2024/10/06 更新

お知らせ

 

写真a

サクライ コウイチ
櫻井 幸一
SAKURAI KOUICHI
所属
システム情報科学研究院 情報学部門 教授
サイバーセキュリティセンター (併任)
工学部 電気情報工学科(併任)
システム情報科学府 情報理工学専攻(併任)
マス・フォア・イノベーション連係学府 (併任)
職名
教授
プロフィール
1986年〜1988年 九州大学工学研究科修士課程において数学 (位相幾何学,代数幾何学,微分方程式論)を専攻. 1988年4月 三菱電機株式会社入社後, 情報電子研究所(現、情報総合研究所)にて暗号と情報セキュリティ の研究開発に従事.とくにゼロ知識対話型証明の理論研究と そのネットワークセキュリティーへの 応用にたずさわる. また,同時に公開鍵暗号に適用される 楕円曲線に基づいた離散対数問題を 計算量的立場から研究. 1993年6月『ゼロ知識証明技術に基づく暗号 プロトコルの効率と安全性に関する研究』 により,博士(工学)の学位授与(九州大学). 1994年3月 九州大学 工学部 情報工学科 助教授 就任. 以来,情報と様々な分野(計算機,数学,物理,生物,経済) の接点に現れる複雑性に興味ももち,その構造解析を行なっている. これまで 暗号技術国際標準化委員会(ISO/SC27/WG2) 主査 兼 WG2日本代表長(情報処理学会 情報規格調査会)として として、暗号アルゴリズムの国際標準化に関わる国内政策の舵とりと、 その活動範囲は、研究だけでなく、標準化や暗号政策にまでも およんでいる。) 1992年 マッシー教授の招待でスイス工科大学(ETH)において 招待講演''On the gap between the serial and the parallel in zero-knowledge protocols''を行なう。 1995年5月 マルセイユ(フランス)離散数学研究所 (ATI/LMD)で, 楕円曲線に基づいた離散対数問題の複雑性に関する 招待講演を行なう. 1997年9月から一年間、米国コロンビア大学計算機科学科 客員研究員。 この間に、AT \& T研究所にて、''超楕円暗号の設計と解析'' に関する招待講演を行なう。 1988年 3月  九州大学大学院 工学研究科修士課程修了 1988年 4月  三菱電機(株)情報電子研究所勤務 暗号理論の研究に従事 1993年 6月  博士(工学)の学位取得(九州大学) 1995年 九州大学工学部情報工学科助教授就任  1997年 9月 (一年間)米国コロンビア大学計算機科学科 訪問研究員 2002年 4月  九州大学大学院システム情報科学研究院情報工学部門教授 (現在にいたる) 所属学会: 電子情報通信学会、情報処理学会、日本数学会、人工知能学会, ACM, IEEE, IACR 授賞  2000年 情報処理学会 論文賞授賞・坂井特別記念賞 2003年 情報処理学会 情報規格調査会 標準化功労賞 2004年 情報処理学会 論文賞授賞  2005年 第一回IPA(情報処理推進機構)賞 2004年4月より、(財)九州システム情報技術研究所 第2研究室室長を兼務し、「社会システムにおける情報セキュリティ」の確保をテーマに、産学官の研究交流を促進。  2005-2006年度・情報通信研究機構より採択された日韓国際共同研究プロジェクトのリーダーとしてセキュリティ技術に関する日中韓の産学官連携を推進。  2006年5月インド暗号学会(The Cryptology Research Society of India, (CRSI) 事務局長ビマル クマール ロイ(Bimal Kumar Roy)教授)との間で、 情報セキュリティ分野での研究協定覚書(MOU)の締結を日本の研究機関としてはじめて実現。 2019年4月よりATR(国際通信研究所)セキュリティ部客員兼務。2020年2月、IEEEメンバープレスにおいて、「インターネットなどのネットワークや人工知能(AI)への不正を仕掛ける攻撃は年々高度化しており、暗号技術が重要さを増していることや、セキュリティーとプライバシーとの関係性に注意すべきだ」と提言した。 2022年4月より人工知能学会AIせキュリティ研究会主査(初代)。 研究論文(2024年5月現在)ジャーナル114件 国際会議357件  https://dblp.org/pid/16/3865.html

研究分野

  • 情報通信 / 情報セキュリティ

学位

  • 博士(工学)

経歴

  • 三菱電機・情報電子研究所(1988Apr~1993Feb)

    三菱電機・情報電子研究所(1988Apr~1993Feb)

研究テーマ・研究キーワード

  • 研究テーマ:量子暗号

    研究キーワード:量子暗号

    研究期間: 2024年

  • 研究テーマ:暗号

    研究キーワード:暗号

    研究期間: 2024年

  • 研究テーマ:信頼性

    研究キーワード:信頼性

    研究期間: 2024年

  • 研究テーマ:仮想通貨

    研究キーワード:仮想通貨

    研究期間: 2024年

  • 研究テーマ:人工知能暗号

    研究キーワード:人工知能暗号

    研究期間: 2024年

  • 研究テーマ:人工知能

    研究キーワード:人工知能

    研究期間: 2024年

  • 研究テーマ:プライバシー

    研究キーワード:プライバシー

    研究期間: 2024年

  • 研究テーマ:ブロックチェーン

    研究キーワード:ブロックチェーン

    研究期間: 2024年

  • 研究テーマ:サイバーセキュリティ

    研究キーワード:サイバーセキュリティ

    研究期間: 2024年

  • 研究テーマ:NFT(非代替性トークン)

    研究キーワード:NFT(非代替性トークン)

    研究期間: 2022年4月 - 2024年5月

  • 研究テーマ:Ai暗号

    研究キーワード:深層学習、暗号

    研究期間: 2021年4月 - 2022年7月

  • 研究テーマ:ブロックチェーン社会基盤

    研究キーワード:スマートコントラクト  電子投票

    研究期間: 2020年1月 - 2020年6月

  • 研究テーマ:仮想通貨とブロックチェーン

    研究キーワード:ビットコイン

    研究期間: 2018年4月 - 2021年8月

  • 研究テーマ:人工知能セキュリティ

    研究キーワード:人工知能、敵対的機械学習

    研究期間: 2017年4月 - 2018年6月

  • 研究テーマ:サイバーセキュリティ

    研究キーワード:ネットワーク、人工知能

    研究期間: 2015年4月 - 2016年5月

  • 研究テーマ:ネットワークセキュリティ経済

    研究キーワード:ゲーム理論

    研究期間: 2010年8月 - 2011年8月

  • 研究テーマ:暗号アルゴリズムの設計と解析

    研究キーワード:共通鍵暗号、 強度評価

    研究期間: 2005年4月 - 2012年10月

  • 研究テーマ:暗号と情報セキュリティ

    研究キーワード:情報セキュリティ,暗号理論,インターネットプロトコル,モバイル技術,Web 応用技術,オペレーティングシステム

    研究期間: 1994年3月

受賞

  • SCAT 会長賞

    2019年1月   (一財)テレコム先端技術研究支援センター   「超高速暗号 KCipher-2 の研究開発と実用化」

     詳細を見る

    SCAT表彰は、ICT(情報通信技術)の研究開発により国民生活の安全安心に寄与するなど多大な貢献のあった研究者に授与する趣旨で、
    2019年度から公募・他薦によって実施している。
    本年度の表彰は、会長大賞 2件、 会長賞 2件、 優秀賞 1件の合計5件であった。
    下名の受賞は、KDDI総合研究所3名との共同研究開発・国際標準化に対して贈られた。

    清本 晋作1、田中 俊昭1、仲野 有登1、櫻井 幸一2 (1: KDDI 総合研究所、2: 九州大学)

  • 平成27年度電子情報通信学会業績賞

    2016年5月   電子情報通信学会   超高速暗号 KCipher-2 の開発と標準化 田中 俊昭(KDDI研) 清本 晋作(KDDI研) 櫻井 幸一(九州大学)

  • 貢献賞(国際会議)

    2015年9月   電子情報通信学会・基礎境界ソサイエティ   国際会議IWSEC2015(The 9th International Workshop on Security)の運営に関する貢献

  • DICOMO2015優秀論文賞

    2015年9月   情報処理学会・マルチメディア、分散、協調とモバイルシンポジウム・プログラム委員会   「ネットワーク攻撃に対する端末非依存型検知方式のOpenFlowコントローラ上への実装と評価」 宮﨑亮輔†,川本淳平†,松本晋一*,櫻井幸一† (†九州大学,*九州先端科学技術研究所)に対する論文賞

     詳細を見る

    ネットワーク仮想化技術であるSoftware-Dened Network (SDN) において,マルチエー
    ジェントを用いてサイバー攻撃を検知する手法を提案する.我々がこれまでに提案してきた手法では,SDN
    内に単一のエージェントを配置し攻撃検知を行っていた.しかし,単一エージェントでは検知結果にノイ
    ズが含まれることが問題であった.本稿では,監視するネットワークデータに関する多様性,異常と判断
    する閾値に関する多様性並びにエージェントの寿命に関する多様性を導入し,単一エージェントによる過
    度な検出を抑え複数の異常傾向を考慮した検知を提案する.また,比較評価実験により,多様性の導入に
    よって検知結果ノイズが削減できたことを確認した.

