEORY   68 ( 10 )   6904 - 6914   2022.10   ISSN:0018-9448 eISSN:1557-9654

     More details

    Publisher:IEEE Transactions on Information Theory  

    All-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t,s,v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X|Y) about any t inputs X that is not revealed by any s-t outputs Y. In particular, we establish the general lower and upper bounds on H(X|Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.

    DOI: 10.1109/TIT.2022.3174008

    Web of Science

    Scopus

  • On the Security Properties of Combinatorial All-or-nothing Transforms

    Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai

    2022 IEEE International Symposium on Information Theory (ISIT)   2022-June   1447 - 1452   2022.6   ISSN:21578095 ISBN:9781665421591

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/isit50566.2022.9834366

    Scopus

    researchmap

  • On the security properties of combinatorial all-or-nothing transforms Invited Reviewed International journal

    Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, and Kouichi Sakurai

    Proceedings of 2022 IEEE International Symposium on Information Theory   2022.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Certificate Management Scheme for VANETs Using Blockchain Structure.

    Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai

    Cryptography(Cryptogr.)   6 ( 2 )   20 - 20   2022.6   eISSN:2410-387X

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/cryptography6020020

    Web of Science

    Scopus

    researchmap

  • Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing.

    Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai

    J. Inf. Secur. Appl.   66   103127 - 103127   2022.5   ISSN:2214-2126 eISSN:2214-2134

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jisa.2022.103127

    Web of Science

    Scopus

    researchmap

  • A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity.

    Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai

    Cryptogr.   6 ( 1 )   3 - 3   2022.3   eISSN:2410-387X

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/cryptography6010003

    Web of Science

    Scopus

    researchmap

  • A Privacy-Preserving Data Feed Scheme for Smart Contracts

    WANG Hao, LIU Zhe, GE Chunpeng, SAKURAI Kouichi, SU Chunhua

    IEICE Transactions on Information and Systems   E105.D ( 2 )   195 - 204   2022.2   ISSN:09168532 eISSN:17451361

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>Smart contracts are becoming more and more popular in financial scenarios like medical insurance. Rather than traditional schemes, using smart contracts as a medium is a better choice for both participants, as it is fairer, more reliable, more efficient, and enables real-time payment. However, medical insurance contracts need to input the patient's condition information as the judgment logic to trigger subsequent execution. Since the blockchain is a closed network, it lacks a secure network environment for data interaction with the outside world. The Data feed aims to provide the service of the on-chain and off-chain data interaction. Existing researches on the data feed has solved the security problems on it effectively, such as Town Crier, TLS-N and they have also taken into account the privacy-preserving problems. However, these schemes cannot actually protect privacy because when the ciphertext data is executed by the contract, privacy information can still be inferred by analyzing the transaction results, since states of the contract are publicly visible. In this paper, based on zero-knowledge proof and Hawk technology, a on-and-off-chain complete smart contract data feed privacy-preserving scheme is proposed. In order to present our scheme more intuitively, we combined the medical insurance compensation case to implement it, which is called MIPDF. In our MIPDF, the patient and the insurance company are parties involved in the contract, and the hospital is the data provider of data feed. The patient's medical data is sent to the smart contract under the umbrella of the zero-knowledge proof signature scheme. The smart contract verifies the proof and calculates the insurance premium based on the judgment logic. Meanwhile, we use Hawk technology to ensure the privacy of on-chain contract execution, so that no information will be disclosed due to the result of contract execution. We give a general description of our scheme within the Universal Composability (UC) framework. We experiment and evaluate MIPDF on Ethereum for in-depth analysis. The results show that our scheme can securely and efficiently support the functions of medical insurance and achieve complete privacy-preserving.</p>

    DOI: 10.1587/transinf.2021bci0001

    Web of Science

    Scopus

    CiNii Research

    researchmap

  • Tree Parity Machine-Based Symmetric Encryption: A Hybrid Approach

    Meraouche, I; Dutta, S; Tan, H; Sakurai, K

    MATHEMATICS AND COMPUTING, ICMC 2022   415   61 - 73   2022   ISSN:2194-1009 ISBN:978-981-19-9309-1

     More details

    Publisher:Springer Proceedings in Mathematics and Statistics  

    In a symmetric key encryption the sender and the receiver must possess the same pre-distributed key in order to encrypt or decrypt the exchanged messages. Exchanging symmetric keys is a challenging issue in cryptography. In this paper, we put forward a symmetric key encryption technique that does not require any common pre-shared “knowledge” between the parties. More specifically, we use a type of neural network called Tree Parity Machines (TPMs) which, when synchronized, enable two parties to reach a common state. The common state can be used to establish a common secret key. Our method makes use of the Tree Parity Machines to reach a common state between the parties communicating and encrypt the communications with an ElGamal-type encryption methodology. The advantage of our implementation is that the initial key exchange method is fast, lightweight and believed to become a post-quantum candidate. We have analyzed the randomness of the produced ciphertexts from our system using NIST randomness tests and the results are included in the paper. We also demonstrate security against chosen plaintext attacks.

    DOI: 10.1007/978-981-19-9307-7_6

    Web of Science

    Scopus

  • Towards the Design of Locally Differential Private Hardware System for Edge Computing

    Taguchi, K; Sakurai, K; Iida, M

    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING, CANDAR   186 - 191   2022   ISSN:2379-1888 ISBN:978-1-6654-7530-3

     More details

    Publisher:Proceedings - 2022 10th International Symposium on Computing and Networking, CANDAR 2022  

    A challenging issue for edge computing is how to correct meaningful information from sensor data while keeping the privacy of the data and individuals. One approach is given by the recent work [Choi et al. 'Guaranteeing Local Differential Privacy on Ultra-Low-Power Systems' 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)]. They point out that low resolution and fixed point characteristics of Ultra-Low-Power implementations may break privacy guarantees due to the low quality of noising. For overcoming this weakness, they introduce the techniques of resampling and thresholding. They also implemented in hardware to show the proposed method achieves both low overhead and high utility while keeping local differential privacy, with sensor/IoT benchmarks. Whereas, this research show some flaw in the existing work above and improve the method. We give the case in which infinite privacy loss still occurs because of low resolution even though the width of the output distribution is restricted, which was not investigated yet by the original paper of ISCA2018. Our major contribution is to propose an improvement to avoid privacy loss from low resolution and to enhance privacy protection in this circuit. Furthermore, we report the experimental results with software simulations, which guarantees the utility of our improving method. Finally, we discuss the power and limitation of our improved method with future challenging issues.

    DOI: 10.1109/CANDAR57322.2022.00033

    Web of Science

    Scopus

  • Decentralized and Collaborative Tracing for Group Signatures.

    Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai

    AsiaCCS   1258 - 1260   2022   ISBN:978-1-4503-9140-5

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3488932.3527295

    Web of Science

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/asiaccs/asiaccs2022.html#PereraNHYCS22

  • A Systematic Study of Bulletin Board and Its Application.

    Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai

    AsiaCCS   1213 - 1215   2022   ISBN:978-1-4503-9140-5

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/3488932.3527280

    Web of Science

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/asiaccs/asiaccs2022.html#SuwitoTSDTUS22

  • On the Information-theoretic Security of Combinatorial All-or-nothing Transforms.

    Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai

    CoRR   abs/2202.10280   2022

     More details

    All-or-nothing transforms (AONT) were proposed by Rivest as a message
    preprocessing technique for encrypting data to protect against brute-force
    attacks, and have numerous applications in cryptography and information
    security. Later the unconditionally secure AONT and their combinatorial
    characterization were introduced by Stinson. Informally, a combinatorial AONT
    is an array with the unbiased requirements and its security properties in
    general depend on the prior probability distribution on the inputs $s$-tuples.
    Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has
    perfect security provided that all the inputs $s$-tuples are equiprobable, and
    has weak security provided that all the inputs $s$-tuples are with non-zero
    probability.
    This paper aims to explore on the gap between perfect security and weak
    security for combinatorial $(t,s,v)$-AONTs. Concretely, we consider the typical
    scenario that all the $s$ inputs take values independently (but not necessarily
    identically) and quantify the amount of information
    $H(\mathcal{X}|\mathcal{Y})$ about any $t$ inputs $\mathcal{X}$ that is not
    revealed by any $s-t$ outputs $\mathcal{Y}$. In particular, we establish the
    general lower and upper bounds on $H(\mathcal{X}|\mathcal{Y})$ for
    combinatorial AONTs using information-theoretic techniques, and also show that
    the derived bounds can be attained in certain cases. Furthermore, the
    discussions are extended for the security properties of combinatorial
    asymmetric AONTs.

    arXiv

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/corr/corr2202.html#abs-2202-10280

  • Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing

    Meraouche, I; Dutta, S; Mohanty, SK; Agudo, I; Sakurai, K

    IEEE ACCESS   10   121329 - 121339   2022   ISSN:2169-3536

     More details

    Publisher:IEEE Access  

    Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. The encryption has been proven weak at first but many follow up works have shown that the neural networks can be made to learn the One Time Pad (OTP) and produce perfectly secure ciphertexts. To the best of our knowledge, existing works only considered communications between two or three parties. In this paper, we show how multiple neural networks in an adversarial setup can remotely synchronize and establish a perfectly secure communication in the presence of different attackers eavesdropping their communication. As an application, we show how to build Secret Sharing Scheme based on this perfectly secure multi-party communication. The results show that it takes around 45,000 training steps for 4 neural networks to synchronize and reach equilibria. When reaching equilibria, all the neural networks are able to communicate between each other and the attackers are not able to break the ciphertexts exchanged between them.

    DOI: 10.1109/ACCESS.2022.3223430

    Web of Science

    Scopus

  • Handling class Imbalance problem in Intrusion Detection System based on deep learning.

    Mariama Mbow, Hiroshi Koide, Kouichi Sakurai

    Int. J. Netw. Comput.   12 ( 2 )   467 - 492   2022

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc12.html#MbowKS22

  • Handling class Imbalance problem in Intrusion Detection System based on deep learning

    Mbow Mariama, Koide Hiroshi, Sakurai Kouichi

    International Journal of Networking and Computing   12 ( 2 )   467 - 492   2022   ISSN:21852839 eISSN:21852847

     More details

    Language:English   Publisher:IJNC Editorial Committee  

    Network intrusion detection system(NIDS) is the most used tool to detect malicious network activities. The NIDS has achieved in the recent years promising results for detecting known and novel attacks, with the adoption of deep learning. However, these NIDSs still have shortcomings. Most of the datasets used for NIDS are highly imbalanced, where the number of samples that belong to normal traffic is much larger than the attack traffic. The problem of imbalanced class skews the results. It limits the deep learning classifier’s performance for minority classes by misleading the classifier to be biased in favor of the majority class. To improve the detection rate for minority classes while ensuring efficiency, this study proposes a hybrid approach to handle the imbalance problem. This hybrid approach is a combination of oversampling with Synthetic Minority Over-Sampling (SMOTE) and Tomek link, an under-sampling method to reduce noise. Additionally, this study uses two deep learning models such as Long Short-Term Memory Network (LSTM) and Convolutional Neural Network (CNN) to provide a better intrusion detection system. The advantage of our proposed model is tested in NSL-KDD, CICIDS2017 datasets. In addition, we evaluate the method in the most recent intrusion detection dataset, CICIDS2018 dataset. We use 10-fold cross validation in this work to train the learning models and an independent test set for evaluation. The experimental results show that in the multi-class classification with NSLKDD dataset, the proposed model reached an overall accuracy and Fscore of 99% and 99.0.2% respectively on LSTM, an overall accuracy and Fscore of 99.70% and 99.27% respectively for CNN. And with CICIDS2017 an overall ac- curacy and Fscore of 99.65% and 98 % respectively on LSTM, an overall accuracy and Fscore of 99.85% and 98.98% respectively for CNN. In CICIDS2018 the proposed method achieved an overall detection rate and Fscore of 95% and 94% respectively.

    DOI: 10.15803/ijnc.12.2_467

    CiNii Research

  • Federated Learning with Clustering-Based Participant Selection for IoT Applications

    Wang K.I.K., Ye X., Sakurai K.

    Proceedings - 2022 IEEE International Conference on Big Data, Big Data 2022   6830 - 6831   2022   ISBN:9781665480451

     More details

    Publisher:Proceedings - 2022 IEEE International Conference on Big Data, Big Data 2022  

    Modern Internet of Things (IoT) systems are highly complex due to its mobile, ad-hoc and geographically distributed nature. Very often, an edge-cloud infrastructure is established to offer intelligent services in modern IoT systems. However, IoT edge devices are typically resource-constrained and can not perform sophisticated machine learning algorithm on board. Data sharing with a central server is a common approach of crowdsourcing, but also brings privacy and security concerns. The emerging federated learning offers a promising pathway to achieve an accurate model through distributed machine learning while ensuring data privacy. The existing federated learning process is not tailored to the mobile and adhoc nature of IoT systems where devices are of varying data and system qualities and may not be able to participate the entire training process. Therefore, in this paper, a new federated learning framework is proposed to support asynchronous model fusion with clustering-based participant selection. The proposed framework aims to accommodate the ad-hoc nature of IoT devices, and at the same time avoiding low quality or even malicious data from its participants to ensure model convergence and performance.

    DOI: 10.1109/BigData55660.2022.10020575

    Scopus

  • Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions

    Ikebe, K; Sakurai, K

    PROCEEDINGS OF 2022 4TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2022   54 - 61   2022   ISBN:978-1-4503-9662-2

     More details

    Publisher:ACM International Conference Proceeding Series  

    When trading cryptocurrencies, mining is the process of searching for a solution to a computationally difficult problem. Due to the nature of the search, the time required for mining is subject to fluctuations. This is undesirable from the standpoint of security. In order to reduce the variance of mining time, we implemented the multiple concatenation mining method proposed in existing research and evaluated its performance. Although the results differ from theoretical values, the effect of small variance was confirmed.