  • The Second International Symposium on Computing and Networking – Across Practical Development and Theoretical Research- (CANDAR’14)

    2014年12月   “Parallelization of QUAD Stream Cipher using Linear Recurring Sequences on Graphics Processing Units” Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda and Kouichi Sakurai

     詳細を見る

    “Parallelization of QUAD Stream Cipher using Linear Recurring Sequences on Graphics Processing Units”

  • 第26回 独創性を拓く 先端技術大賞 経済産業大臣賞

    2012年7月   日本工業新聞社主催 審査委員会は文部科学省、経済産業省、フジサンケイ ビジネスアイ、フジサンケイグループ関係者から構成   2005年からKDDI研究所と共同で設計開発した 高速ストリーム暗号 アルゴリズム「KCipher-2」の標準化が、2011年に成功しISO国際標準規格として採用された。 「KCipher-2」は、KDDI研と下名が共同で設計し、KDDI研によって商用化された高速ストリーム暗号アルゴリズムである。 「KCipher-2」は、携帯電話機等の小型で処理能力が限られた機器や大容量データの高速処理向けに設計し、暗号化と復号に同じ鍵を使用する共通鍵暗号方式である。 共通鍵暗号方式で米国標準のAES と比べて、最大10倍の速さで暗号化と復元を実現している。 KDDIとKDDI研は現在、「KCipher-2」の高速・軽量という特徴を生かし、マルチメディアコンテンツ配信やデータセンターなど大容量のデータを扱う分野や、 携帯電話やICカードなどリソースが限られた中で高速な処理を求められる分野に積極的に展開している。 この業績により 2012年に第26回 独創性を拓く 先端技術大賞経済大臣賞をKDDI研究所ともに櫻井は受賞した。

  • JWIS論文賞

    2010年9月   IEICE ICSS研究会   2010年 9月 The 5th Joint Workshop on Information Security (JWIS 2010) Examination about the application to the color image of the digital watermark based on Benford’s Law (論文賞受賞) Jointwork with K.Noda and Y.Ueshige

  • 第4回コンピュータセキュリティシンポジウム優秀論文賞

    2001年11月   情報処理学会  

  • 坂井特別記念賞授賞

    2000年5月   情報処理学会  

  • 情報処理学会論文賞授賞

    2000年5月   情報処理学会  

▼全件表示

論文

  • A statistical verification method of random permutations for hiding countermeasure against side-channel attacks, 査読 国際共著

    Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai

    Journal of Information Security and Applications,   84   2024年8月   ISSN:2214-2126

     詳細を見る

    担当区分:最終著者   記述言語:英語   掲載種別:研究論文(学術雑誌)   出版者・発行元:Elsevier  

    Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today’s Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its “shufflability” in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher–Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called “approximate permutation criterion” (“APC”). We use it to examine some known cases of misused FY shuffling (i–iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called “kth order permutation verification”, the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (χ2) distribution test.
    Keywords: Side channel attack; Countermeasure; Shuffling; Hiding method; Random permutation; Post-quantum cryptography

    DOI: https://doi.org/10.1016/j.jisa.2024.103797

    オープンデータURL: https://www.sciencedirect.com/science/article/pii/S2214212624001005

  • Learning asymmetric encryption using adversarial neural networks. 査読 国際誌

    Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai

    Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023)   2023年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: https://doi.org/10.1016/j.engappai.2023.106220

    その他リンク: https://www.sciencedirect.com/science/article/abs/pii/S0952197623004049?via%3Dihub

  • Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. 招待 査読 国際誌

    #Haibo ZHANG, @Kouichi SAKURAI

    IEEE Access 9: 48157-48173 (2021)   2021年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 0.1109/ACCESS.2021.3065872.

    その他リンク: https://ieeexplore.ieee.org/document/9378511

  • Neural Networks-Based Cryptography: A Survey. 査読 国際誌

    #Ishak Meraouche, @Sabyasachi Dutta, @Haowen Tan, @Kouichi Sakurai:

    IEEE Access 9: 124727-124740 (2021)   2021年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/ACCESS.2021.3109635

  • One Pixel Attack for Fooling Deep Neural Networks 査読 国際誌

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    IEEE Transactions on Evolutionary Computation   23 ( 5 )   828 - 841   2019年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TEVC.2019.2890858

  • Light Weight Write Mechanism for Cloud Data 査読 国際誌

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TPDS.2017.2782253

  • A proposal of event study methodology with Twitter sentimental analysis for risk management. 査読 国際誌

    Tomohisa ISHIKAWA, Kouichi Sakurai

    Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017, Beppu, Japan, January 5-7, 2017. ACM 2017,   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    その他リンク: http://dl.acm.org/citation.cfm?id=3022240

  • Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. 査読 国際誌

    Takanori SSUGA, Takashi NISHIDE, Kouichi Sakurai

    Security and Communication Networks   9 ( (12) )   1717 - 1725   2016年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: DOI: 10.1002/sec.876

    その他リンク: http://onlinelibrary.wiley.com/doi/10.1002/sec.876/abstract

  • A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints 招待 査読 国際誌

    Chunlu Chen, Hiroaki ANADA, Junpei Kawamoto, Kouichi Sakurai

    Journal of Internet Services and Information Security, Volume 6   2016年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • PLAINTEXT CHECKABLE ENCRYPTION WITH DESIGNATED CHECKER 査読 国際誌

    Angsuman Das, Avisheck Adhikari, Kouichi Sakurai

    ADVANCES IN MATHEMATICS OF COMMUNICATIONS   9 ( 1 )   2015年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.3934/amc.2015.9.37

  • Fast Implementation of KCipher-2 for Software and Hardware 査読

    Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake,, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Trans.   97 ( D(1) )   43 - 52   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Secure and Privacy Preserving Hierarchical Wireless Sensor Networks using Hybrid Key Management Technique

    Sushimita Ruj, Kouichi Sakurai

    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)   2013年12月

     詳細を見る

    記述言語:英語  

    DOI: 10.1109/GLOCOM.2013.6831104

  • K2: A Stream Cipher Algorithm using Dynamic Feedback Control. 査読 国際誌

    Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:

    SECRYPT 2007   2007年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Addressing causality: participatory evaluation on improvisational drama workshops for people with dementia and their carers

    Nakamura, M; Sejima, K; Sakurai, K; Nagashima, Y; Yao, YY

    CULTURAL TRENDS   2024年9月   ISSN:0954-8963 eISSN:1469-3690

  • FOREWORD

    SAKURAI Kouichi

    IEICE Transactions on Information and Systems   E107.D ( 9 )   1110 - 1111   2024年9月   ISSN:09168532 eISSN:17451361

     詳細を見る

    記述言語:英語   出版者・発行元:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.1587/transinf.2023bcf0001

    CiNii Research

  • Special Section on Security and Privacy in Blockchain

    Sakurai, K

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E107D ( 9 )   1110 - 1111   2024年9月   ISSN:0916-8532 eISSN:1745-1361

     詳細を見る

  • A statistical verification method of random permutations for hiding countermeasure against side-channel attacks

    Park, JY; Ju, JW; Lee, WN; Kang, BG; Kachi, Y; Sakurai, K

    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS   84   2024年8月   ISSN:2214-2126 eISSN:2214-2134