    DOI: 10.1145/3559795.3559803

    Web of Science

    Scopus

  • Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.

    Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai

    Information Security Practice and Experience - 17th International Conference(ISPEC)   13620   554 - 572   2022   ISSN:0302-9743 ISBN:978-3-031-21279-6 eISSN:1611-3349

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-031-21280-2_31

    Web of Science

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ispec/ispec2022.html#PereraNMYS22

  • ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022

    AsiaCCS   2022   ISBN:9781450391405

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3488932

    researchmap

  • Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining

    Kei, I; Sakurai, K

    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW   380 - 383   2022   ISBN:978-1-6654-7532-7

     More details

    Publisher:Proceedings - 2022 10th International Symposium on Computing and Networking Workshops, CANDARW 2022  

    Cryptocurrency involves the search for a solution to a computationally difficult problem when conducting transactions. This is called mining, and by its nature, the time required for mining can vary significantly. This is undesirable from a security perspective. Existing research has proposed mining using graph cliques and methods for linking multiple mines with the aim of reducing the variance in mining time. In this study, we evaluated and implemented the possibility of further reducing the variance of mining time by combining the existing studies. The results showed that the combination of the two methods was more effective than conventional mining and existing research to achieve small variance.

    DOI: 10.1109/CANDARW57323.2022.00089

    Web of Science

    Scopus

  • Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey Reviewed

    Mariama Mbow, Kouichi Sakurai, Hiroshi Koide

    Communications in Computer and Information Science   1680   196 - 212   2022   ISSN:1865-0929 ISBN:978-981-19-7768-8 eISSN:1865-0937

     More details

    Language:English   Publishing type:Part of collection (book)   Publisher:Springer Nature Singapore  

    DOI: 10.1007/978-981-19-7769-5_15

    Web of Science

    Scopus

    researchmap

  • A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem

    Ghatak, D; Sakurai, K

    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS   1680   167 - 180   2022   ISSN:1865-0929 ISBN:978-981-19-7768-8 eISSN:1865-0937

     More details

    Publisher:Communications in Computer and Information Science  

    Sharing microdata is a very important part of the present day world, but when they contain sensitive information, privacy to individuals needs to be guaranteed before release of data. One idea is to study the distributional properties of a data-set and generate synthetic data which has similar properties but unlike the original data comes with a privacy guarantee. In this review paper, we describe in detail, some advanced privacy guarantees that needs to be checked before release of such information. Also, we discuss some utility metrics to measure the remaining utility of released data. Very few mechanisms have been developed to ensure utility to synthetic data, provided a very strong privacy guarantee is maintained. We discuss some existing methodologies on privacy preserving synthetic data generation and discuss a privacy utility tradeoff problem.

    DOI: 10.1007/978-981-19-7769-5_13

    Web of Science

    Scopus

  • A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100.

    Jong-Yeon Park, Yong-Hyuk Moon, Won-Il Lee, Sung-Hyun Kim, Kouichi Sakurai

    IEEE Access   10   2546 - 2563   2022   ISSN:2169-3536

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2021.3138807

    Web of Science

    Scopus

    researchmap

  • A Survey of Software Clone Detection From Security Perspective Reviewed International journal

    #Haibo Zhang @Kouichi Sakurai

    IEEE Access 9: 48157-48173 (2021)   2021.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2021.3065872

    Other Link: https://ieeexplore.ieee.org/document/9378511

  • Deniable Secret Handshake Protocol - Revisited

    Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019 Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019   1266 - 1278   2020.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-030-15032-7_106

  • Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features Reviewed

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    Electronics (Switzerland)   9 ( 1 )   2020.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/electronics9010144

  • Classification of Malicious Domains by Their LIFETIME

    Daiji Hara, Kouichi Sakurai, Yasuo Musashi

    Lecture Notes on Data Engineering and Communications Technologies   334 - 341   2020.1

     More details

    Language:English  

    DOI: 10.1007/978-3-030-39746-3_35

  • Blockchain for IoT-Based Digital Supply Chain A Survey

    Haibo Zhang, Kouichi Sakurai

    Lecture Notes on Data Engineering and Communications Technologies   564 - 573   2020.1

     More details

    Language:English  

    DOI: 10.1007/978-3-030-39746-3_57

  • 3-Party Adversarial Cryptography

    Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai

    Lecture Notes on Data Engineering and Communications Technologies   247 - 258   2020.1

     More details

    Language:English  

    DOI: 10.1007/978-3-030-39746-3_27

  • Simulation of Secure Volunteer Computing by Using Blockchain

    Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019 Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019   883 - 894   2020.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-030-15032-7_74

  • Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019 Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019   458 - 469   2020.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-030-15032-7_39

  • BCC'19 chairs' welcome Reviewed

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    3rd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2019, held in conjunction with the 14th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019   III   2019.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • RSA public keys with inside structure Proofs of key generation and identities for web-of-trust Reviewed

    Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

    Journal of Information Security and Applications   45   10 - 19   2019.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jisa.2018.12.006

  • RSA public keys with inside structure Proofs of key generation and identities for web-of-trust Reviewed

    Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

    Journal of Information Security and Applications   45   10 - 19   2019.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jisa.2018.12.006

  • Attacking convolutional neural network using differential evolution Reviewed

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    IPSJ Transactions on Computer Vision and Applications   11 ( 1 )   2019.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1186/s41074-019-0053-3

  • Analysis of variance of graph-clique mining for scalable proof of work

    Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai

    14th International Conference on Information Security and Cryptology, Inscrypt 2018 Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers   101 - 114   2019.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-030-14234-6_6

  • Universal Rules for Fooling Deep Neural Networks based Text Classification Reviewed

    Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi

    IEEE Congress on Evolutionary Computation(CEC)   2221 - 2228   2019.1

     More details

    Language:Others   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CEC.2019.8790213

  • Attacking convolutional neural network using differential evolution Reviewed

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    IPSJ Transactions on Computer Vision and Applications   11 ( 1 )   1   2019

     More details

    Language:Others   Publishing type:Research paper (scientific journal)  

  • A new design for evaluating moving target defense system

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   561 - 563   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00111

  • Tracing MIRAI malware in networked system

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   534 - 538   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00104

  • Suppressing chain size of blockchain-based information sharing for swarm robotic systems

    Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   524 - 528   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00102

  • Proof of disease A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

    Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai

    4th IEEE SmartWorld, 15th IEEE International Conference on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018 Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018   257 - 262   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SmartWorld.2018.00079

  • Neural cryptography based on the topology evolving neural networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   472 - 478   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00091

  • Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   223 - 227   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00049

  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   417 - 423   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00083

  • A new design for evaluating moving target defense system

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   561 - 563   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00111

  • Tracing MIRAI malware in networked system

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   534 - 538   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00104

  • Suppressing chain size of blockchain-based information sharing for swarm robotic systems

    Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   524 - 528   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00102

  • Proof of disease A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

    Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai

    4th IEEE SmartWorld, 15th IEEE International Conference on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018 Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018   257 - 262   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SmartWorld.2018.00079

  • Neural cryptography based on the topology evolving neural networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   472 - 478   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00091

  • Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   223 - 227   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00049

  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   417 - 423   2018.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDARW.2018.00083

  • Feature selection for machine learning-based early detection of distributed cyber attacks

    Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai

    16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018 Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018   181 - 186   2018.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00040

  • Feature selection for machine learning-based early detection of distributed cyber attacks

    Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai

    16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018 Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018   181 - 186   2018.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00040

  • Active attack against oblivious RAM

    Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai

    32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018 Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018   744 - 751   2018.8

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AINA.2018.00112

  • Lightweight Classification of IoT Malware Based on Image Recognition

    Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Sgandurra Daniele, Yaokai Feng, Kouichi Sakurai

    42nd IEEE Computer Software and Applications Conference, COMPSAC 2018 Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018   664 - 669   2018.6

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/COMPSAC.2018.10315

  • Light Weight Write Mechanism for Cloud Data Reviewed

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TPDS.2017.2782253

  • Light Weight Write Mechanism for Cloud Data Reviewed

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TPDS.2017.2782253

  • BCC'18 chairs' welcome Reviewed

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2018 BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018   iii   2018.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Light Weight Write Mechanism for Cloud Data Reviewed

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TPDS.2017.2782253

  • BCC'18 chairs' welcome Reviewed

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2018 BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018   iii   2018.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Effectively Protect Your Privacy Enabling Flexible Privacy Control on Web Tracking

    Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   533 - 536   2018.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2017.26

  • Attacking Convolutional Neural Network using Differential Evolution Reviewed

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    CoRR   abs/1804.07062   2018.4

     More details

    Language:Others  

  • Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

    Xiang You, Yaokai Feng, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   2018-January   522 - 528   2018.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2017.93

  • Effectively Protect Your Privacy Enabling Flexible Privacy Control on Web Tracking

    Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   533 - 536   2018.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2017.26

  • Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

    Xiang You, Yaokai Feng, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   2018-January   522 - 528   2018.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2017.93

  • Lightweight Classification of IoT Malware based on Image Recognition Reviewed

    Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai

    Proceedings - International Computer Software and Applications Conference   2   664 - 669   2018.2

     More details

    Language:Others  

    DOI: 10.1109/COMPSAC.2018.10315

  • Preface Reviewed

    Debdas Ghosh, Debasis Giri, R. N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh

    4th International Conference on Mathematics and Computing, ICMC 2018 Communications in Computer and Information Science   834   IX - X   2018.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Light weight and fine-grained access mechanism for secure access to outsourced data* Reviewed

    Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    Concurrency Computation   2018.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/cpe.4736

  • A New Design for Evaluating Moving Target Defense System

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   561 - 563   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Tracing MIRAI Malware in Networked System

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   534 - 538   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Neural Cryptography Based on the Topology Evolving Neural Networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   472 - 478   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Lightweight classification of IoT malware based on image recognition

    Jiawei Su, Vargas Danilo Vasconcellos, Sanjiva Prasad, Sgandurra Daniele, Yaokai Feng, Kouichi Sakurai

    2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)   2   664 - 669   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   223 - 227   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • A New Design for Evaluating Moving Target Defense System

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   561 - 563   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Tracing MIRAI Malware in Networked System

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   534 - 538   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Neural Cryptography Based on the Topology Evolving Neural Networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   472 - 478   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Lightweight classification of IoT malware based on image recognition

    Jiawei Su, Vargas Danilo Vasconcellos, Sanjiva Prasad, Sgandurra Daniele, Yaokai Feng, Kouichi Sakurai

    2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)   2   664 - 669   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   223 - 227   2018

     More details

    Language:Others   Publishing type:Research paper (other academic)  

  • Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies magneto optic sensors Reviewed

    Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai

    Concurrency Computation Practice and Experience   29 ( 23 )   2017.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/cpe.4017

  • Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors Reviewed

    Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE   29 ( 23 )   2017.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/cpe.4017

  • Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions Reviewed

    Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai

    Journal of Supercomputing   73 ( 10 )   4275 - 4301   2017.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s11227-017-2009-7

  • One pixel attack for fooling deep neural networks Reviewed

    Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi

    IEEE Trans. Evol. Comput.   23 ( 5 )   828 - 841   2017.10

     More details

    Language:Others   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TEVC.2019.2890858

  • Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions Reviewed

    Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai

    JOURNAL OF SUPERCOMPUTING   73 ( 10 )   4275 - 4301   2017.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s11227-017-2009-7

  • A new security middleware architecture based on fog computing and cloud to support IoT constrained devices Reviewed

    Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai

    ACM International Conference Proceeding Series   2017.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3109761.3158413

  • Secure and light weight fine-grained access mechanism for outsourced data

    Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017   201 - 209   2017.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.238

  • Bitcoin Block Withholding Attack Analysis and Mitigation Reviewed

    Samiran Bag, Sushmita Ruj, Kouichi Sakurai

    IEEE Transactions on Information Forensics and Security   12 ( 8 )   1967 - 1978   2017.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TIFS.2016.2623588

  • Bitcoin Block Withholding Attack: Analysis and Mitigation Reviewed

    Samiran Bag, Sushmita Ruj, Kouichi Sakurai

    IEEE Transactions on Information Forensics and Security   12 ( 8 )   1967 - 1978   2017.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TIFS.2016.2623588

  • Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 Reviewed International journal

    Ryosuke MIYAZAKI, Junpei Kawamoto, Shinichi MATSUMOTO, Kouichi Sakurai

    2017 International Conference on Information Networking (ICOIN)   2017.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: DOI: 10.1109/ICOIN.2017.7899511

    Other Link: http://ieeexplore.ieee.org/document/7899511/authors

  • BCC'17 chairs' Welcome Reviewed

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    BCC 2017 - Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, co-located with ASIA CCS 2017   iii   2017.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Host independent and distributed detection system of the network attack by using OpenFlow

    Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai

    31st International Conference on Information Networking, ICOIN 2017 31st International Conference on Information Networking, ICOIN 2017   236 - 241   2017.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ICOIN.2017.7899511

  • Comments and improvements of 'HOTA Handover optimized ticket-based authentication in network-based mobility management'

    Mojtaba Alizadeh, Mohammad Hessam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017 Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017   112 - 116   2017.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ICIN.2017.7899399

  • A traceable signcryption scheme for secure sharing of data in cloud storage

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    16th IEEE International Conference on Computer and Information Technology, CIT 2016 Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016   524 - 531   2017.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CIT.2016.52

  • A Brief Review on Anomaly Detection and its Applications to Cybersecurity (情報通信システムセキュリティ)

    116 ( 522 )   37 - 42   2017.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A behavior-based online engine for detecting distributed cyber-attacks

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai

    17th International Workshop on Information Security Applications, WISA 2016 Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers   10144 LNCS   79 - 89   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-56549-1_7

  • A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing Reviewed

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    COMPUTERS & ELECTRICAL ENGINEERING   57   241 - 256   2017.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.compeleceng.2016.11.028

  • SQL injection attack detection method using expectation criterion

    Linghuan Xiao, Shinichi Matsumoto, Tomohisa Ishikawa, Kouichi Sakurai

    4th International Symposium on Computing and Networking, CANDAR 2016 Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016   649 - 654   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2016.74

  • Parameter manipulation attack prevention and detection by using web application deception proxy

    Tomohisa Ishikawa, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3022227.3022300

  • On unconditionally binding code-based commitment schemes

    Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3022227.3022327

  • Improving the accuracy of signature authentication using the eight principles of yong

    Taku Nishigori, Junpei Kawamoto, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3022227.3022258

  • Evasion attacks against statistical code obfuscation detectors

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    12th International Workshop on Security, IWSEC 2017 Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings   10418 LNCS   121 - 137   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-64200-0_8

  • C&C session detection using random forest

    Liang Lu, Yaokai Feng, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3022227.3022260

  • A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing Reviewed

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    Computers and Electrical Engineering   57   241 - 256   2017.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.compeleceng.2016.11.028

  • A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

    Tomohisa Ishikawa, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3022227.3022240

  • A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai

    10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017 Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings   461 - 473   2017.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-72389-1_37

  • On the robustness of visual cryptographic schemes

    Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai

    15th International Workshop on Digital-Forensics and Watermarking, IWDW 2016 Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers   10082 LNCS   251 - 262   2017

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-53465_719

  • A Brief Review on Anomaly Detection and its Applications to Cybersecurity (\情\報\通\信\シ\ス\テ\ム\セ\キ\ュ\リ\テ\

    \電\子\情\報\通\信\学\会\技\術\研\究\報\ IEICE technical report: \信\学\技\報   116 ( 522 )   37 - 42   2017

     More details

    Language:Others   Publishing type:Research paper (scientific journal)  

  • A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

    Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

    11th Asia Joint Conference on Information Security, AsiaJCIS 2016 Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016   80 - 86   2016.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AsiaJCIS.2016.24

  • An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    11th Asia Joint Conference on Information Security, AsiaJCIS 2016 Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016   39 - 47   2016.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AsiaJCIS.2016.23

  • A proposal for cyber-attack trace-back using packet marking and logging

    Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

    10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016   603 - 607   2016.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2016.89

  • A behavior-based method for detecting DNS amplification attacks

    Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

    10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016   608 - 613   2016.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2016.88

  • Cyberbullying detection using parent-child relationship between comments

    Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai

    18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings   Part F126325   325 - 334   2016.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3011141.3011182

  • Cyberbullying detection using parent-child relationship between comments Reviewed

    Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai

    ACM International Conference Proceeding Series   325 - 334   2016.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/3011141.3011182

  • Character-based symmetric searchable encryption and its implementation and experiment on mobile devices Reviewed

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    Security and Communication Networks   9 ( 12 )   1717 - 1725   2016.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/sec.876

  • Character-based symmetric searchable encryption and its implementation and experiment on mobile devices Reviewed

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    Security and Communication Networks   9 ( 12 )   1717 - 1725   2016.8

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1002/sec.876

  • Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

    Yoshifumi Ueshige, Kouichi Sakurai

    30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016 Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016   2016-May   769 - 775   2016.5

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AINA.2016.97

  • Message from the STPA 2016 Workshop Organizers Reviewed

    Kouichi Sakurai, Amiya Nayak, Sushmita Ruj, Haojin Zhu, Arindam Pal

    Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016   lxviii   2016.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/WAINA.2016.215

  • A multivariate encryption scheme with Rainbow Reviewed

    Takanori Yasuda, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9543   236 - 251   2016.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-29814-6_19

  • Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

    Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura

    3rd International Symposium on Computing and Networking, CANDAR 2015 Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015   457 - 462   2016.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2015.68

  • Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    3rd International Symposium on Computing and Networking, CANDAR 2015 Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015   477 - 483   2016.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2015.28

  • A multivariate encryption scheme with Rainbow Reviewed

    Takanori Yasuda, Kouichi Sakurai

    Lecture Notes in Computer Science   9543   236 - 251   2016.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/978-3-319-29814-6_19

  • Authentication in mobile cloud computing A survey Reviewed

    Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baaaharun, Kouichi Sakurai

    Journal of Network and Computer Applications   61   59 - 80   2016.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jnca.2015.10.005

  • Authentication in mobile cloud computing: A survey. 59-80 Reviewed International journal

    Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, Kouichi Sakurai

    Journal of Network and Computer Applications   59 - 80   2016.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/10.1016/j.jnca.2015.10.005

    Other Link: http://www.sciencedirect.com/science/article/pii/S1084804515002258

  • Retricoin: Bitcoin based on compact proofs of retrievability Reviewed

    Binanda Sengupta, Samiran Bag, Kouichi Sakurai, Sushmita Ruj

    ACM International Conference Proceeding Series   04-07-   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2833312.2833317

  • Cross-group secret sharing for secure cloud storage service Reviewed

    Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai

    ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2857546.2857610

  • A study of security management with cyber insurance Reviewed

    Tomohisa Ishikawa, Kouichi Sakurai

    ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2857546.2857615

  • Yet another note on block withholding attack on bitcoin mining pools

    Samiran Bag, Kouichi Sakurai

    19th Annual International Conference on Information Security, ISC 2016 Information Security - 19th International Conference, ISC 2016, Proceedings   9866 LNCS   167 - 180   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-45871-7_11

  • Retricoin Bitcoin based on compact proofs of retrievability

    Binanda Sengupta, Samiran Bag, Kouichi Sakurai, Sushmita Ruj

    17th International Conference on Distributed Computing and Networking, ICDCN 2016 Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016   04-07-January-2016   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2833312.2833317

  • On the application of clique problem for proof-of-work in cryptocurrencies

    Samiran Bag, Sushmita Ruj, Kouichi Sakurai

    11th International Conference on Information Security and Cryptology, Inscrypt 2015 Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers   260 - 279   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-38898-4_16

  • Expressive rating scheme by signatures with predications on ratees

    Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai

    10th International Conference on Network and System Security, NSS 2016 Network and System Security - 10th International Conference, NSS 2016, Proceedings   9955 LNCS   363 - 379   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-46298-1_24

  • Evaluation of gamma ray durability of RF tag and application to the radiation environment

    Nobuyuki Teraura, Kunio Ito, Daisuke Kobayashi, Kouichi Sakurai

    IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015   147 - 152   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/RFID-TA.2015.7379809

  • Efficient threshold secret sharing schemes secure against rushing cheaters

    Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu

    9th International Conference on Information-Theoretic Security, ICITS 2016 Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers   10015 LNCS   3 - 23   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-49175-2_1

  • Cross-group secret sharing for secure cloud storage service

    Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai

    10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016 ACM IMCOM 2016 Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2857546.2857610

  • Computational soundness of uniformity properties for multi-party computation based on LSSS

    Hui Zhao, Kouichi Sakurai

    7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015 Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers   99 - 113   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-31550-8_7

  • CCA-secure keyed-fully homomorphic encryption

    Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng

    19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016 Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings   70 - 98   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-662-49384-7_4

  • Attribute-based two-tier signatures Definition and construction

    Hiroaki Anada, Seiko Arita, Kouichi Sakurai

    18th International Conference on Information Security and Cryptology, ICISC 2015 Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers   9558   36 - 49   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-30840-1_3

  • Application of NTRU using group rings to partial decryption technique

    Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai

    7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015 Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers   9565   203 - 213   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-31550-8_13

  • An analysis of IT assessment security maturity in higher education institution

    Misni Harjo Suwito, Shinchi Matsumoto, Junpei Kawamoto, Dieter Gollmann, Kouichi Sakurai

    International Conference on Information Science and Applications, ICISA 2016 Information Science and Applications, ICISA 2016   376   701 - 713   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-981-10-0557-2_69

  • A study of security management with cyber insurance

    Tomohisa Ishikawa, Kouichi Sakurai

    10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016 ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2857546.2857615

  • Cross-group Secret Sharing for Secure Cloud Storage Service Reviewed International journal

    Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill MOROZOV, Kouichi Sakurai

    ACM IMCOM '16, January 04-06, 2016, Danang, Viet Nam   2016.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: DOI: http://dx.doi.org/10.1145/2857546.2857610

  • Erratum Cryptanalysis and improvement of "A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" (PLoS ONE (2015) 10:11 (e0142716) DOI:10.1371/journal.pone.0142716) Reviewed

    Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroaki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    PLoS One   10 ( 12 )   2015.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1371/journal.pone.0145975

  • Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" Reviewed

    Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    PLOS ONE   10 ( 11 )   2015.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1371/journal.pone.0142716

  • Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" Reviewed

    Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    PLoS One   10 ( 11 )   2015.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1371/journal.pone.0142716

  • A note on the security of KHL scheme Reviewed

    Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai

    Theoretical Computer Science   602   1 - 6   2015.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.tcs.2015.07.051

  • A multivariate quadratic challenge toward post-quantum generation cryptography Reviewed

    Takanori Yasuda, Xavier Dahan, Yun Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai

    ACM Communications in Computer Algebra   49 ( 3 )   105 - 107   2015.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1145/2850449.2850462

  • Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones Reviewed

    Nobuyuki Teraura, Kouichi Sakurai

    2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops   2015.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/NTMS.2015.7266514

  • A multivariate quadratic challenge toward post-quantum generation cryptography Reviewed

    Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai

    ACM Communications in Computer Algebra   49 ( 3 )   105 - 107   2015.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2850449.2850462

  • Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

    Nobuyuki Teraura, Kouichi Sakurai

    7th International Conference on New Technologies, Mobility and Security, NTMS 2015 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops   2015.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/NTMS.2015.7266514

  • Detection of illegal players in massively multiplayer online role playing game by classification algorithms

    Zhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai

    29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015 Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015   2015-April   406 - 413   2015.4

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AINA.2015.214

  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

    Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai

    2015 International Conference on Information Networking, ICOIN 2015 2015 International Conference on Information Networking, ICOIN 2015   2015-January   104 - 109   2015.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ICOIN.2015.7057865

  • Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms. Reviewed International journal

    Zhongqqiang Zhang, Hiroaki Aanada, Junpei Kawamoto, Kouichi Sakurai

    AINA, IEEE Computer Society   2015.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Reviewed International journal

    Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, Kouichi Sakurai

    J. Inf. Sci. Eng.   31 ( 2 )   727 - 742   2015.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units Reviewed

    Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda, Kouichi Sakurai

    Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014   543 - 548   2015.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2014.85

  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

    Satoshi Tanaka, Chen Mou Cheng, Takanori Yasuda, Kouichi Sakurai

    2nd International Symposium on Computing and Networking, CANDAR 2014 Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014   543 - 548   2015.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR.2014.85

  • Message from the workshop/symposium chairs TrustCom 2014 Reviewed

    Yang Xiang, Kouichi Sakurai

    Quaternary International   xx   2015.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TrustCom.2014.141

  • Identity-embedding method for decentralized public-key infrastructure

    Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

    6th International Conference on Trusted Systems, INTRUST 2014 Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers   9473   1 - 14   2015.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-27998-5_1

  • Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

    Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai

    3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015 Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings   9357   255 - 264   2015.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-24315-3_26

  • Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

    Satoshi Tanaka, Chen Mou Cheng, Kouichi Sakurai

    2nd International Conference on Mathematics and Computing, ICMC 2015 Mathematics and Computing - ICMC 2015   139   349 - 361   2015.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-81-322-2452-5_24

  • A note on the security of KHL scheme Reviewed

    Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai

    Theoretical Computer Science   602   1 - 6   2015.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.tcs.2015.07.051

  • Privacy-aware cloud-based input method editor

    Junpei Kawamoto, Kouichi Sakurai

    2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014   209 - 213   2015.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ICCChina.2014.7008273

  • Special section on cryptography and information security Reviewed

    Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E98A ( 1 )   1 - 2   2015.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Securing sensor networks by moderating frequencies

    Pinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai

    10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014 International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers   153   173 - 185   2015.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-23802-9_15

  • Provably secure anonymous authentication scheme for roaming service in global mobility networks Reviewed

    Kuo Yan Wu, Kuo Y. Tsai, Tzong Che Wu, Kouichi Sakurai

    Journal of Information Science and Engineering   31 ( 2 )   727 - 742   2015.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A proposal for detecting distributed cyber-attacks using automatic thresholding

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai

    10th Asia Joint Conference on Information Security, AsiaJCIS 2015 Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015   152 - 159   2015

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AsiaJCIS.2015.22

  • Reconstructing and visualizing evidence of artifact from firefox sessionstorage

    Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai

    15th International Workshop on Information Security Applications, WISA 2014 Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers   8909   83 - 94   2015

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-15087-1_7

  • Plaintext checkable encryption with designated checker Reviewed

    Angsuman Das, Avishek Adhikari, Kouichi Sakurai

    Advances in Mathematics of Communications   9 ( 1 )   37 - 53   2015

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3934/amc.2015.9.37

  • Evaluation of gamma ray durability and its application of shielded RF tags

    Nobuyuki Teraura, Kunio Ito, Daisuke Kobayashi, Kouichi Sakurai

    23rd International Conference on Nuclear Engineering: Nuclear Power - Reliable Global Energy, ICONE 2015 ICONE 2015 - 23rd International Conference on Nuclear Engineering: Nuclear Power - Reliable Global Energy   2015-January   2015

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Evaluation of a zero-watermarking-type steganography Reviewed

    Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai

    Lecture Notes in Computer Science   9023   613 - 624   2015

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/978-3-319-19321-2_47

  • Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units. Reviewed International journal

    Satoshi TANAKA, Chen-Mou CHENG, Takanori YASUDA, Kouichi Sakurai

    CANDAR 2014: 543-548   2014.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones Reviewed

    Nobuyuki Teraura, Kouichi Sakurai

    Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014   252 - 259   2014.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SOCA.2014.17

  • Towards "receipt-freeness" in remote biometric authentication

    Yoshifumi Ueshige, Kouichi Sakurai

    5th International Conference on Emerging Security Technologies, EST 2014 Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014   8 - 12   2014.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/EST.2014.22