     詳細を見る

    出版者・発行元:Journal of Information Security and Applications  

    Hiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today's Post-Quantum Cryptography (PQC), hiding countermeasure has earned the limelight for its “shufflability” in lattice-based, and code-based, cryptographic algorithms. In this narrative, most importantly, as a rule, fast generation of permutations is paramount to both efficacy and security of an algorithm. The Fisher–Yates (FY) shuffling method has long been a popular choice for this purpose: the FY method generates randomly shuffled (finite) indices. However, despite its theoretical verity, with the FY method we anticipate the following risks of misuse, which can lead to biased shuffling sequences: (i) incorrect implementation, (ii) poor random source, and (iii) the chosen random number being too small. In this paper, we introduce a new statistical test called “approximate permutation criterion” (“APC”). We use it to examine some known cases of misused FY shuffling (i–iii). APC takes into consideration the fact that the super-exponential rate of growth of the factorial function N!, which represents the number of permutations of N indices, defies any meaningful form of statistical tests. With APC one can verify whether the output permutations are biased or not with much lower testing cost. Mathematically, in this paper we introduce the so-called “kth order permutation verification”, the underpinning notion upon which APC is based. We also compare APC with full sample space to demonstrate how well it encapsulates the statistical randomness of random permutations. We thereby provide a new method that identifies a bias that exists in the output permutations when implementing FY Shuffling through a visual ratio test and the chi-square (χ2) distribution test.

    DOI: 10.1016/j.jisa.2024.103797

    Web of Science

    Scopus

  • A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy 査読

    Yiluo Liu, Yaokai Feng, Kouichi Sakurai

    The 18th International Conference on Ubiquitous Information Management and Communication, IEEE   1 - 8   2024年1月   ISBN:9798350331011

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:Proceedings of the 2024 18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024  

    The accelerated advancement and ubiquitous adoption of smart vehicles, coupled with the Internet of Things (IoT), has propelled the Internet of Vehicles (IoV) to prominence as a pivotal and expansive area of research within the IoT sphere. An important challenge in IoV design lies in the efficient execution of data storage and sharing mechanisms. The successful implementation of blockchain technology across various disciplines has sparked intrigue amongst researchers to unearth its potential applicability within the IoV context. In the related works, Blockchain-based IoV systems are usually composed of three layers: the vehicle layer, the roadside units (RSUs) layer, and the blockchain or cloud layer. The RSUs layer is often required to perform numerous tasks throughout the system. Stability during rush hours is worth considering. RSUs need to receive a lot of data during rush hours and may also undertake data computing tasks. Based on the characteristics of distributed ledges, the issue of substantial storage overhead looms as a complex problem with the escalating size of the block list. Although some solutions are being proposed, such as fragmented ledger, there are still security concerns. Data security cannot be guaranteed while reducing storage overhead. To combat the stability and cost concerns associated with Roadside Units (RSUs), we delegate the majority of RSU functionalities to other layers of the system. Further, we incorporate a secure blockchain strategy - deploying an outer and inner blockchain to fortify the security and resilience of the overall blockchain network. Based on the autonomous execution characteristics of smart contracts, we try to use smart contracts for data transmission. We use Solidity to write the smart contract and test it on the Remix IDE with the aim of testing the smart contract's operability in terms of data transmission. We scrutinise the data transmission process via smart contracts, and the empirical results corroborate the effectiveness of our uniquely designed process.

    DOI: 10.1109/IMCOM60618.2024.10418375

    Scopus

    researchmap

  • SoK: Directions and Issues in Formal Verification of Payment Protocols

    Sakurada, H; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024   202   111 - 119   2024年   ISSN:2367-4512 ISBN:978-3-031-57915-8

     詳細を見る

    出版者・発行元:Lecture Notes on Data Engineering and Communications Technologies  

    Consumers use various payment methods to purchase goods and services from retailers, such as cash, credit cards, debit cards, prepaid cards, and barcodes/two-dimensional codes. In the past, in the case of in-store payments using credit cards, the in-store terminal read the card number from the magnetic strip on the card and sent it with other purchase information to the credit card network. Recently, to prevent counterfeiting, the IC chip on the credit card and the in-store terminal communicates to authenticate each other and process the payment transaction. The medium of communication is not only contact but also contactless (“touch" payment), Moreover, the in-store terminal may process the payment either online or offline and optionally may require the customer to input their PIN. Various protocols and protocol flows are used depending on the medium and how the payment is processed. Credit cards are also used for remotely purchasing goods or services; in this case, other protocols and protocol flows are used. In some such protocols, researchers found serious security flaws that allow a malicious party to fraudulently purchase goods in such a way that is not allowed for legitimate customers. Such flaws must be fixed, but it is hard to fix and deploy protocols after they are widely used. Formal verification is a method to analyze and verify the security of such protocols and to detect flaws before they are widely deployed. In this paper, we will discuss the research trends in formal verification of the security of various cashless payment protocols, as well as future issues.

    DOI: 10.1007/978-3-031-57916-5_10

    Web of Science

    Scopus

  • Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks

    Sakurada H., Sakurai K.

    Communications in Computer and Information Science   2095 CCIS   248 - 259   2024年   ISSN:18650929 ISBN:9789819744640

     詳細を見る

    出版者・発行元:Communications in Computer and Information Science  

    This paper reviews current research trends in the formal verification of computer network configurations, specifically focusing on formal verification for software-defined networking (SDN). We explore the challenges encountered when applying formal verification, comparing its application to pre-SDN network verification efforts. Additionally, we discuss the potential application of formal verification in mobile networks. We first provide an overview of research on the formal verification of virtual LAN (VLAN) configurations, which predates the emergence of SDN. We next illustrate SDN and existing research applying formal verification to SDN. Finally, we briefly examine potential scenarios for applying formal verification to mobile networks.

    DOI: 10.1007/978-981-97-4465-7_18

    Scopus

  • Extension of Resource Authorization Method with SSI in Edge Computing

    Watanabe, R; Kubota, A; Kurihara, J; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024   204   385 - 394   2024年   ISSN:2367-4512 ISBN:978-3-031-57941-7

  • Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies

    Zhang, HB; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024   201   151 - 162   2024年   ISSN:2367-4512 ISBN:978-3-031-57869-4

  • Enhancing Security and Efficiency: A Lightweight Federated Learning Approach

    Chen, CL; Wang, KIK; Li, P; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024   202   349 - 359   2024年   ISSN:2367-4512 ISBN:978-3-031-57915-8

     詳細を見る

    出版者・発行元:Lecture Notes on Data Engineering and Communications Technologies  

    Recently, as big data and AI technology advance, data privacy and security are increasingly critical. Federated Learning (FL) has become a key solution in machine learning to address these concerns. In this paper, we present a secure and lightweight FL scheme. It employs masking and Secret Sharing (SS) to securely aggregate data from distributed clients, thereby reducing the demands of model training on system resources. The scheme also computes data similarity among clients to evaluate each client’s contribution, defending against challenges posed by malicious clients. This approach safeguards privacy, facilitates accurate model updates, and addresses the challenges of limited resources in edge computing environments. We subjected our framework to rigorous validation using MNIST datasets. Experimental outcomes unequivocally substantiate the efficacy of our proposed methodology.

    DOI: 10.1007/978-3-031-57916-5_30

    Web of Science

    Scopus

  • Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds

    Lyu, Y; Feng, YK; Sakurai, K

    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024   202   133 - 144   2024年   ISSN:2367-4512 ISBN:978-3-031-57915-8

     詳細を見る

    出版者・発行元:Lecture Notes on Data Engineering and Communications Technologies  

    The DDoS attack remains one of the leading attacks today. To reduce the number of resource-consuming detection algorithm calls, the trigger-based two-stage detection approach has been proposed. In such systems, trigger mechanisms, including trigger features and threshold update algorithms, play an important role in detection performance. It is also important what features are used in the second stage of detection. In this study, 1) we introduce a Riemannian manifold metric (work) as a trigger feature for the first time since it was proven that traffic data is a Riemannian manifold; 2) we propose a new mechanism to update the trigger threshold based on historical flow data and the feedback of the second-stage detection results; 3) the feature selection algorithm ECOFS is used for the second stage detection. Experimental results using public datasets show that our proposal calls much less of the second-stage detection than the latest trigger-based two-step detection systems.

    DOI: 10.1007/978-3-031-57916-5_12

    Web of Science

    Scopus

  • A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments

    Chen Chunlu, Wang Kevin I-Kai, Li Peng, Sakurai Kouichi

    International Journal of Networking and Computing   14 ( 2 )   123 - 144   2024年   ISSN:21852839 eISSN:21852847

     詳細を見る

    記述言語:英語   出版者・発行元:IJNC Editorial Committee  

    In the rapidly evolving field of machine learning, the adoption of traditional approaches often encounters limitations, such as increased computational costs and the challenge of catastrophic forgetting, particularly when models undergo retraining with new datasets. This issue is especially pronounced in environments that require the ability to swiftly adapt to changing data landscapes. Continual learning emerges as a pivotal solution to these challenges, empowering models to assimilate new information while preserving the knowledge acquired from previous learning phases. Despite its benefits, the continual learning process's inherent need to retain prior knowledge introduces a potential risk for information leakage.

    Addressing these challenges, we propose a Federated Continual Learning (FCL) framework with a multi-head neural network model. This approach blends the privacy-preserving capabilities of Federated Learning (FL) with the adaptability of continual learning, ensuring both data privacy and continuous learning in edge computing environments. Moreover, this framework enhances our approach to adversarial training, as the constant influx of diverse and complex training data allows the model to improve its understanding and adaptability, thereby strengthening its defenses against adversarial threats.
    Our system features a architecture with dedicated fully-connected layers for each task, ensuring that unique features pertinent to each task are accurately captured and preserved over the model's lifetime. Data undergoes processing through these task-specific layers before a final label is determined, based on the highest prediction value. This method exploits the model's full range of knowledge, significantly boosting prediction accuracy. We have conducted thorough evaluations of our FCL framework on two benchmark datasets, MNIST and CIFAR-10, with the results clearly validating the effectiveness of our approach.

    DOI: 10.15803/ijnc.14.2_123

    CiNii Research

  • Secured tracing for group signatures from attribute-based encryption

    Perera, MNS; Matsunaka, T; Yokoyama, H; Sakurai, K

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE   36 ( 15 )   2023年12月   ISSN:1532-0626 eISSN:1532-0634

     詳細を見る

    出版者・発行元:Concurrency and Computation: Practice and Experience  

    This article presents a tracing mechanism for group signatures answering the security threats of malicious authorities and users' forgeries. The proposal weakens the high trust placed on the centralized tracing party in previous group signatures by decentralizing tracing power using a multiple tracer setting and limiting the tracers' access using attribute-based encryption and the requirement of the group manager's agreement. We allow the group manager to control tracers identifying his group users. Instead of a centralized tracer, our setting has multiple tracers possessing attribute sets. Thus, after getting the group manager's permission, a tracer should satisfy the access policy in a given signature to identify the signer. On the other hand, our group signature scheme decentralizes the tracing key generation and removes the group manager's tracing ability. Thus, it ensures that only the attribute-satisfying and permitted tracers can identify the signer. Moreover, this article delivers security against malicious users. It presents a verification process of access policy of the signatures to prevent users from utilizing invalid attributes for signing. In addition, the article delivers a collaborative tracing mechanism to satisfy attribute sets that a tracer fails to fulfill alone for identifying a signer. Thus, our tracing mechanism ensures security against malicious authorities and group users in group signatures. The article gives the general construction of the scheme and discusses the security.

    DOI: 10.1002/cpe.7986

    Web of Science

    Scopus

  • An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks

    Tan, HW; Zheng, WY; Vijayakumar, P; Sakurai, K; Kumar, N

    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS   24 ( 12 )   15590 - 15600   2023年12月   ISSN:1524-9050 eISSN:1558-0016

     詳細を見る

    出版者・発行元:IEEE Transactions on Intelligent Transportation Systems  

    In recent years, growing research interest from both industry and academia has been aroused to the vehicular networks, which is regarded as the fundamental component of the modern intelligent transportation system (ITS). Lots of remarkable research outputs with respect to secure vehicular data interactions and user privacy preservation has been witnessed. However, the existing schemes all focus on the common vehicular communication scenarios where facilities are deployed, whereas the secure data exchange in the abnormal infrastructure-less vehicular environment has not been properly investigated. To deal with unpredictable abnormal situations caused by artificial or natural disasters such as earthquakes and floods, a distinctive vehicle-assisted aggregate authentication mechanism for infrastructure-less vehicular networks is presented in this paper. With assistance from the neighboring vehicles, the homomorphic signature involving all requesting vehicles is generated and forwarded to the remaining functional RSUs. Meanwhile, vehicular group communication among the validated entities is enabled. Additionally, the fault-tolerant verification method is adopted such that the ineffective entities can be easily distinguished and removed without interfering with other requesting vehicles. The security proofs and discussions regarding vital security properties are presented, while the performance analysis follows. Compared with the state-of-the-art, advantages in terms of security and performance properties can be proved.

    DOI: 10.1109/TITS.2022.3176406

    Web of Science

    Scopus

  • Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT): Exploring Designated Confirmer Signatures and Blockchain Technology for Non-Fungible Token (NFT) Implementation

    Ikebe K., Hata Y., Nakamura T., Isohara T., Sakurai K.

    ACM International Conference Proceeding Series   119 - 125   2023年10月   ISBN:9798400708534

     詳細を見る

    出版者・発行元:ACM International Conference Proceeding Series  

    The ERC721 standard defines a Non-Fungible Token (NFT) as an identifier that uniquely identifies digital data recorded on a blockchain. The NFT currently in use claim to ensure the uniqueness of the contents associated with the NFT by taking advantage of the tamper-resistant characteristics of the blockchain data. Besides, digital signatures based on public-key encryption is a representative technique to prevent digital data from being falsified, and its application to NFT is also discussed. In this study, we first consider an NFT implementation by applying a designated confirmer signature using an interactive verification method without using blockchain technology. We design an NFT issuance protocol that guarantees the uniqueness of data with a designated confirmer signature, and evaluate the security of the protocol. Moreover, we compare it with existing blockchain implementations. By analyzing the both methods, we aim to provide insights into the potential applications and performance in using designated confirmer signatures for NFT. Our findings contribute to the ongoing research on secure and efficient mechanisms for ensuring the integrity and uniqueness of digital assets in decentralized systems.

    DOI: 10.1145/3634814.3634831

    Scopus

  • Phoenix: A Live Upgradable Blockchain Client

    Wang, CM; Li, P; Fan, XP; Tang, ZY; Zeng, YL; Sakurai, K

    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING   8 ( 4 )   703 - 714   2023年10月   ISSN:2377-3782

     詳細を見る

    出版者・発行元:IEEE Transactions on Sustainable Computing  

    Blockchain is an important supporting technology for various sustainable systems. It relies on a number of distributed nodes running blockchain client software, which is responsible for some critical tasks, such as communicating with other nodes and generating new blocks. However, the quick evolution of blockchain technology brings crucial challenges to blockchain client design. After carefully examining existing blockchain client software, we have identified a critical weakness: Blockchain clients are weak in supporting live upgrades, resulting in a blockchain fork that incurs security concerns and risks. In this article, we propose Phoenix, a novel blockchain client design that is live upgradable. Phoenix uses blockchain service encapsulation to decouple blockchain services. Based on service encapsulation, we propose a live upgrade scheme that packs upgrade codes into blockchain transactions and uses a Just-In-Time engine to avoid service interruption. A parallel execution engine is developed to increase service efficiency. We evaluated Phoenix on a 51-node blockchain, and experimental results show that Phoenix outperforms existing solutions in overhead and upgrade latency.