  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

    Nobuyuki Teraura, Kouichi Sakurai

    7th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2014 Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014   252 - 259   2014.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SOCA.2014.17

  • A zero-watermarking-like steganography and potential applications

    Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai

    10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014 Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014   459 - 462   2014.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IIH-MSP.2014.121

  • Comparison of access pattern protection schemes and proposals for efficient implementation Reviewed

    Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E97D ( 10 )   2576 - 2585   2014.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2013THP0007

  • Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation Reviewed

    Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E97D ( 10 )   2576 - 2585   2014.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2013THP0007

  • Efficient variant of Rainbow using sparse secret keys Reviewed

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   5 ( 3 )   3 - 13   2014.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Collaborative agglomerative document clustering with limited information disclosure Reviewed International journal

    Chunhua Su, Jianying Zho, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai

    Security and Communication Networks   7 ( 6 )   964 - 978   2014.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Collaborative agglomerative document clustering with limited information disclosure Reviewed

    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai

    SECURITY AND COMMUNICATION NETWORKS   7 ( 6 )   964 - 978   2014.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/sec.811

  • Welcome to ASIACCS 2014! Reviewed

    Trent Jaeger, Kouichi Sakurai, Shiho Moriai

    Quaternary International   iii   2014.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • An enhanced audio ownership protection scheme based on visual cryptography. Reviewed International journal

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    EURASIP J. Information Security   2014.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A parameterless learning algorithm for behavior-based detection

    Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai

    2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014 Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014   11 - 18   2014.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AsiaJCIS.2014.29

  • Security of Multivariate Signature Scheme Using Non-commutative Rings Reviewed

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E97A ( 1 )   245 - 252   2014.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E97.A.245

  • Fast Implementation of KCipher-2 for Software and Hardware Reviewed

    Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E97D ( 1 )   43 - 52   2014.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E97.D.43

  • Survey and new idea for attribute-based identification scheme secure against reset attacks

    Ji Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee Huay Heng, Raphael Phan

    4th International Cryptology and Information Security Conference 2014, Cryptology 2014 Conference Proceedings - Cryptology 2014 Proceedings of the 4th International Cryptology and Information Security Conference 2014   39 - 47   2014.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Security of multivariate signature scheme using non-commutative rings? Reviewed

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E97-A ( 1 )   245 - 252   2014.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E97.A.245

  • Security model and analysis of fhmqv, Revisited

    Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao, Yunlei Zhao

    9th China International Conference on Information Security and Cryptology, Inscrypt 2013 Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers   255 - 269   2014.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-12087-4_16

  • Fast implementation of Kcipher-2 for software and hardware Reviewed

    Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E97-D ( 1 )   43 - 52   2014.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E97.D.43

  • Efficient variant of rainbow without triangular matrix representation

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    2nd IFIP TC5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2014 Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings   8407 LNCS   532 - 541   2014.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-55032-4_55

  • Attribute-based signatures without pairings via the Fiat-Shamir paradigm

    Hiroaki Anada, Seiko Arita, Kouichi Sakurai

    2nd ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2014 ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography   49 - 58   2014.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2600694.2600696

  • An enhanced audio ownership protection scheme based on visual cryptography Reviewed

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    Eurasip Journal on Information Security   2014   2014.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1186/1687-417X-2014-2

  • Acquisition of evidence of web storage in HTML5 web browsers from memory image

    Shinichi Matsumoto, Kouichi Sakurai

    2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014 Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014   148 - 155   2014.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AsiaJCIS.2014.30

  • A Method of Digital Rights Management based on Bitcoin Protocol

    Motoki Kitahara, Junpei Kawamoto, Kouichi Sakurai

    8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014 Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014   2014

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2557977.2558034

  • Implementation of efficient operations over GF(232) using graphics processing units

    Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai

    2nd IFIP TC5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2014 Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings   8407 LNCS   602 - 611   2014

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-55032-4_62

  • Fine-grained conditional proxy re-encryption and application

    Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai

    21st International Conference on Neural Information Processing, ICONIP 2014 Provable Security - 8th International Conference, ProvSec 2014, Proceedings   8782   206 - 222   2014

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Fine-grained access control aware multi-user data sharing with secure keyword search Reviewed

    Fangming Zhao, Takashi Nishide, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E97-D ( 7 )   1790 - 1803   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E97.D.1790

  • Collaborative agglomerative document clustering with limited information disclosure Reviewed

    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai

    Security and Communication Networks   7 ( 6 )   964 - 978   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/sec.811

  • An efficient robust secret sharing scheme with optimal cheater resiliency

    Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai

    4th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2014 Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings   8804   47 - 58   2014

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • A competitive three-level pruning technique for information security Reviewed

    Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai

    Communications in Computer and Information Science   490   25 - 32   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/978-3-662-45670-5

  • Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

    Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai

    2013 IEEE 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013 Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013   570 - 574   2013.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/BWCCA.2013.99

  • Exploiting reference images for image splicing verification

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    Digital Investigation, Volume 10   2013.10

     More details

    Language:English  

  • Reliable workflow scheduling with less resource redundancy

    Laiping Zhao, Yizhi Ren, Kouichi Sakurai

    Parallel Computing, Volume 39(10)   2013.10

     More details

    Language:English  

  • Multivariate signature scheme using quadratic forms

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013 Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings   7932 LNCS   243 - 258   2013.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-38616-9_17

  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets

    Yaokai Feng, Yoshiaki Hori, Jun'ichi Takeuchi, Kouichi Sakurai

    Journal of Information Processing, Volume 21   2013.7

     More details

    Language:English  

  • Reliable workflow scheduling with less resource redundancy Reviewed

    Laiping Zhao, Yizhi Ren, Kouichi Sakurai

    Parallel Computing   39 ( 10 )   567 - 585   2013.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.parco.2013.06.003

  • A variant of rainbow with shorter secret key and faster signature generation

    Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai

    1st ACM Workshop on Asia Public-Key Cryptography, AsiaPKC 2013 AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography   57 - 62   2013.5

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2484389.2484401

  • Upper bound of the length of information embedd in RSA public key efficiently

    Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai

    1st ACM Workshop on Asia Public-Key Cryptography, AsiaPKC 2013 AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography   33 - 38   2013.5

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2484389.2484396

  • Efficient implementation for QUAD stream cipher with GPUs Reviewed

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    Computer Science and Information Systems   10 ( 2 SPL )   897 - 911   2013.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.2298/CSIS121102040T

  • Efficient implementation for QUAD stream cipher with GPUs Reviewed

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    Computer Science and Information Systems   10 ( 2 )   897 - 911   2013.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.2298/CSIS121102040T

  • Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance International journal

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    ICT-EurAsia 2013   2013.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Confidentiality of 2D Code using Infrared with Cell-level Error Correction

    Nobuyuki Teraura, Kouichi Sakurai

    International Journal of Interactive Multimedia and Artificial Intelligence, Volume 2   2013.3

     More details

    Language:English  

  • Efficient implementation for QUAD stream cipher with GPUs

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    Computer Science and Information Systems, Volume 10   2013.2

     More details

    Language:English  

  • Botnet command and control based on Short Message Service and human mobility Reviewed

    Jingyu Hua, Kouichi Sakurai

    Computer Networks   57 ( 2 )   579 - 597   2013.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.comnet.2012.06.007

  • Botnet command and control based on Short Message Service and human mobility Reviewed

    Jingyu Hua, Kouichi Sakurai

    Computer Networks   57 ( 2 )   579 - 597   2013.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.comnet.2012.06.007

  • Analysis of methods for detecting compromised nodes and its countermeasures

    Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

    International Conference on IT Convergence and Security, ICITCS 2012 IT Convergence and Security 2012   215 LNEE   53 - 60   2013.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-94-007-5860-5_7

  • Botnet command and control based on Short Message Service and human mobility

    Jingyu Hua, Kouichi Sakurai

    Computer Networks [and ISDN Systems], Volume 57   2013.2

     More details

    Language:English  

  • Evolution of cooperation in reputation system by group-based scheme

    Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai

    The Journal of Supercomputing, Volume 63   2013.1

     More details

    Language:English  

  • Evolution of cooperation in reputation system by group-based scheme Reviewed

    Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai

    Journal of Supercomputing   63 ( 1 )   171 - 190   2013.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s11227-010-0498-8

  • Exploiting reference images for image splicing verification Reviewed

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    Digital Investigation   10 ( 3 )   246 - 258   2013.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.diin.2013.06.014

  • Evolution of cooperation in reputation system by group-based scheme Reviewed

    Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai

    Journal of Supercomputing   63 ( 1 )   171 - 190   2013.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s11227-010-0498-8

  • General Fault Attacks on Multivariate Public Key Cryptosystems

    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions, Volume 96-A   2013.1

     More details

    Language:English  

  • A behavior-based method for detecting distributed scan attacks in darknets Reviewed

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Junnichi Takeuchi

    Journal of Information Processing   21 ( 3 )   527 - 538   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.2197/ipsjjip.21.527

  • The development of radiation-resistant rf TAGS for use at nuclear power plants

    Nobuyuki Teraura, Kunio Ito, Naoki Takahashi, Kouichi Sakurai

    2013 21st International Conference on Nuclear Engineering, ICONE 2013 Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications   1   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1115/ICONE21-16605

  • Supporting secure provenance update by keeping "provenance" of the provenance

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    International Conference on Information and Communication Technology, ICT-EurAsia 2013 Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings   7804 LNCS   363 - 372   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-36818-9_40

  • Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

    Sushmita Ruj, Kouichi Sakurai

    2013 IEEE Global Communications Conference, GLOBECOM 2013 2013 IEEE Global Communications Conference, GLOBECOM 2013   402 - 407   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/GLOCOM.2013.6831104

  • Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

    Laiping Zhao, Kouichi Sakurai

    2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers   367 CCIS   23 - 38   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-319-04519-1_2

  • Image splicing verification based on pixel-based alignment method

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    11th International Workshop on Digital Forensics and Watermaking, IWDW 2012 Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers   7809 LNCS   198 - 212   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-40099-5_17

  • General fault attacks on multivariate public key cryptosystems Reviewed

    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E96-A ( 1 )   196 - 205   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E96.A.196

  • Efficient computing over GF(216) using graphics processing unit

    Satoshi Tanaka, Takanori Yasuda, Bo Yin Yang, Chen Mou Cheng, Kouichi Sakurai

    7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013 Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013   843 - 846   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2013.151

  • Detection of android API call using logging mechanism within android framework

    Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai

    9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013 Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers   127 LNICST   393 - 404   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai

    2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013 Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013   63 - 68   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ASIAJCIS.2013.17

  • DASC 2013 Message from the general chairs Reviewed

    Vincenzo Piuri, Jose M.Alcaraz Calero, Kouichi Sakurai, Yiming Pi

    Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/DASC.2013.7

  • A proposal for the privacy leakage verification tool for android application developers

    Shinichi Matsumoto, Kouichi Sakurai

    7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013 Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013   2013

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2448556.2448610

  • Guest editorial Managing insider security threats (MIST 2012 Volume 1) Reviewed

    Kouichi Sakurai, Dieter Gollmann

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   3 ( 4 )   1 - 3   2012.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Workflow scheduling with fault tolerance

    Laiping Zhao, Kouichi Sakurai

    Network and Traffic Engineering in Emerging Distributed Computing Applications   94 - 123   2012.12

     More details

    Language:English  

    DOI: 10.4018/978-1-4666-1888-6.ch005

  • Revocation and tracing based on ternary tree Towards optimal broadcast encryption scheme

    Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    8th International Joint Conference on e-Business and Telecommunications, ICETE 2011 E-Business and Telecommunications International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers   233 - 248   2012.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-35755-8_17

  • Cryptanalysis of randomized arithmetic codes based on markov model

    Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai

    7th China International Conference on Information Security and Cryptography, Inscrypt 2011 Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers   341 - 362   2012.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-34704-7-24

  • A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks Reviewed

    Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo

    Computer Communications   35 ( 17 )   2125 - 2137   2012.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.comcom.2012.07.006

  • A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks Reviewed

    Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo

    COMPUTER COMMUNICATIONS   35 ( 17 )   2125 - 2137   2012.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.comcom.2012.07.006

  • Providing secure location-aware services for cooperative vehicular Ad Hoc networks Reviewed

    Chul Sur, Youngho Park, Kouichi Sakurai, Kyung Hyune Rhee

    Journal of Internet Technology   13 ( 4 )   631 - 644   2012.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Mixed-strategy game based trust management for clustered wireless sensor networks

    Dong Hao, Avishek Adhikari, Kouichi Sakurai

    3rd International Conference on Trusted Systems, INTRUST 2011 Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers   7222 LNCS   239 - 257   2012.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-32298-3_16

  • On revenue driven server management incloud

    Laiping Zhao, Kouichi Sakurai

    2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science   295 - 305   2012.8

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption Reviewed

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION   17 ( 8 )   3303 - 3327   2012.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.cnsns.2011.12.015

  • On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption Reviewed

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    Communications in Nonlinear Science and Numerical Simulation   17 ( 8 )   3303 - 3327   2012.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.cnsns.2011.12.015

  • Securing provenance of distributed processes in an untrusted environment Reviewed

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E95-D ( 7 )   1894 - 1907   2012.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E95.D.1894

  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Yichao Xu, Kouichi Sakurai

    6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12   2012.5

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2184751.2184815

  • Flexible service selection with user-specific QoS support in service-oriented architecture Reviewed

    Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai

    Journal of Network and Computer Applications   35 ( 3 )   962 - 973   2012.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jnca.2011.03.013

  • Adaptive and composable non-interactive string-commitment protocols

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    7th International Joint Conference on e-Business and Telecommunications, ICETE 2010 e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers   222 CCIS   233 - 242   2012.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25206-8_15

  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    7th International Joint Conference on e-Business and Telecommunications, ICETE 2010 e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers   222 CCIS   274 - 288   2012.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25206-8_18

  • Security analysis of offline E-cash systems with malicious insider Reviewed

    Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   3 ( 1-2 )   55 - 71   2012.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Reducing the key size of rainbow using non-commutative rings

    Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi

    12th Cryptographers' Track at the RSA Conference, CT-RSA 2012 Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings   7178 LNCS   68 - 83   2012.3

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-27954-6_5

  • A finite equivalence of verifiable multi-secret sharing Reviewed

    Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang

    International Journal of Computational Intelligence Systems   5 ( 1 )   1 - 12   2012.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1080/18756891.2012.670517

  • A behavior-based detection method for outbreaks of low-rate attacks

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Junnichi Takeuchi

    2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012   267 - 272   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SAINT.2012.50

  • Weakness of provably secure searchable encryption against frequency analysis

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    5th Mosharaka International Conference on Communications, Computers and Applications, MIC-CCA 2012 Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012   142 - 147   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Secure keyword search using bloom filter with specified character positions

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    6th International Conference on Provable Security, ProvSec 2012 Provable Security - 6th International Conference, ProvSec 2012, Proceedings   7496 LNCS   235 - 252   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-33272-2_15

  • Proposal of the hierarchical file server groups for implementing mandatory access control

    Taketoshi Sakuraba, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   639 - 644   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2012.129

  • Preventing the access of fraudulent WEB sites by using a special two-dimensional code

    Nobuyuki Teraura, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   645 - 650   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2012.57

  • Multi-user keyword search scheme for secure data sharing with fine-grained access control

    Fangming Zhao, Takashi Nishide, Kouichi Sakurai

    14th International Conference on Information Security and Cryptology, ICISC 2011 Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers   7259 LNCS   406 - 418   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-31912-9_27

  • Message from ISSR-2012 workshop chairs Reviewed

    Kouichi Sakurai, Lizhe Wang, Ei Sayed M Ei-Alfy

    Quaternary International   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TrustCom.2012.311

  • Information hiding of two-dimensional code by multi-layer optical

    Nobuyuki Teraura, Kouichi Sakurai

    2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012 Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012   770 - 777   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ISPA.2012.113

  • Information hiding in subcells of a two-dimensional code

    Nobuyuki Teraura, Kouichi Sakurai

    1st IEEE Global Conference on Consumer Electronics, GCCE 2012 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012   652 - 656   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/GCCE.2012.6379943

  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Satoshi Tanaka, Tung Chou, Bo Yin Yang, Chen Mou Cheng, Kouichi Sakurai

    13th International Workshop on Information Security Applications, WISA 2012 Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers   7690 LNCS   28 - 42   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Efficient implementation of evaluating multivariate quadratic system with GPUs

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   660 - 664   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2012.139

  • Differential fault analysis of full lblock

    Liang Zhao, Takashi Nishide, Kouichi Sakurai

    3rd International Workshop, Constructive Side-Channel Analysis and Secure Design, COSADE 2012 Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings   7275 LNCS   135 - 150   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-29912-4_11

  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai

    26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012   766 - 771   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/WAINA.2012.175

  • Collaborative behavior visualization and its detection by observing darknet traffic

    Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai

    4th International Symposium on Cyberspace Safety and Security, CSS 2012 Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings   7672 LNCS   212 - 226   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-35362-8_17

  • Barrier A lightweight hypervisor for protecting kernel integrity via memory isolation

    Jingyu Hua, Kouichi Sakurai

    27th Annual ACM Symposium on Applied Computing, SAC 2012 27th Annual ACM Symposium on Applied Computing, SAC 2012   1470 - 1477   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/2245276.2232011

  • Application of scalar multiplication of edwards curves to pairing-based cryptography

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    7th International Workshop on Security, IWSEC 2012 Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings   7631 LNCS   19 - 36   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-34117-5-2

  • Analytic hierarchy process aided key management schemes evaluation in wireless sensor network Reviewed

    Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    Journal of Networks   7 ( 1 )   88 - 100   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.4304/jnw.7.1.88-100

  • Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

    Chunhua Su, Guilin Wang, Kouichi Sakurai

    11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012   1012 - 1017   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/TrustCom.2012.87

  • An image splicing detection based on interpolation analysis

    Rimba W. Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    13th Pacific-Rim Conference on Multimedia, PCM 2012 Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings   7674 LNCS   390 - 401   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-34778-8_36

  • A method for embedding secret key information in RSA public key and its application

    Motoki Kitahara, Takashi Nishide, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   665 - 670   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2012.123

  • A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

    Dong Hao, Kouichi Sakurai

    26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012 Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012   495 - 502   2012

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AINA.2012.84

  • A security analysis of uniformly-layered rainbow Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Takanori Yasuda, Kouichi Sakurai

    4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011 Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings   7071 LNCS   275 - 294   2011.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25405-5_18

  • Towards countermeasure of insider threat in network security

    Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai

    3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011 Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011   634 - 636   2011.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/INCoS.2011.156

  • Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

    Takashi Nishide, Kouichi Sakurai

    3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011 Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011   656 - 661   2011.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/INCoS.2011.146

  • Realizing proxy re-encryption in the symmetric world

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    International Conference on Informatics Engineering and Information Science, ICIEIS 2011 Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding   251 CCIS   259 - 274   2011.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25327-0_23

  • Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

    Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai

    10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011 Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011   352 - 361   2011.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/TrustCom.2011.46

  • General fault attacks on multivariate public key cryptosystems

    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai

    4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011 Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings   7071 LNCS   1 - 18   2011.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25405-5_1

  • A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

    Dong Hao, Yizhi Ren, Kouichi Sakurai

    2nd International Conference on Trusted Systems, INTRUST 2010 Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers   6802 LNCS   237 - 252   2011.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25283-9_16

  • Design and implementation of document access control model based on role and security policy

    Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai

    2nd International Conference on Trusted Systems, INTRUST 2010 Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers   6802 LNCS   26 - 36   2011.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-25283-9_2

  • Enhancing SVO logic for mobile IPv6 security protocols Reviewed

    Ilsun You, Yoshiaki Hori, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   2 ( 3 )   26 - 52   2011.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Using game theory to classify wireless Ad Hoc network attacks with analysis on countermeasures Reviewed

    Xiaojuan Liao, Dong Hao, Kouichi Sakurai

    International Journal of Advancements in Computing Technology   3 ( 8 )   296 - 303   2011.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.4156/ijact.vol3.issue8.35

  • Traceback framework against botmaster by sharing network communication pattern information

    Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai

    2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011   639 - 644   2011.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2011.152

  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    International Conference on Security and Cryptography, SECRYPT 2011 SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography   37 - 49   2011.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Securing location-aware services based on online/offline signatures in VANETs

    Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee

    IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop on Availability, Reliability and Security for Business, Enterprise and Health Information Systems, ARES 2011 Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings   271 - 285   2011.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-23300-5_21

  • A SMS-based mobile botnet using flooding algorithm

    Jingyu Hua, Kouichi Sakurai

    5th Workshop in Information Security Theory and Practice, WISTP 2011 Information Security Theory and Practice Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings   264 - 279   2011.6

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-21040-2_19

  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Laiping Zhao, Yizhi Ren, Kouichi Sakurai

    25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011 Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011   275 - 282   2011.6

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/AINA.2011.87

  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

    5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011   2011.5

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/1968613.1968715

  • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

    Fangming Zhao, Takashi Nishide, Kouichi Sakurai

    7th International Conference on Information Security Practice and Experience, ISPEC 2011 Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings   6672 LNCS   83 - 97   2011.5

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-21031-0_7

  • Guest editorial Addressing insider threats and information leakage Reviewed

    Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   2 ( 1 )   1 - 3   2011.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Towards formal analysis of wireless LAN security with MIS protocol Reviewed

    Ilsun You, Yoshiaki Hori, Kouichi Sakurai

    International Journal of Ad Hoc and Ubiquitous Computing   7 ( 2 )   112 - 120   2011.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1504/IJAHUC.2011.038997

  • Towards formal analysis of wireless LAN security with MIS protocol Reviewed

    Ilsun You, Yoshiaki Hori, Kouichi Sakurai

    International Journal of Ad Hoc and Ubiquitous Computing   7 ( 2 )   112 - 120   2011.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1504/IJAHUC.2011.038997

  • FineTrust: a fine-grained trust model for peer-to-peer networks Reviewed International journal

    Yizhi Ren, MingChu Li, Kouichi Sakurai

    Security and Communication Networks 4(1): 61-69 (2011)   Vol.4 ( No.1 )   2011.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Enhancing MISP with fast mobile IPv6 security Reviewed

    Ilsun You, Jong Hyouk Lee, Yoshiaki Hori, Kouichi Sakurai

    Mobile Information Systems   7 ( 3 )   271 - 283   2011.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3233/MIS-2011-0121

  • Efficient context-sensitive intrusion detection based on state transition table Reviewed

    Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E94-A ( 1 )   255 - 264   2011.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E94.A.255

  • Distributed Paillier Cryptosystem without Trusted Dealer

    Takashi Nishide, Kouichi Sakurai

    11th International Workshop on Information Security Applications, WISA 2010 Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers   44 - 60   2011.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-17955-6_4

  • Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   45 - 59   2011.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-18405-5_5

  • A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

    Liang Zhao, Avishek Adhikari, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   29 - 44   2011.1

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-18405-5_4

  • FineTrust: a fine-grained trust model for peer-to-peer networks Reviewed International journal

    Yizhi Ren, MingChu Li, Kouichi Sakurai

    Security and Communication Networks 4(1): 61-69 (2011)   Vol.4 ( No.1 )   2011.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A generic evaluation method for key management schemes in wireless sensor network

    Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1145/1968613.1968680

  • Welcome message from MIST-2011 international workshop co-chairs Reviewed

    Ilsun You, Christian W. Probst, Yoshiaki Hori, Kouichi Sakurai

    Quaternary International   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/INCoS.2011.171

  • Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

    Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011 Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011   1739 - 1744   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/TrustCom.2011.243

  • Improvement on secrecy capacity of wireless LAN using matched filter

    Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai

    2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011 Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011   463 - 469   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/MSN.2011.40

  • Guest editorial Trusted computing and communications Reviewed

    Guojun Wang, Laurence T. Yang, Kouichi Sakurai

    Security and Communication Networks   4 ( 1 )   1 - 2   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/sec.195

  • FineTrust A fine-grained trust model for peer-to-peer networks Reviewed

    Yizhi Ren, Mingchu Li, Kouichi Sakurai

    Security and Communication Networks   4 ( 1 )   61 - 69   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/sec.165

  • FCST 2011 Welcome message from the program chairs Reviewed

    Jianer Chen, Kouichi Sakurai, Cho Li Wang

    Quaternary International   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TrustCom.2011.268

  • Distributed Paillier cryptosystem without trusted dealer

    Takashi Nishide, Kouichi Sakurai

    11th International Workshop on Information Security Applications, WISA 2010 Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers   6513 LNCS   44 - 60   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-17955-6-4

  • Design and implementation of a forced encryption kernel module

    Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

    2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011   607 - 611   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IMIS.2011.68

  • Customized program protection for a user customized data protection framework

    Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Kouichi Sakurai

    2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011 Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011   1   643 - 649   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CSAE.2011.5953301

  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   6526 LNCS   45 - 59   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-18405-5-5

  • Classification on attacks in wireless ad hoc networks A game theoretic view

    Xiaojuan Liao, Dong Hao, Kouichi Sakurai

    7th International Conference on Networked Computing and Advanced Information Management, NCM 2011 Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011   144 - 149   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • An efficient key generation method in audio zero-watermarking

    Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai

    7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011   336 - 339   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IIHMSP.2011.63

  • Achieving cooperative detection against Sybil attack in wireless ad hoc networks A game theoretic approach

    Xiaojuan Liao, Dong Hao, Kouichi Sakurai

    17th Asia Pacific Conference on Communications, APCC 2011 17th Asia Pacific Conference on Communications, APCC 2011   806 - 811   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/APCC.2011.6152918

  • A study of communication route selection considering route security

    Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai

    11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011 Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011   360 - 365   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SAINT.2011.69

  • A robust and compression-combined digital image encryption method based on compressive sensing

    Rong Huang, Kouichi Sakurai

    7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011   105 - 108   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IIHMSP.2011.53

  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Liang Zhao, Avishek Adhikari, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   6526 LNCS   29 - 44   2011

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-18405-5-4

  • Adaptive and composable non-committing encryptions

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    15th Australasian Conference on Information Security and Privacy, ACISP 2010 Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings   6168 LNCS   135 - 144   2010.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-14081-5_9

  • Improved subset difference method with ternary tree Reviewed

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E93-A ( 11 )   2034 - 2044   2010.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E93.A.2034

  • Towards a fairness multimedia transmission using layered-based multicast protocol Reviewed

    Heru Sukocof, Yoshiaki Hori, Hendrawan, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E93-D ( 11 )   2953 - 2961   2010.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E93.D.2953

  • Model-based intrusion detection by abstract interpretation

    Jingyu Hua, Takashi Nishide, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   359 - 362   2010.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SAINT.2010.107

  • Preserving integrity and confidentiality of a directed acyclic graph model of provenance

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings   6166 LNCS   311 - 318   2010.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-13739-6_22

  • Modeling and containment of search worms targeting web applications

    Jingyu Hua, Kouichi Sakurai

    7th GI International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2010 Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings   6201 LNCS   183 - 199   2010.8

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-14215-4_11

  • Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus Reviewed

    Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren

    ICIC Express Letters   4 ( 3 )   1053 - 1058   2010.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A behavior based malware detection scheme for avoiding false positive

    Yoshiro Fukushima, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010   79 - 84   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/NPSEC.2010.5634444

  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    International Conference on Security and Cryptography, SECRYPT 2010 SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography   389 - 398   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Study of log file dispersion management method

    Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   371 - 374   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SAINT.2010.104