    DOI: 10.1109/TSUSC.2023.3282586

    Web of Science

    Scopus

  • Learning asymmetric encryption using adversarial neural networks

    Meraouche, I; Dutta, S; Tan, HW; Sakurai, K

    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE   123   2023年8月   ISSN:0952-1976 eISSN:1873-6769

     詳細を見る

    出版者・発行元:Engineering Applications of Artificial Intelligence  

    We propose a multi-agent adversarial neural networks model where a sender (Alice) and a receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their communication from one or more attackers/eavesdroppers. Existing work in the field required shared symmetric information between Alice and Bob before initiating the training process. To the best of our knowledge, this is the first work in which Alice and Bob with asymmetric information can train themselves to protect their communication. Our initial model setup contains five agents: sender Alice, receiver Bob, eavesdropper Eve and two neural networks (we call them public keys generator and private keys generator) that, based on a (secret) random noise from Bob, will generate a pair of public/private keys that allows Alice to encrypt a message with the public key and Bob to decrypt the message with the private key while preventing Eve from decrypting the secret message using the public key. We show that the neural networks are able to establish a communication and secure it from Eve. Finally, we consider adversaries stronger than Eve to model leakage attacks, chosen plaintext attacks (CPA) and test the distinguishability between ciphertexts. The last three experiments show that neural networks (with asymmetric information) can secure the communication providing stronger security guarantees and resilience to leakage attacks which may include leakage from the private key.

    DOI: 10.1016/j.engappai.2023.106220

    Web of Science

    Scopus

  • Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection

    Soni, S; Seal, A; Mohanty, SK; Sakurai, K

    BIOMEDICAL SIGNAL PROCESSING AND CONTROL   85   2023年8月   ISSN:1746-8094 eISSN:1746-8108

     詳細を見る

    出版者・発行元:Biomedical Signal Processing and Control  

    Today, depression is a psychological condition that affects many individuals globally and, if untreated, can negatively impact one's emotions and lifestyle quality. Machine learning (ML) techniques have lately been used to identify mental illnesses using Electroencephalography (EEG) data. These signals are difficult and time-consuming to interpret visually because they are intricate, non-static, and irregular. As a result, computer-assisted early depression detection systems are highly desirable. The study proposes a feature extraction method for each EEG signal channel by building a sparse graph from the complete complex network using a k-round minimum spanning tree. The subjects in the dataset depict the graph's nodes, and their relationship represents the edge weights, which are determined using the Euclidean distance. Then, features from the sparse graph are extracted using the Node2vec approach and fed into classifiers to get a probability score. Finally, a fuzzy ensemble strategy is exploited at the decision level for integrating probability scores to distinguish depressed subjects from healthy people. Several experiments comparing the proposed method to seven other approaches on four publicly available datasets demonstrate the importance and superiority of the proposed strategy. The K-Nearest Neighbor classifier used in the suggested method produces the highest classification accuracy across the four datasets, with scores of 0.916, 0,960, and 0.940 respectively.

    DOI: 10.1016/j.bspc.2023.104873

    Web of Science

    Scopus

  • Ameliorative effects of Fingolimod (FTY720) on microglial activation and psychosis-related behavior in short term cuprizone exposed mice

    Li, SY; Sakurai, K; Ohgidani, M; Kato, TA; Hikida, T

    MOLECULAR BRAIN   16 ( 1 )   59   2023年7月   eISSN:1756-6606

     詳細を見る

  • Current Perspectives on Securing Critical Infrastructures' Supply Chains

    Roman, R; Alcaraz, C; Lopez, J; Sakurai, K

    IEEE SECURITY & PRIVACY   21 ( 4 )   29 - 38   2023年7月   ISSN:1540-7993 eISSN:1558-4046

     詳細を見る

    出版者・発行元:IEEE Security and Privacy  

    Digitalization and industrial paradigms are transforming the landscape of critical infrastructures and supply chains. With emerging technologies, it is possible to deploy services to enhance trust and transparency, but they are susceptible to threats, as discussed in this article.

    DOI: 10.1109/MSEC.2023.3247946

    Web of Science

    Scopus

  • A Review on Machine Unlearning

    Zhang H., Nakamura T., Isohara T., Sakurai K.

    SN Computer Science   4 ( 4 )   2023年7月   ISSN:2662995X

     詳細を見る

    出版者・発行元:SN Computer Science  

    Recently, an increasing number of laws have governed the useability of users’ privacy. For example, Article 17 of the General Data Protection Regulation (GDPR), the right to be forgotten, requires machine learning applications to remove a portion of data from a dataset and retrain it if the user makes such a request. Furthermore, from the security perspective, training data for machine learning models, i.e., data that may contain user privacy, should be effectively protected, including appropriate erasure. Therefore, researchers propose various privacy-preserving methods to deal with such issues as machine unlearning. This paper provides an in-depth review of the security and privacy concerns in machine learning models. First, we present how machine learning can use users’ private data in daily life and the role that the GDPR plays in this problem. Then, we introduce the concept of machine unlearning by describing the security threats in machine learning models and how to protect users’ privacy from being violated using machine learning platforms. As the core content of the paper, we introduce and analyze current machine unlearning approaches and several representative results and discuss them in the context of the data lineage. Furthermore, we also discuss the future research challenges in this field.

    DOI: 10.1007/s42979-023-01767-4

    Scopus

  • 小さな直腸神経内分泌腫瘍に対する縫縮法併用内視鏡的粘膜下層切除術と内視鏡的粘膜下層剥離術の比較 多施設後方視的検討(Comparison of endoscopic submucosal resection with ligation and endoscopic submucosal dissection for small rectal neuroendocrine tumors: A multicenter retrospective study)

    Matsuno Kenshi, Miyamoto Hideaki, Kitada Hideki, Yoshimatsu Shinichi, Tamura Fumio, Sakurai Kouichi, Fukubayashi Kotaro, Shono Takashi, Setoyama Hiroko, Matsuyama Taichi, Suko Shinichiro, Narita Rei, Honda Munenori, Tateyama Masakuni, Naoe Hideaki, Morinaga Jun, Tanaka Yasuhito, Gushima Ryosuke

    DEN Open   3 ( 1 )   1 of 8 - 8 of 8   2023年4月

     詳細を見る

    記述言語:英語   出版者・発行元:John Wiley & Sons Australia, Ltd  

    縫縮法併用内視鏡的粘膜下層切除術(ESMR-L)および内視鏡的粘膜下層剥離術(ESD)はともに<10mmの直腸神経内分泌腫瘍(NET)に対する標準的治療であるが、どちらの成績が良好かに関する合意は得られていない。本稿では、直腸NETに対するESMR-LとESDの有用性を比較した。本研究は、多施設共同後方視的コホート研究で、検討対象は小さな直腸NETに対してESMR-LまたはESDを施行した205例とした。治療成績を単変量解析、多変量解析および傾向スコアを用いた逆確率治療重み付け法(IPTW)で評価した。サブグループ解析として、技術的成功率に対する内視鏡医の経験の影響を評価した。89例がESMR-Lで、116例がESDで治療された。RO切除率には両群間で有意差は認められなかった(90%対92%、P=0.73)。処置時間はESMR-LがESDよりも有意に短く(17分対52分、P<0.01)、入院期間もESMR-L群がESD群よりも有意に短かった(3日対5日、P<0.01)。これらの結果は、IPTW補正後の多変量解析によっても確認された。ESDの処置時間は、経験の浅い内視鏡医で有意に長かったが(49分対70分、P=0.02)、ESMR-Lでは経験による影響は認められなかった(17分対17分、P=0.27)。小さな直腸NETに対して、完全切除率はESMR-LおよびESDのどちらも同様に高かった。しかし、処置時間が短いこと、入院期間が短いことから、ESMR-Lが、特に経験の浅い内視鏡医にとって、より有用性の高い治療法である。

  • A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection

    Lyu Yang, Feng Yaokai, Sakurai Kouichi

    Information   14 ( 3 )   191   2023年3月   eISSN:20782489

     詳細を見る

    記述言語:英語  

    Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce training costs, improve detection performance, and make the detection system lightweight. Many techniques related to feature selection for cyber attack detection have been proposed, and each technique has advantages and disadvantages. Determining which technology should be selected is a challenging problem for many researchers and system developers, and although there have been several survey papers on feature selection techniques in the field of cyber security, most of them try to be all-encompassing and are too general, making it difficult for readers to grasp the concrete and comprehensive image of the methods. In this paper, we survey the filter-based feature selection technique in detail and comprehensively for the first time. The filter-based technique is one popular kind of feature selection technique and is widely used in both research and application. In addition to general descriptions of this kind of method, we also explain in detail search algorithms and relevance measures, which are two necessary technical elements commonly used in the filter-based technique.