  • Special section on trust, security and privacy for pervasive applications Reviewed

    Guojun Wang, Laurence T. Yang, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E93-D ( 3 )   409 - 410   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • SPSE A flexible QoS-based service scheduling algorithm for service-oriented Grid

    Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai

    2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010 Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/IPDPSW.2010.5470920

  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Seiichiro Mizoguchi, Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai

    2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010   73 - 78   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/NPSEC.2010.5634446

  • Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Liang Zhao, Di Xiao, Kouichi Sakurai

    2010 International Conference in Information Science and Applications, ICISA 2010 2010 International Conference on Information Science and Applications, ICISA 2010   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ICISA.2010.5480269

  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai

    2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010 Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010   434 - 441   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/HPCC.2010.72

  • ESS-FH Enhanced security scheme for fast handover in hierarchical mobile IPv6 Reviewed

    Ilsun You, Jong Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori

    IEICE Transactions on Information and Systems   E93-D ( 5 )   1096 - 1105   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E93.D.1096

  • Darknet monitoring on real-operated networks

    Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai

    5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010 Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010   278 - 285   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/BWCCA.2010.82

  • Behavior control based on dynamic code translation

    Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   375 - 378   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SAINT.2010.103

  • Analysis of existing privacy-preserving protocols in domain name system Reviewed

    Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E93-D ( 5 )   1031 - 1043   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E93.D.1031

  • Adaptive and composable non-interactive string-commitment protocols

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    International Conference on Security and Cryptography, SECRYPT 2010 SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography   354 - 361   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   261 - 264   2010

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/SAINT.2010.44

  • Efficient intrusion detection based on static analysis and stack walks

    Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren

    4th International Workshop on Security, IWSEC 2009 Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings   5824 LNCS   158 - 173   2009.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-04846-3_11

  • Enhancing cooperative behavior for online reputation systems by group selection

    Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo, Kouichi Sakurai

    Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009 UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences   568 - 573   2009.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/UIC-ATC.2009.81

  • Formal verification for access control in web information sharing system

    Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    3rd International Conference on Information Security and Assurance, ISA 2009 Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings   5576 LNCS   80 - 89   2009.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-02617-1_9

  • Ternary subset difference method and its quantitative analysis

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    9th International Workshop on Information Security Applications, WISA 2008 Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers   5379 LNCS   225 - 239   2009.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-00306-6_17

  • Grouping provenance information to improve efficiency of access Control

    Amril Syalim, Yoshiaki Hori, Kouichi Sakurai

    3rd International Conference on Information Security and Assurance, ISA 2009 Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings   5576 LNCS   51 - 59   2009.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-02617-1_6

  • An Enhanced Security Protocol for Fast Mobile IPv6 Reviewed International journal

    YOU Ilsun, SAKURAI Kouichi, HORI Yoshiaki

    IEICE Transactions on Information and Systems   2009.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • The 3rd International workshop on intelligent, mobile and internet services in ubiquitous computing (IMIS 2009) Welcome message from IMIS 2009 organizers Reviewed

    Kouichi Sakurai, Ilsun You, Bonam Kim, Feilong Tang

    Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009   2009.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/CISIS.2009.212

  • 個別アドレス発行によるメーリングリストへのスパムメール削減方式の提案と評価 Reviewed International journal

    高橋健一, 境顕宏, 堀良彰, 櫻井幸一

    情報処理学会論文誌(IPSJ Journal)   2009.9

     More details

    Publishing type:Research paper (scientific journal)  

  • Importance of data standardization in privacy-preserving k-means clustering

    Chunhua Su, Justin Zhan, Kouichi Sakurai

    International Workshops on Database Systems for Advanced Applications, DASFAA 2009: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD Database Systems for Advanced Applications - DASFAA 2009 International Workshops BenchmarX, MCIS, WDPP, PPDA, MBC, PhD   5667 LNCS   276 - 286   2009.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-04205-8_23

  • Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party Reviewed International journal

    SU Chunhua, BAO Feng, ZHOU Jianying, TAKAGI Tsuyoshi, SAKURAI Kouich

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2009.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party Reviewed

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E92A ( 8 )   1868 - 1871   2009.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1868

  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Kenichi Takahashi, Yoshiki Mitsuyuki, Tsunenori Mine, Kouichi Sakurai, Makoto Amamiya

    10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007 Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers   5044 LNAI   134 - 145   2009.7

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-01639-4_12

  • Reconsidering data logging in light of digital forensics

    Bin Hui Chou, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

    Advances in Information Security and Its Application Third International Conference, ISA 2009, Proceedings   36   111 - 118   2009.7

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-02633-1_15

  • Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

    Yi Han, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    Advances in Information Security and Its Application Third International Conference, ISA 2009, Proceedings   36   105 - 110   2009.7

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-642-02633-1_14

  • A Security Analysis on Kempf-Koodlis Security Scheme for Fast Mobile IPv6 Reviewed International journal

    YOU Ilsun, SAKURAI Kouichi, HORI Yoshiaki

    IEICE Transactions on Communications   2009.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A security analysis on Kempf-Koodli's security scheme for Fast Mobile IPv6 Reviewed

    Ilsun You, Kouichi Sakurai, Yoshiaki Hori

    IEICE Transactions on Communications   E92-B ( 6 )   2287 - 2290   2009.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transcom.E92.B.2287

  • Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection Reviewed International journal

    Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo and Kouichi Sakurai

    RIMS Kokyuroku   2009.5

     More details

    Publishing type:Research paper (scientific journal)  

  • An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation Reviewed International journal

    Yongrui CUI, Mingchu LI, Yizhi REN, Kouichi SAKURAI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2009.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes Reviewed International journal

    SU Chunhua, BAO Feng, ZHOU Jianying, TAKAGI Tsuyoshi, SAKURAI Kouichi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2009.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes Reviewed

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E92A ( 4 )   1246 - 1250   2009.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1246

  • A new secret sharing scheme based on the multi-dealer Reviewed

    Cheng Guo, Mingchu Li, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 5 )   1373 - 1378   2009.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1373

  • A signature scheme associated with universal re-signcryption

    Kohei Tatara, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   780 - 785   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ARES.2009.104

  • Security analysis for P2P routing protocols

    Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   899 - 904   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ARES.2009.82

  • Secrecy capacity of wireless LAN

    Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   905 - 910   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ARES.2009.91

  • Polymorphic worm detection by analyzing maximum length of instruction sequence in network packets

    Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   972 - 977   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ARES.2009.103

  • Modeling security bridge certificate authority architecture Reviewed

    Yizhi Ren, Mingchu Li, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 6 )   1544 - 1547   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1544

  • Message from the trustcom 2009 symposium chairs Reviewed

    Guojun Wang, Peter Mueller, Kouichi Sakurai, Maria S. Perez-Hernandez

    Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009   2   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/CSE.2009.524

  • Foreword Special section on information and communication system security Reviewed

    Kouichi Sakurai

    IEICE Transactions on Information and Systems   E92-D ( 5 )   765   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Flow traffic classification with support vector machine by using payload length

    Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, Heejo Lee, Jae Cheol Ryou

    2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CSA.2009.5404180

  • Distributed noise generation for density estimation based clustering without trusted third party Reviewed

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 8 )   1868 - 1871   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1868

  • Design and object-oriented implementation of an intelligence entity sharing pool

    Runhe Huang, Jianhua Ma, Kenichi Takahashi, Kouichi Sakurai

    2009 WRI Global Congress on Intelligent Systems, GCIS 2009 Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009   2   583 - 587   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/GCIS.2009.269

  • Comparison of risk analysis methods Mehari, magerit, NIST800-30 and microsoft's security management guide

    Amril Syalim, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   726 - 731   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ARES.2009.75

  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    Ilsun You, Kouichi Sakurai, Yoshiaki Hori

    4th International Conference on Frontier of Computer Science and Technology, FCST 2009 4th International Conference on Frontier of Computer Science and Technology, FCST 2009   351 - 355   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/FCST.2009.75

  • An enhanced security protocol for fast mobile IPv6 Reviewed

    Ilsun You, Kouichi Sakurai, Yoshiaki Hori

    IEICE Transactions on Information and Systems   E92-D ( 10 )   1979 - 1982   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.E92.D.1979

  • An adaptive reputation-based algorithm for grid virtual organization formation Reviewed

    Yongrui Cui, Mingchu Li, Yizhi Ren, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 5 )   1339 - 1346   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1339

  • Security and correctness analysis on privacy-preserving k-means clustering schemes Reviewed

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 4 )   1246 - 1250   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E92.A.1246

  • The optimal choice by resource consumers in Grid market

    Laiping Zhao, Mingchu Li, Weifeng Sun, Kouichi Sakurai, Yizhi Ren

    Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009 UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences   580 - 585   2009

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/UIC-ATC.2009.75

  • Trust similarity measure in trust model for P2P networks

    Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai

    5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008   2   107 - 112   2008.12

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/EUC.2008.137

  • A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

    Bin Hui Chou, Kohei Tatara, Taketoshi Sakuraba, Yoshiaki Hori, Kouichi Sakurai

    2nd International Conference on Information Security and Assurance, ISA 2008 Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008   421 - 426   2008.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ISA.2008.96

  • Key distribution scheme using matched filter resistant against DoS attack

    Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai

    22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008 Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008   1534 - 1539   2008.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/WAINA.2008.180

  • IMIS 2008 message from the workshop organizers MUE 2008 Reviewed

    2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008 Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008   2008.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/MUE.2008.7

  • Reliable key distribution scheme for lossy channels Reviewed

    Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E91-D ( 5 )   1485 - 1488   2008.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietisy/e91-d.5.1485

  • Characterizing economic and social properties of trust and reputation systems in P2P environment Reviewed

    Yu Feng Wang, Yoshiaki Hori, Kouichi Sakurai

    Journal of Computer Science and Technology   23 ( 1 )   129 - 140   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s11390-008-9118-y

  • Analysis of program obfuscation schemes with variable encoding technique Reviewed

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 1 )   316 - 329   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e91-a.1.316

  • Optimization of group key management structure with a client join-leave mechanism Reviewed

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    Journal of Information Processing   16   130 - 141   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.2197/ipsjjip.16.130

  • Toward a scalable visualization system for network traffic monitoring Reviewed

    IEICE Transactions on Information and Systems   E91-D ( 5 )   1300 - 1310   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietisy/e91-d.5.1300

  • A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

    Chunhua Su, Kouichi Sakurai

    4th International Conference on Advanced Data Mining and Applications, ADMA 2008 Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings   5139 LNAI   170 - 181   2008

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1007/978-3-540-88192-6-17

  • Definition of security practices in security management part of security level management model Reviewed

    Tai Hoon Kim, Kouichi Sakurai

    International Journal of Security and its Applications   2 ( 1 )   63 - 71   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Analysis of program obfuscation schemes with variable encoding technique Reviewed

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E91-A ( 1 )   316 - 329   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e91-a.1.316

  • Achieving evenhandedness in certified email system for contract signing Reviewed

    Kenji Imamoto, Jianying Zhou, Kouichi Sakurai

    International Journal of Information Security   7 ( 6 )   383 - 394   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10207-008-0056-z

  • A study on security level management model description Reviewed

    Tai Hoon Kim, Kouichi Sakurai

    International Journal of Multimedia and Ubiquitous Engineering   3 ( 1 )   87 - 94   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A new scheme for distributed density estimation based privacy-preserving clustering

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    3rd International Conference on Availability, Security, and Reliability, ARES 2008 ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings   112 - 119   2008

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ARES.2008.129

  • A framework for user privacy protection using trusted programs Reviewed

    Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya

    International Journal of Security and its Applications   1 ( 2 )   59 - 70   2007.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Efficient verifier-based password-authenticated key exchange in the three-party setting Reviewed

    Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee

    Computer Standards and Interfaces   29 ( 5 )   513 - 520   2007.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.csi.2006.12.002

  • A proposal of key management scheme and its operation using Anonymous biometrics on ID-based infrastructure Reviewed

    Akitoshi Izumi, Yoshifumi Ueshige, Kouichi Sakurai

    International Journal of Security and its Applications   1 ( 1 )   83 - 94   2007.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Special section on cryptography and information security Reviewed

    Masakatu Morii, Shiho Moriai, Goichiro Hanaoka, Toru Akishita, Tetsuya Izu, Tetsu Iwata, Koji Okada, Toshinobu Kaneko, Hiroaki Kikuchi, Kwangjo Kim, Shinsaku Kiyomoto, Noboru Kunthiro, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Kazue Sako, Takashi Satoh, Akira Shiozaki, Hiroki Shizuya, Tsuyoshi Takagi, Mitsuru Tada, Keisuke Tanaka, Hiroshi Doi, Toru Nakanishi, Shoichi Hirose, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Natsume Matsuzaki, Tsutomu Matsumoto, Atsuko Miyaji, Maid Yoshida

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E90-A ( 1 )   2007.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e90-a.1.1

  • Privacy-preservation techniques in data mining

    Chunhua Su, Jianying Zhou, Feng Bao, Guilin Wang, Kouichi Sakurai

    Digital Privacy Theory, Technologies, and Practices   187 - 226   2007.1

     More details

    Language:English  

  • On effectiveness of clock control in stream ciphers Reviewed

    Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E90-A ( 9 )   1780 - 1787   2007.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e90-a.9.1780

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Preface Reviewed

    Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3960 LNCS   2006.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Preface Reviewed

    Laurence T. Yang, Hai Jin, Jianhua Ma, Theo Ungerer, David Ogle, Manish Parashar, Kouichi Sakurai

    Thrid International Conference on Autonomic and Trusted Computing, ATC 2006 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   4158 LNCS   2006.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Simple power analysis on fast modular reduction with generalized Mersenne prime for elliptic curve cryptosystems Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E89-A ( 1 )   231 - 237   2006.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e89-a.1.231

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Preface Reviewed

    Yuko Murayama, Shinichi Kawamura, Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg

    Lecture Notes in Computer Science   4266 LNCS   2006

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Security protocol for IMT-2000-based contents service Reviewed

    Sang Soo Yeo, Deok Gyu Lee, Kouichi Sakurai

    International Journal of Multimedia and Ubiquitous Engineering   1 ( 4 )   11 - 20   2006

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Security countermeasure design for information systems by using block model Reviewed

    Tai Hoon Kim, Kouichi Sakurai

    International Journal of Multimedia and Ubiquitous Engineering   1 ( 2 )   30 - 33   2006

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers Reviewed

    Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 10 )   2778 - 2791   2005.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e88-a.10.2778

  • Analysis and comparison of cryptographic techniques in e-voting and e-auction Reviewed

    Yong Sork Her, Kenji Imamoto, Kouichi Sakurai

    Research Reports on Information Science and Electrical Engineering of Kyushu University   10 ( 2 )   91 - 96   2005.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic Reviewed

    Kenji Imamoto, Kouichi Sakurai

    Electronic Notes in Theoretical Computer Science   135 ( 1 )   79 - 94   2005.7

     More details

    Language:English   Publishing type:Research paper (other academic)  

    DOI: 10.1016/j.entcs.2005.06.003

  • A collaborative role-based access control for trusted operating systems in distributed environment Reviewed

    Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   270 - 279   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.270

  • Special section on cryptography and information security Reviewed

    Tetsuya Izu, Tetsu Iwata, Shiho Moriai, Tomoyuki Asano, Toshinobu Kaneko, Kwangjo Kim, Noboru Kunihiro, Hidenori Kuwakado, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Takashi Satoh, Akira Shiozaki, Hideo Shimizu, Mitsuru Tada, Tsuyoshi Takagi, Keisuke Tanaka, Toshiaki Tanaka, Yukiyasu Tsunoo, Hiroshi Doi, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Tsutomu Matsumoto, Natsume Matsuzaki, Masahiro Mambo, Atsuko Miyaji, Yuko Murayama, Maki Yoshida, Hajime Watanabe, Akira Hayashi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.1

  • Proposal and analysis of a distributed online certificate status protocol with low communication cost Reviewed

    Satoshi Koga, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   247 - 254   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.247

  • Procedural constraints in the extended RBAC and the coloured Petri net modeling Reviewed

    Wook Shin, Jeong Gun Lee, Hong Kook Klm, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   327 - 330   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.327

  • On the vulnerability of exponent recodings for the exponentiation against side channel attacks Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   154 - 160   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.154

  • On the pseudorandomness of a modification of KASUMI type permutations Reviewed

    Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee

    Lecture Notes in Computer Science   3506   313 - 329   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • The improved risk analysis mechanism in the practical risk analysis system Reviewed

    SangCheol Hwang, NamHoon Lee, Kouichi Sakurai, GungGil Park, JaeCheol Ryou

    Unknown Journal   3391   835 - 842   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Side channel cryptanalysis on XTR public key cryptosystem Reviewed

    Dong Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 5 )   1214 - 1223   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e88-a.5.1214

  • PGV-style block-cipher-based hash families and black-box analysis Reviewed

    Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   39 - 48   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.39

  • A DRM framework for secure distribution of mobile contents Reviewed

    Kwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae Cheol Ryou

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3090   905 - 914   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Pre-production methods of a response to certificates with the common status - Design and theoretical evaluation Reviewed

    Satoshi Koga, Jae Cheol Ryou, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3093   85 - 97   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Modified power-analysis attacks on XTR and an efficient countermeasure Reviewed

    Dong Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3269   305 - 317   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A software fingerprinting scheme for java using classfiles obfuscation Reviewed

    Kazuhide Fukushima, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2908   303 - 316   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A generalization of PGV-hash functions and security analysis in black-box model Reviewed

    Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3108   212 - 223   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A distributed online certificate status protocol with a single public key Reviewed

    Satoshi Koga, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2947   389 - 401   2004.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • チャレンジ-レスポンスとベイジアンフィルタを併用した迷惑メール対策の提案 Reviewed

    岩永学, 田端利宏, 櫻井 幸一

    情報処理学会論文誌   2004.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • 普遍再暗号化によるRFIDタグのプライバシ保護の実現 Reviewed

    齊藤純一郎, 櫻井 幸一

    情報処理学会論文誌   2004.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Timing Attacks against a Parallelized RSA Implementation Reviewed

    Yasuyuki Sakai and Kouichi Sakurai

    2004.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • On Security of XTR Public Key Cryptosystems Against Side Channel Attacks Reviewed International journal

    Dong-Guk Han, Jongin Lim, Kouichi Sakurai

    Proc. ACISP 2004   2004.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Pseudorandomness of SPN-Type Transformations Reviewed International journal

    Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakura

    Proc. ACISP 2004   2004.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation Reviewed International journal

    Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai

    Proc. EuroPKI 2004   3093   85 - 97   2004.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Special section on Discrete Mathematics and its applications Reviewed

    Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E87-A ( 5 )   977   2004.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A Distributed Online Certificate Status Protocol with a Single Public Key Reviewed International journal

    Satoshi Koga, Kouichi SAKURAI

    Proc. Public Key Cryptography 2004   2947   389 - 401   2004.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model Reviewed International journal

    Kenji IMAMOTO, Kouichi SAKURAI

    Proc. AINA (1) 2004   327 - 332   2004.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Merging Method of Certification Authorities Without Using Cross-Certifications Reviewed International journal

    Satoshi Koga, Kouichi SAKURAI

    Proc. AINA (2) 2004   174 - 177   2004.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 検証エージェントを用いたモバイルエージェントのためのリアルタイム改竄検出システムの提案 Reviewed

    小手川祐樹, 櫻井幸一

    情報処理学会論文誌   2004.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • A New Attack with Side Channel Leakage During Exponent Recoding Computations Reviewed International journal

    Yasuyuki Sakai, Kouichi SAKURAI

    Proc. CHES 2004   3156   298 - 311   2004.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Analysis and Design for Private Message Board Systems Reviewed

    Kenji Imamotoh, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E87-A ( 1 )   204 - 211   2004.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Analysis and Design for Private Message Board Systems Reviewed International journal

    Kenji IMAMOTO, Kouichi SAKURAI

    IEICE Trans. Fundamentals   E87A ( 1 )   204 - 211   2004.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A new attack with side channel leakage during exponent recoding computations Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    Lecture Notes in Computer Science   3156   298 - 311   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On security of XTR public key cryptosystems against side channel attacks Reviewed

    Dong Guk Han, Jongin Lim, Kouichi Sakurai

    Lecture Notes in Computer Science   3108   454 - 465   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Enhancing privacy of universal re-encryption scheme for RFID tags Reviewed

    Junichiro Saito, Jae Cheol Ryou, Kouichi Sakurai

    Lecture Notes in Computer Science   3207   879 - 890   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On the Security of SELinux with a Simplified Policy Reviewed International journal

    Katsuya SUEYASU, Toshihiro TABATA, Kouichi SAKURAI

    Proc. of the IASTED International Conference on Communication   2003.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Single-path authenticated-encryption scheme based on universal hashing Reviewed

    Soichi Furuya, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2595   94 - 109   2003.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using montgomery trick Reviewed

    Katsuyuki Okeya, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2523   564 - 578   2003.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party Reviewed

    Jae Gwi Choi, Kouichi Sakurai, Ji Hwan Park

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2846   265 - 279   2003.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A reject timing attack on an IND-CCA2 public-key cryptosystem Reviewed

    Kouichi Sakurai, Tsuyoshi Takagi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2587   359 - 373   2003.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response Reviewed International journal

    Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI

    Proc. of IASTED Int. Conf. on Communication, Network, and Information Security (CNIS 2003)   2003.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party Reviewed International journal

    Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park

    Prof. ACNS 2003   2846   265 - 279   2003.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation Reviewed International journal

    Yasuyuki Sakai, Kouichi SAKURAI

    Proc. ACNS 2003   2846   319 - 330   2003.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Mechanism to Detect Tampering on Mobile Agents using The Verification Agent Reviewed International journal

    Yuki Kotegawa, Kouichi SAKURAI

    Proc. International Workshop on Cryptology and Network Security (CANS03)   2003.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Private Certified E-mail Systems with Electronic Notice Board Reviewed International journal

    Kenji IMAMOTO, Kouichi SAKURAI

    Proc. International Workshop on Cryptology and Network Security (CANS03)   2003.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Tampering Detection Mechanism using a Trusted Host for Mobile Agents Reviewed International journal

    Yuki KOTEGAWA, Kouichi SAKURAI

    Proc. of the 2003 International Workshop on CRYPTOLOGY AND NETWORK SECURITY (CANS2003)   2003.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Certified E-mail Systems Using Public Notice Board Reviewed International journal

    Kenji IMAMOTO, Kouichi SAKURAI

    Trust and Privacy in Digital Business (TrustBus'03)   460 - 464   2003.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/DEXA.2003.1232065

  • A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation Reviewed International journal

    Kazuhide Fukushima, Kouichi SAKURAI

    Proc. WISA 2003   2908   303 - 316   2003.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 配達仲介人を利用した配達証明付き電子メールの改良 Reviewed

    今本 健二, 櫻井 幸一

    情報処理学会論文誌   2003.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Enhancing Airport Access Control Security With Multiple Biometrics Contactless Smart Card Reviewed

    M.David and K.SAKURAI

    2003.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • A secure digital watermark system for secondary distribution Reviewed

    Keiichi Iwamura, Kouichi Sakurai, Hideki Imai

    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)   86 ( 6 )   76 - 85   2003.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/ecjc.1151

  • A secure digital watermark system for secondary distribution Reviewed

    Keiichi Iwamura, Kouichi Sakurai, Hideki Imai

    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)   86 ( 6 )   76 - 85   2003.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/ecjc.1151

  • Decentralization Methods of Certification Authority Using the Digital Signature Schemes Reviewed International journal

    Satoshi KOGA, Kouichi SAKURAI

    2nd Annual PKI Research Workshop   2003.4

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem Reviewed International journal

    Kouichi SAKURAI and Tsuyoshi TAKAGI

    5th International Conference on Information Security and Cryptology, ICISC 2002   2587   359 - 373   2003.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • “A Secure Fragile Watermarking” Reviewed

    32 ( 1 )   22 - 28   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Previous fragile watermarking algorithms have been kept in secret, and not been discussed about the security except2).In 2), a secure fragile watermarking algorithm was proposed, even if it opens to the public. However, the algorithm needs to use different keys for different images. In this paper, we propose a fragile watermarking algorithm which can use the same key for different images. We show that this algorithm is secure, if it uses secure cryptographic function, pseudo-random number and self-synchronized pattern.

    DOI: 10.11371/iieej.32.22

  • Use of montgomery trick in precomputation of multi-scalar multiplication in elliptic curve cryptosystems Reviewed

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86-A ( 1 )   98 - 112   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86-A ( 5 )   1135 - 1146   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A Simple Power Attack On a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Trans. Fundamentals   E86A ( 5 )   1171 - 1180   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystem Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Trans. Fundamentals   E86A ( 1 )   98 - 112   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • サイドチャネル攻撃へのウィンドウ法を用いた防御法に対する2階電力差分攻撃 Reviewed

    桶屋 勝幸, 櫻井 幸一

    情報処理学会論文誌   2003.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • 高度版ランダム化加算減算鎖法に対する多重電力解析 Reviewed

    桶屋 勝幸, 櫻井 幸一

    情報処理学会論文誌   2003.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems Reviewed

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86-A ( 5 )   1171 - 1180   2003

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Timing attack against implementation of a parallel algorithm for modular exponentiation Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    Lecture Notes in Computer Science   2846   319 - 330   2003

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On the security of yet another reduced version of 3-pass HAVAL Reviewed

    Yong Sork Her, Kouichi Sakurai

    Unknown Journal   137   2003

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Analysis and design of SHA-V and RIPEMD-V with variable output-length Reviewed

    Yong Sork Her, Kouichi Sakurai

    Research Reports on Information Science and Electrical Engineering of Kyushu University   8 ( 1 )   13 - 18   2003

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Risks with Raw-key Masking the Security Evaluation of 2-key XCBC Reviewed International journal

    Soichi Furuya, Kouichi Sakurai

    Information and Communications Security, 4th International Conference, ICICS 2002   2513   327 - 341   2002.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Certified E-mail System With Receiver's Selective Usage of Delivery Authority Reviewed International journal

    Kenji IMAMOTO, Kouichi SAKURAI

    Third International Cryptology Conference in India (INDOCRYPT2002)   2551   326 - 338   2002.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Single-path Authenticated-encryption Scheme Based on Universal Hashing Reviewed International journal

    Soichi Furuya, Kouichi Sakurai

    9th Annual Workshop, SAC 2002   2595   94 - 109   2002.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Scalable On-line Certified E-mail Protocol Using Password Authentication Reviewed International journal

    Kenji IMAMOTO, Kouichi SAKURAI

    The 3rd International Workshop on Information Security Applications (WISA2002)   2002.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks Reviewed International journal

    Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai

    The 4th International Conference on Information Security and Cryptology (ICISC 2001)   2002.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Trans. Fundamentals   E85A ( 1 )   84 - 93   2002.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication Reviewed International journal

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86A ( 5 )   1135 - 1146   2002.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Speeding Up Elliptic Scalar Multiplication Using Multidoubling Reviewed International journal

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E85A ( 5 )   1075 - 1083   2002.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • 暗号に利用可能なモンゴメリ型楕円曲線の存在数に関する一考察 Reviewed

    桶屋 勝幸, 宮崎 邦彦, 櫻井 幸一

    応用数理学会論文誌   2002.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • サイドチャネル攻撃を防ぐモンゴメリ型楕円曲線上の 高速なスカラー倍計算方法 - 理論的アプローチ - Reviewed

    桶屋 勝幸, 宮崎 邦彦, 櫻井 幸一

    情報処理学会論文誌   2002.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive Reviewed International journal