    CiNii Research

  • 特集:「AI セキュリティの研究動向」特集「AI セキュリティの研究動向」にあたって

    大塚 玲, 櫻井 幸一

    人工知能   38 ( 2 )   178 - 179   2023年3月   ISSN:21882266 eISSN:24358614

     詳細を見る

    記述言語:日本語   出版者・発行元:一般社団法人 人工知能学会  

    DOI: 10.11517/jjsai.38.2_178

    CiNii Research

  • 機械アンラーニングの研究に関する現状と課題

    張 海波, 櫻井 幸一

    人工知能   38 ( 2 )   197 - 205   2023年3月   ISSN:21882266 eISSN:24358614

     詳細を見る

    記述言語:日本語   出版者・発行元:一般社団法人 人工知能学会  

    DOI: 10.11517/jjsai.38.2_197

    CiNii Research

  • A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection 査読

    Lyu, Y; Feng, YK; Sakurai, K

    INFORMATION   14 ( 3 )   2023年3月   eISSN:2078-2489

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)   出版者・発行元:Information (Switzerland)  

    Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce training costs, improve detection performance, and make the detection system lightweight. Many techniques related to feature selection for cyber attack detection have been proposed, and each technique has advantages and disadvantages. Determining which technology should be selected is a challenging problem for many researchers and system developers, and although there have been several survey papers on feature selection techniques in the field of cyber security, most of them try to be all-encompassing and are too general, making it difficult for readers to grasp the concrete and comprehensive image of the methods. In this paper, we survey the filter-based feature selection technique in detail and comprehensively for the first time. The filter-based technique is one popular kind of feature selection technique and is widely used in both research and application. In addition to general descriptions of this kind of method, we also explain in detail search algorithms and relevance measures, which are two necessary technical elements commonly used in the filter-based technique.

    DOI: 10.3390/info14030191

    Web of Science

    Scopus

    researchmap

  • A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds 査読

    Muyuan Niu, Yaokai Feng, Kouichi Sakurai

    17th International Conference on Ubiquitous Information Management and Communication, IEEE   1 - 7   2023年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: 10.1109/IMCOM56909.2023

    researchmap

  • 自動車の機能としてAI/MLを利用する場合のセキュリティ論証について

    溝口 誠一郎, 櫻井 幸一

    人工知能学会全国大会論文集   JSAI2023 ( 0 )   4D2GS1105 - 4D2GS1105   2023年   eISSN:27587347

     詳細を見る

    記述言語:日本語   出版者・発行元:一般社団法人 人工知能学会  

    <p>国連法規(UN-R155)により,自動車メーカーは自動車がサイバーセキュリティを満たすことを説明しなければならない.自動運転車ではAI/ML技術を用いるため,AL/ML技術に対するセキュリティについて検討する必要がある.本稿では,AI/ML技術を利用する自動車機能のサイバーセキュリティ論証について,その説明戦略について述べる.</p>

    DOI: 10.11517/pjsai.jsai2023.0_4d2gs1105

    CiNii Research

  • マシン・アンラーニングの研究と応用に関する現状と課題

    櫻井 幸一

    人工知能学会全国大会論文集   JSAI2023 ( 0 )   2L1GS1105 - 2L1GS1105   2023年   eISSN:27587347

     詳細を見る

    記述言語:日本語   出版者・発行元:一般社団法人 人工知能学会  

    <p>機械アンラーニング(Machine Unlearning)とは、システムに、記憶しているデータの一部を忘れさせた上で、次の学習訓練を行うことであり、その効率的処理法の研究が注文されている。背景には2016年4月に欧州が制定したGDPR(General Data Protection Regulation, 一般データ保護規則)の尊重する個人データ削除権や、情報漏洩だけではなく、人工知能の訓練データに利用されている個人情報や、芸術作品などのオプトアウトや著作権問題とも深く関係している。本講演では、この研究の現状と課題を紹介する。</p>

    DOI: 10.11517/pjsai.jsai2023.0_2l1gs1105

    CiNii Research

  • Towards Evaluating the Security of Human Computable Passwords Using Neural Networks

    Murata I., He P., Gu Y., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13720 LNCS   303 - 312   2023年   ISSN:03029743 ISBN:9783031256585

     詳細を見る

    出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Passwords are playing a major role for authentication in our daily life. However contemporary passwords are typically either difficult to remember or vulnerable to various attacks. In 2017, Blocki, Blum, Datta and Vempala introduced the concept of human computable passwords as a promising authentication method. The fundamental concerns for designing human computable passwords are their usability and security. So far, the security evaluation on human computable passwords authentication schemes is mainly based on complexity-theoretic analysis. In this paper, we initially investigate the security of human computable passwords against neural network-based adversarial attacks. Specifically, we employ the typical multilayer perceptron (MLP) model to attempt to attack the human computable passwords authentication scheme proposed by Blocki-Blum-Datta-Vempala. We present implementation results and the corresponding analysis as well. Our results imply that it is possible for an MLP to learn a simple function, but is difficult for an MLP to learn piecewise functions well.

    DOI: 10.1007/978-3-031-25659-2_22

    Scopus

  • POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance

    Chen, CL; Wang, KIK; Li, P; Sakurai, K

    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023   13907   685 - 689   2023年   ISSN:0302-9743 ISBN:978-3-031-41180-9 eISSN:1611-3349

     詳細を見る

    出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Federated Learning (FL) and the Internet of Things (IoT) have transformed data processing and analysis, overcoming traditional cloud computing limitations. However, challenges such as catastrophic forgetting in continuous training scenarios arise. To address these, we propose an FL framework that supports continual learning while enhancing system security. We preserve critical knowledge through the incorporation of Knowledge Distillation (KD), addressing the issue of catastrophic forgetting. In addition, we have integrated encryption techniques to secure the updated parameters of clients from potential threats posed by attackers.

    DOI: 10.1007/978-3-031-41181-6_40

    Web of Science

    Scopus

  • POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses

    Zhang, HB; Yao, ZH; Sakurai, K

    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023   13907   690 - 694   2023年   ISSN:0302-9743 ISBN:978-3-031-41180-9 eISSN:1611-3349

     詳細を見る

    掲載種別:論文集(書籍)内論文   出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Over the past decade, the development of both adversarial attack methods and defense strategies has accelerated rapidly. Classification accuracy has been predominantly used as the sole metric for assessing model performance. However, when the reported accuracy rates of two models are identical or very similar, it becomes challenging to determine which model is superior. To address this issue and offer more insights into model performance, this study introduces a novel classification performance metric: the confidence gap. This metric is defined as the difference in confidence level between the true label and either the top 1 prediction or the second-best prediction, depending on the accuracy of the image classification. The confidence level, as indicated by its sign, reflects the correctness of the classification and provides more detailed information on the robustness of the classification result. Recognizing that evaluation results may be inconsistent when employing different criteria, we recommend that future research in this field should report the confidence gap alongside accuracy rates.

    DOI: 10.1007/978-3-031-41181-6_41

    Web of Science

    Scopus

    researchmap

  • Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir’s Secret Sharing Scheme

    Perera M.N.S., Nakamura T., Matsunaka T., Yokoyama H., Sakurai K.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   13983 LNCS   155 - 176   2023年   ISSN:03029743 ISBN:9783031398278

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    This paper delivers a post-quantum construction for group-oriented attribute-based encryption (GO-ABE) using lattice-based cryptography. The GO-ABE scheme enables users from the same group to combine their attributes to satisfy a decryption policy without revealing their secret keys. GO-ABE is particularly useful when no single user can fulfill the decryption policy alone, but a group of users can satisfy it together. Li et al. introduced the idea of GO-ABE at NSS 2015, discussing its importance in accessing patient data during emergencies. However, since Li et al.’s scheme uses bilinear mappings, it is not secure against quantum attacks. To ensure security against quantum attacks, we construct the GO-ABE scheme using the post-quantum cryptographic primitive lattices, and employ Shamir’s secret sharing scheme to meet the GO-ABE requirements.

    DOI: 10.1007/978-3-031-39828-5_9

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/nss/nss2023.html#PereraNMYS23

  • Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments

    Chen C., Wang K.I.K., Li P., Sakurai K.

    Proceedings - 2023 11th International Symposium on Computing and Networking, CANDAR 2023   1 - 10   2023年   ISBN:9798350306705

     詳細を見る

    出版者・発行元:Proceedings - 2023 11th International Symposium on Computing and Networking, CANDAR 2023  

    Federated Learning (FL) and the Internet of Things (IoT) have revolutionized data processing and analysis, overcoming the traditional limitations of cloud computing. However, traditional machine learning strategies lead to increased costs and catastrophic forgetting due to model retraining with new datasets. Continual learning has been proposed to counter this, enabling models to adapt to new data while preserving previous knowledge, which is beneficial for dynamic edge environments. Despite these advantages, the retention of previous knowledge during the continual learning process may lead to the information leakage. To address the inherent challenges of multitask scenarios, we present a Federated Continual Learning (FCL) framework that integrates the privacy-preserving benefits of Federated Learning (FL) into a continual learning system, ensuring both continual learning and privacy preservation in edge computing data processing and analysis. Specifically, our architecture introduces dedicated fully-connected layers for each task. This architecture ensures that distinctive features pertinent to each task are not only captured but also preserved throughout the model's lifespan. Within our framework, data is processed via task-specific layers. Subsequently, the final label is determined by associating it with the paramount prediction value, thus capitalizing on the model's comprehensive knowledge reservoir to bolster prediction accuracy. We subjected our FCL framework to rigorous validation using two benchmark datasets: MNIST and CFAR-10. Experimental outcomes unequivocally substantiate the efficacy of our proposed methodology.

    DOI: 10.1109/CANDAR60563.2023.00009

    Scopus

  • Factors associated with postpartum smoking relapse at early postpartum period of Japanese women in the Japan Environmental and Children's Study

    Anai, A; Asato, K; Tatsuta, N; Sakurai, K; Ota, C; Kuriyama, S; Sugawara, J; Arima, T; Yaegashi, N; Nakai, K

    ENVIRONMENTAL HEALTH AND PREVENTIVE MEDICINE   28   56   2023年   ISSN:1342-078X eISSN:1347-4715

     詳細を見る

  • Explicit Non-malleable Codes from Bipartite Graphs

    Satake, S; Gu, Y; Sakurai, K

    ARITHMETIC OF FINITE FIELDS, WAIFI 2022   13638   221 - 236   2023年   ISSN:0302-9743 ISBN:978-3-031-22943-5 eISSN:1611-3349

     詳細を見る

    掲載種別:論文集(書籍)内論文   出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Non-malleable codes are introduced to protect the communication against adversarial tampering of data, as a relaxation of the error-correcting codes and error-detecting codes. To explicitly construct non-malleable codes is a central and challenging problem which has drawn considerable attention and been extensively studied in the past few years. Recently, Rasmussen and Sahai built an interesting connection between non-malleable codes and (non-bipartite) expander graphs, which is the first explicit construction of non-malleable codes based on graph theory other than the typically exploited extractors. So far, there is no other graph-based construction for non-malleable codes yet. In this paper, we aim to explore more connections between non-malleable codes and graph theory. Specifically, we first extend the Rasmussen-Sahai construction to bipartite expander graphs. Accordingly, we establish several explicit constructions for non-malleable codes based on Lubotzky-Phillips-Sarnak Ramanujan graphs and generalized quadrangles, respectively. It is shown that the resulting codes can either work for a more flexible split-state model or have better code rate in comparison with the existing results.

    DOI: 10.1007/978-3-031-22944-2_14

    Web of Science

    Scopus

    researchmap

  • Eliminating Adversarial Perturbations Using Image-to-Image Translation Method

    Zhang, HB; Yao, ZH; Sakurai, K

    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023   13907   601 - 620   2023年   ISSN:0302-9743 ISBN:978-3-031-41180-9 eISSN:1611-3349

     詳細を見る

    掲載種別:論文集(書籍)内論文   出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Convolutional neural networks are widely used for image recognition tasks, but they are vulnerable to adversarial attacks that can cause the model to misclassify an image. Such attacks pose a significant security risk in safety-critical applications like facial recognition and autonomous driving. Researchers have made progress in defending against adversarial attacks through two approaches: enhancing the neural networks themselves to be more robust and removing the perturbation added to the image through pre-processing. This paper is based upon a recent defense model that belongs to the latter approach, which utilizes image-to-image translation to regenerate images perturbed by adversarial attacks. We optimized the training process of their model and tested the model performance against more recent and strong attacks. The results show that the model is able to regenerate images attacked by the state-of-the-art attack, the AutoAttack, and restores the classification accuracy to a level over 83% to that of the original images.

    DOI: 10.1007/978-3-031-41181-6_32

    Web of Science

    Scopus

    researchmap

  • A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds

    Niu M., Feng Y., Sakurai K.

    Proceedings of the 2023 17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023   2023年   ISBN:9781665453486

     詳細を見る

    出版者・発行元:Proceedings of the 2023 17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023  

    Software-defined networking (SDN) has received a lot of attention in academia and industry in recent years, and DDoS attacks are still one of the most dangerous threats. As cyberattacks become more sophisticated, detection systems also become more complex and computationally intensive, for example, Deep Learning-based detection. Against this background, two-stage detection is proposed, in which a trigger is introduced before the complex detection being invoked. That is, the heavy detection module is called only when the requirements in the trigger are satisfied. Clearly, the triggering mechanism plays an important role in such detection systems as it determines when the second stage is invoked. Most of the existing relevant studies utilize one feature and a fixed threshold. However, it is not easy to predefine suitable thresholds in practice, and one feature is often not sufficient for effective trigger conditions that have a significant impact on detection performance of the whole detection system. The latest related work uses dynamic thresholding, but still only one feature, and the threshold adaptation mechanism is too simplistic, which make it too difficult to be used in real applications. Moreover, the performance of the approach in the most of related works are verified only using simulated data. In this study, we increase the number of features and optimized the threshold adjustment method in the trigger. In addition, in the detection module of the second stage, six features carefully determined from traffic bytes, packets, and IP addresses are used. The performance of the proposal is demonstrated in a simulated SDN environment using a public dataset. The experimental results indicate that the times of calling the computationally intensive detection module is significantly reduced, while at the same time the detection performance of the overall system is not degraded.

    DOI: 10.1109/IMCOM56909.2023.10035661

    Scopus

  • A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network

    He, PJ; Zhang, HB; Feng, YK; Sakurai, K

    SCIENCE OF CYBER SECURITY, SCISEC 2023   14299   513 - 523   2023年   ISSN:0302-9743 ISBN:978-3-031-45932-0 eISSN:1611-3349

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Temporal Convolution Network(TCN) has recently been introduced in the cybersecurity field, where two types of TCNs that consider causal relationships are used: causal TCN and non-causal TCN. Previous researchers have utilized causal and non-causal TCNs separately. Causal TCN can predict real-time outcomes, but it ignores traffic data from the time when the detection is activated. Non-causal TCNs can forecast results more globally, but they are less real-time. Employing either causal TCN or non-causal TCN individually has its drawbacks, and overcoming these shortcomings has become an important topic. In this research, we propose a method that combines causal and non-causal TCN in a contingent form to improve detection accuracy, maintain real-time performance, and prevent long detection time. Additionally, we use two datasets to evaluate the performance of the proposed method: NSL-KDD, a well-known dataset for evaluating network intrusion detection systems, and MQTT-IoT-2020, which simulates the MQTT protocol, a standard protocol for IoT machine-to-machine communication. The proposed method in this research increased the detection time by about 0.1ms compared to non-causal TCN when using NSL-KDD, but the accuracy improved by about 1.5%, and the recall improved by about 4%. For MQTT-IoT-2020, the accuracy improved by about 3%, and the recall improved by about 7% compared to causal TCN, but the accuracy decreased by about 1% compared to non-causal TCN. The required time was shortened by 30ms (around 30%), and the recall was improved by about 7%.

    DOI: 10.1007/978-3-031-45933-7_30

    Web of Science

    Scopus

    researchmap

  • On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms

    Gu, YJ; Akao, S; Esfahani, NN; Miao, Y; Sakurai, K

    IEEE TRANSACTIONS ON INFORMATION THEORY   68 ( 10 )   6904 - 6914   2022年10月   ISSN:0018-9448 eISSN:1557-9654

     詳細を見る

    出版者・発行元:IEEE Transactions on Information Theory  

    All-or-nothing transforms (AONTs) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONTs and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t,s,v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X|Y) about any t inputs X that is not revealed by any s-t outputs Y. In particular, we establish the general lower and upper bounds on H(X|Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.