    Kouichi SAKURAI and Tsuyoshi TAKAGI

    5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002   2002.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    Information Security Conference (ISC 2002)   2002.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    Cryptographic Hardware and Embedded System (CHES 2002)   2523   564 - 578   2002.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    Information Security and Privacy, 7th Australasian Conference (ACISP 2002)   2002.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • An IND-CCA2 Public-Key Cryptosystem with Fast Decryption Reviewed International journal

    Johannes Buchmann, Kouichi SAKURAI and Tsuyoshi TAKAGI

    4th International Conference on Information Security and Cryptology, ICISC'01   2002.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery form and analysis of efficiency for elliptic curve cryptosystems Reviewed

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E85-A ( 1 )   84 - 93   2002

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Speeding up elliptic scalar multiplication using multidoubling Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E85-A ( 5 )   1075 - 1083   2002

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On the Power of Direct Computations in Speeding Up Elliptic Scalar Multiplication Reviewed International journal

    Y.Sakai and K.SAKURAI

    PreProc. Eighth Annual Workshop on Selected Areas in Cryptography (Aug. 2001)   2001.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve Reviewed International journal

    K.Okeya and K.SAKURAI

    Proc. Workshop on Cryptographic Hardware and Embedded Systems 2001   2001.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • English vs. Sealed bid in anonymous electronic auction protocols Reviewed International journal

    Hirakiuchi DAISUKE , Kouichi Sakurai

    Proc. of 10th IEEE international workshops on enabling technologies, WETICE 2001   171 - 176   2001.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ENABL.2001.953409

  • On distributed cryptographic protocols for threshold RSA signing and decrypting with no dealer Reviewed

    Shingo Miyazaki, Kouichi Sakurai, Moti Yung

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E84-A ( 5 )   1177 - 1184   2001.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Efficient scalar multiplications on elliptic curves with direct computations of several doublings Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E84-A ( 1 )   120 - 129   2001.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A theory of demonstrating program result-correctness with cryptographic applications Reviewed

    Kouichi Sakurai

    IEICE Transactions on Information and Systems   E84-D ( 1 )   4 - 14   2001.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings Reviewed International journal

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E84A ( 1 )   120 - 129   2001.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A Theory of Demonstrating Program Result-Correctness with Cryptographic Applications Invited Reviewed International journal

    Kouichi SAKURAI

    IEICE Trans.   E84D ( 1 )   4 - 14   2001.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer Reviewed International journal

    Shingo MIYAZAKI, Kouichi SAKURAI and Moti YUNG

    IEICE Trans   E84A ( 5 )   1177 - 1183   2001.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • 非周期的自己アフィンタイル貼りにおけるタイルの境界集合の構成と彩色 Reviewed

    貞広 泰造, 櫻井幸一

    情報処理学会論文誌   2001.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • 複数の機密画像を埋め込み可能なグラフタイプ視覚複合型秘密分散方式の拡張 Reviewed

    須賀 祐治, 岩村 恵市, 櫻井幸一, 今井 秀樹

    情報処理学会論文誌   2001.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • 2次配布に対して安全な電子透かしシステム Reviewed

    岩村 恵市, 櫻井 幸一, 今井 秀樹

    電子情報通信学会論文誌   2001.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the $y$-Coordinate on a Montgomery-Form Elliptic Curve Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    Cryptographic Hardware and Embedded System (CHES 2001)   2001.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • An Anonymous Electronic Bidding Protocol Based on New Convertible Group Signature Scheme Reviewed International journal

    Kouichi SAKURAI, Shingo Miyazaki

    Proc. ACISP2000   2000.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 配布者の不正に対して安全な電子透かしシステム Reviewed

    岩村 恵市, 櫻井 幸一, 今井 秀樹

    電子情報通信学会論文誌   2000.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Efficient Scalar Multiplication on Elliptic Curves without Repeated Doublings and their Practical Performance Reviewed International journal

    Yasuyuki Sakai, Kouichi SAKURAI

    Proc. ACISP2000   2000.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • On zero-knowledge proofs: "from membership to decision" Reviewed International journal

    G. Di Crecenzo, K. SAKURAI and M. Yung

    Proc. ACM STOC2000   2000.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications Reviewed International journal

    Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai

    Public Key Cryptography (PKC 2000)   1751   238 - 257   2000.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem Reviewed

    Shingo Miyazaki, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83-A ( 1 )   106 - 108   2000.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A Progress Report on Lattice Based Public-Key Cryptosystems -Theoretical Security versus Practical Cryptanalysis Reviewed

    Kouichi Sakurai

    IEICE Transactions on Information and Systems   E83-D ( 3 )   570 - 579   2000.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation Reviewed International journal

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83A ( 4 )   692 - 703   2000.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A Progress Report on Lattice Based Public-Key Cryptosystems --Theoretical Security versus Practical Cryptanalysis -- Invited Reviewed International journal

    Kouichi SAKURAI

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E83D ( 3 )   570 - 579   2000.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A practical off-line digital-money system with partilly blind signatures based on the discrete logarithm problem Reviewed International journal

    Shingo MIYAZAKI, Kouichi SAKURAI

    IEICE Transactions   E83A ( 1 )   106 - 108   2000.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • 変換可能なグループ署名を用いた電子電子入札方式 Reviewed

    宮崎真悟, 櫻井幸一

    情報処理学会論文誌   2000.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack Reviewed International journal

    Katsuyuki Okeya, Kouichi Sakurai

    Progress in Cryptology - INDOCRYPT 2000   2000.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Making Hash Functions from Block Ciphers secure and efficient by using convolutional codes Reviewed International journal

    Toru Inoue and Kouichi SAKURAI

    Proc. PKC2000   1751   391 - 404   2000.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • On the practical performance of hyperelliptic curve cryptosystems in software implementation Reviewed

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83-A ( 4 )   692 - 701   2000

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Cryptosystems Reviewed International journal

    Tetsuya Tamura, Kouichi SAKURAI

    PreProc. 1999 International Conference on Information Security and Cryptology   1787   221 - 235   1999.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Over $F_p$ vs. $F_{2^n}$ over and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Reviewed International journal

    Yasuyuki Sakai and Kouichi SAKURAI

    PreProc. 1999 International Conference on Information Security and Cryptology   1787   82 - 101   1999.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • On Threshold RSA-Signing with no Dealer Reviewed International journal

    Shingo MIYAZAKI, Kouichi SAKURAI and Moti YUNG

    PreProc. 1999 International Conference on Information Security and Cryptology   1787   197 - 207   1999.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 公開掲示板を用いた競り下げ電子オークション方式 Reviewed

    宮崎真悟, 櫻井幸一

    情報処理学会論文誌   1999.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • 有限体$F_{2^n}$上の超楕円曲線暗号のソフトウエア実装 Reviewed

    酒井 康行, 櫻井幸一

    電子情報通信学会論文誌   1999.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • オフライン型電子現金システムの分類と管理機関の内部不正に対する安全性評価 Reviewed

    宮崎 真悟, 櫻井 幸一

    情報処理学会論文誌   1999.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Toward Fair International Key Escrow -- An attempt by distributed Trusted Third Agencies with threshold cryptography -- Reviewed International journal

    S.Miyazaki, I. Kuroda, and K. SAKURAI

    Proc. 1999 International Workshop on Practice and Theory in Public Key Cryptography   1560   171 - 187   1999.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Divertible and subliminal-free zero-knowledge proofs for languages Reviewed International journal

    T.Itoh, M.Burmester, Y.Desmdet, K.SAKURAI, and H.Shizuya

    J. of Cryptology   12 ( 3 )   197 - 223   1999.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s001459900053

  • Efficient algorithms for the Jacobian variety fo hyperelliptic curves $y^2 = x^p -x + 1$ over a finite field of odd characteristic $p$ Reviewed International journal

    I. Duursma, and K. SAKURAI

    Coding Theory, Cryptography and related areas   1999.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Parallel Withstanding Attack with Forging Key Certificates on an Electronic Cash System Based on Message-Recovery Blind Digital Signatures Reviewed International journal

    S.Miyazaki, and K. SAKURAI

    Proc. International Workshop on Cryptographic Techniques & E-Commerce   1999.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Bulletin-Board Based Digital Auction Scheme with Bidding Down Strategy - Towards Anonymous Electronic Bidding without Anonymous Channels nor Trusted Centers Reviewed International journal

    K. SAKURAI and S.Miyazaki

    Proc. International Workshop on Cryptographic Techniques & E-Commerce   1999.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Classification of Chaum-Fiat-Naor Paradigm based anonymous electronic cash systems accroding to vulunerability aganist insider-attacks from untrusted authorities Reviewed International journal

    M.Shingo and K. SAKURAI

    Proc. International Workshop on Cryptographic Techniques & E-Commerce   1999.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • An improvement of ElYaniv-Fiat-Karp-Tarpin's money-making bi-directional strategy Reviewed International journal

    E. Dannoura and K.SAKURAI

    Information Processing Letters   66 ( 1 )   27 - 33   1998.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0020-0190(98)00032-5

  • An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy Reviewed

    Eisuke Dannoura, Kouichi Sakurai

    Information Processing Letters   66 ( 1 )   27 - 33   1998.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Secure hyperelliptic cryptosystems and their performance Reviewed International journal

    Y.Sakai, K. SAKURAI and M. Ishizuka

    Proc. PKC'98   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A Structural comparison of the computational difficulty of breaking discrete log cryptosystems. Reviewed International journal

    K.SAKURAI and H. Shizuya

    J. of Cryptology   11 ( 1 )   29 - 43   1998.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s001459900033

  • 取引手数料を考慮したオンライン為替交換アルゴリズムの効率解析 Reviewed

    檀浦 詠介, 櫻井 幸一

    情報処理学会論文誌   1998.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over $F_{2^n}$ Reviewed International journal

    Y.Sakai, K. SAKURAI

    Proc. of ASIACRYPT'98   1514   80 - 94   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Checking programs discreteetly: Demonstrating result-correctness efficiently while concealing it Reviewed International journal

    G. Di Crecenzo, K. SAKURAI and M. Yung

    Algorithms and Computation 9th International Symposium, ISAAC'98   1533   59 - 68   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Secure hyperelliptic cryptosystems and their performance Reviewed International journal

    Y.Sakai, K. SAKURAI and M. Ishizuka

    Proc. Public Key Cryptography'98   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • A more efficient untraceable e-cash system with partially blind signatures based on the the discrete logarithm problem Reviewed International journal

    S.Miyazaki, and K. SAKURAI

    Proc.Financial Cryptology'98   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Result-indistinguishable zero-knowledge proofs: increased power and constant-round protocols Reviewed International journal

    G. Di Crecenzo, K. SAKURAI and M. Yung

    STACS 98, 15th Annual Symposium on Theoretical Aspects of Computer Science   1373   511 - 521   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Security Issues for Contactless Smart Cards Reviewed International journal

    M.David and K. SAKURAI

    Proc. PKC'98   1998.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Practical proofs of knowledge without relying on theoretical proofs of membership on languages Reviewed

    Kouichi Sakurai

    Theoretical Computer Science   181 ( 2 )   317 - 335   1997.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0304-3975(96)00277-0

  • Practical proofs of knowledge without relying on theoretical proofs of membership on languages Reviewed

    Kouichi Sakurai

    Theoretical Computer Science   181 ( 2 )   317 - 335   1997.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0304-3975(96)00277-0

  • On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis Reviewed

    Kouichi Sakurai, Yuliang Zheng

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E80-A ( 1 )   19 - 24   1997.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A short certificate of the number of universal optimal strategies for stopping simple stochastic games Reviewed

    Akio Yanbe, Kouichi Sakurai

    Information Processing Letters   57 ( 1 )   17 - 24   1996.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/0020-0190(95)00181-6

  • A short certificate of the number of universal optimal strategies for stopping simple stochastic games Reviewed

    Akio Yanbe, Kouichi Sakurai

    Information Processing Letters   57 ( 1 )   17 - 24   1996.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/0020-0190(95)00181-6

  • On the complexity of the discrete logarithm for a general finite group Reviewed

    Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E79-A ( 1 )   61 - 65   1996

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Subliminal channels for transferring signatures Yet another cryptographic primitive Reviewed

    Kouichi Sakurai, Toshiya Itoh

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E77-A ( 1 )   31 - 38   1994.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Constant round perfect ZKIP of computational ability Reviewed

    Toshiya Itoh, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 7 )   1225 - 1233   1993.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Characterization of languages in constant round perfect zero-knowledge interactive proofs Reviewed

    Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 4 )   546 - 554   1993.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • On the complexity of constant round ZKIP of possession of knowledge Reviewed

    Tosyiya Itoh, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 1 )   31 - 39   1993.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Practical consequences of the discrepancy between zero-knowledge protocols and their parallel execution Reviewed

    Kouichi Sakurai, Toshiya Itoh

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 1 )   14 - 22   1993.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

▼display all

Books

  • 情報セキュリティ (IT Text)

    宮地 充子 編著、菊池 浩明 編著 執筆分担 /櫻井幸一( Role: Joint author)

    オーム社  2003.10 

     More details

    Language:Japanese   Book type:Scholarly book

    ネットワーク化の進展により重要度が増している情報セキュリティ技術について、基礎となる現代暗号理論から評価、認証技術、ネットワークセキュリティの最新の具体的技術まで、基準や情報倫理も含めて網羅した教科書。  情報セキュリティの全分野を体系的に学習できる。

  • 数論アルゴリズムと楕円暗号理論入門 ニール コブリッツ (著), 桜井 幸一 (翻訳)

    ニール コブリッツ (著), 桜井 幸一 (翻訳)( Role: Sole translator)

    (シュプリンガー数学クラブ)  1997.8 

     More details

    Language:Japanese   Book type:Scholarly book

    Repository Public URL: http://hdl.handle.net/2324/1001353021

Presentations