    DOI: 10.1109/TIT.2022.3174008

    Web of Science

    Scopus

  • On the Security Properties of Combinatorial All-or-nothing Transforms

    Gu Y., Akao S., Esfahani N.N., Miao Y., Sakurai K.

    IEEE International Symposium on Information Theory - Proceedings   2022-June   1447 - 1452   2022年6月   ISSN:21578095 ISBN:9781665421591

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:IEEE International Symposium on Information Theory - Proceedings  

    All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have many applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs s-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs s-tuples are equiprobable, and has weak security provided that all the inputs s-tuples are with non-zero probability. This paper aims to explore on the gap between perfect security and weak security for combinatorial (t, s, v)-AONTs. Concretely, we consider the typical scenario that all the s inputs take values independently (but not necessarily identically) and quantify the amount of information H(X|Y) about any t inputs X that is not revealed by any s-t outputs Y. In particular, we establish the general lower and upper bounds on H(X|Y) for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases.

    DOI: 10.1109/isit50566.2022.9834366

    Scopus

    researchmap

  • On the security properties of combinatorial all-or-nothing transforms 招待 査読 国際誌

    Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, and Kouichi Sakurai

    Proceedings of 2022 IEEE International Symposium on Information Theory   2022年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Certificate Management Scheme for VANETs Using Blockchain Structure

    Perera, MNS; Nakamura, T; Hashimoto, M; Yokoyama, H; Cheng, CM; Sakurai, K

    CRYPTOGRAPHY   6 ( 2 )   20 - 20   2022年6月   eISSN:2410-387X

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:Cryptography  

    Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), play an important role in Intelligent Transportation Systems (ITS). Via wireless technology, vehicles exchange information related to road conditions and their status, and, thereby, VANETs enhance transportation safety and efficiency. A critical aspect of VANETs is providing privacy for the vehicles. The employment of pseudonym certificates is a well-known solution to the privacy problems in VANETs. However, certificate management faces challenges in renewing certificates and revoking vehicles. The centralized certificate management, especially resulting in the delay of the revocation process, harms the nodes of VANETs. This paper proposes a blockchain structure-based certificate management for VANETs and voting-based revocation to halt misbehaving vehicles’ actions. Moreover, this paper presents extended privacy for the participants of the voting process using ring signatures.

    DOI: 10.3390/cryptography6020020

    Web of Science

    Scopus

    researchmap

  • Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing

    Debnath, SK; Srivastava, V; Mohanty, T; Kundu, N; Sakurai, K

    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS   66   103127 - 103127   2022年5月   ISSN:2214-2126 eISSN:2214-2134

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:Journal of Information Security and Applications  

    Contact tracing has emerged as a powerful and effective measure to curb the spread of contagious diseases. It is a robust tool, but on the downside, it possesses a risk of privacy violations as contact tracing requires gathering a lot of personal information. So there is a need for a cryptographic primitive that obfuscate the personal data of the user. Taking everything into account, private set intersection seems to be the natural choice to address the problem. Nearly all of the existing PSI protocols are relying on the number theoretic assumption based hard problems. However, these problems are not secure in quantum domain. As a consequence, it becomes essential to designing PSI that can resist quantum attack and provide long-term security. One may apply quantum cryptography to develop such PSI protocol. This paper deals with the design of PSI using quantum cryptography (QC), where the security depends on the principles of basic quantum mechanics. Our scheme achieves long-term security and remains secure against quantum attacks due to the use of QC. As opposed to the existing quantum PSI protocols, the communication and computation costs of our scheme are independent of the size of universal set. Particularly, our proposed protocol attains optimal communication cost in the context of quantum PSI. In addition, our designed protocol needs smaller amount of measurements. Moreover, we require only single photon quantum resources and simple single-particle projective measurements, unlike most of the existing quantum PSI protocols.

    DOI: 10.1016/j.jisa.2022.103127

    Web of Science

    Scopus

    researchmap

  • A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

    Perera, MNS; Nakamura, T; Hashimoto, M; Yokoyama, H; Cheng, CM; Sakurai, K

    CRYPTOGRAPHY   6 ( 1 )   3 - 3   2022年3月   eISSN:2410-387X

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:Cryptography  

    This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability. Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings. Any group user can produce a signature while hiding his identity in a group. Although group signatures have predefined group settings, ring signatures allow users to form ad-hoc groups. Preserving user identities provided an advantage for group and ring signatures. Thus, presently many applications utilize them. However, standard group signatures enable an authority to freely revoke signers’ anonymity. Thus, the authority might weaken the anonymity of innocent users. On the other hand, traditional ring signatures maintain permanent user anonymity, allowing space for malicious user activities; thus achieving the requirements of privacy-preserved traceability in group signatures and controlled anonymity in ring signatures has become desirable. This paper reviews group and ring signatures and explores the existing approaches that address the identification of malicious user activities. We selected many papers that discuss balancing user tracing and anonymity in group and ring signatures. Since this paper scrutinizes both signatures from their basic idea to obstacles including tracing users, it provides readers a broad synthesis of information about two signature schemes with the knowledge of current approaches to balance excessive traceability in group signatures and extreme anonymity in ring signatures. This paper will also shape the future research directions of two critical signature schemes that require more awareness.

    DOI: 10.3390/cryptography6010003

    Web of Science

    Scopus

    researchmap

  • A Privacy-Preserving Data Feed Scheme for Smart Contracts

    Wang, H; Liu, Z; Ge, CP; Sakurai, K; Su, CH

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E105.D ( 2 )   195 - 204   2022年2月   ISSN:09168532 eISSN:17451361

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)   出版者・発行元:一般社団法人 電子情報通信学会  

    SUMMARY Smart contracts are becoming more and more popular in financial scenarios like medical insurance. Rather than traditional schemes, using smart contracts as a medium is a better choice for both participants, as it is fairer, more reliable, more efficient, and enables real-time payment. However, medical insurance contracts need to input the patient’s condition information as the judgment logic to trigger subsequent execution. Since the blockchain is a closed network, it lacks a secure network environment for data interaction with the outside world. The Data feed aims to provide the service of the on-chain and off-chain data interaction. Existing researches on the data feed has solved the security problems on it effectively, such as Town Crier, TLS-N and they have also taken into account the privacy-preserving problems. However, these schemes cannot actually protect privacy because when the ciphertext data is executed by the contract, privacy information can still be inferred by analyzing the transaction results, since states of the contract are publicly visible. In this paper, based on zero-knowledge proof and Hawk technology, a on-and-off-chain complete smart contract data feed privacy-preserving scheme is proposed. In order to present our scheme more intuitively, we combined the medical insurance compensation case to implement it, which is called MIPDF. In our MIPDF, the patient and the insurance company are parties involved in the contract, and the hospital is the data provider of data feed. The patient’s medical data is sent to the smart contract under the umbrella of the zero-knowledge proof signature scheme. The smart contract verifies the proof and calculates the insurance premium based on the judgment logic. Meanwhile, we use Hawk technology to ensure the privacy of on-chain contract execution, so that no information will be disclosed due to the result of contract execution. We give a general description of our scheme within the Universal Composability (UC) framework. We experiment and evaluate MIPDF on Ethereum for in-depth analysis. The results show that our scheme can securely and efficiently support the functions of medical insurance and achieve complete privacy-preserving.

    DOI: 10.1587/transinf.2021bci0001

    Web of Science

    Scopus

    CiNii Research

    researchmap

  • Tree Parity Machine-Based Symmetric Encryption: A Hybrid Approach

    Meraouche, I; Dutta, S; Tan, H; Sakurai, K

    MATHEMATICS AND COMPUTING, ICMC 2022   415   61 - 73   2022年   ISSN:2194-1009 ISBN:978-981-19-9309-1

     詳細を見る

    出版者・発行元:Springer Proceedings in Mathematics and Statistics  

    In a symmetric key encryption the sender and the receiver must possess the same pre-distributed key in order to encrypt or decrypt the exchanged messages. Exchanging symmetric keys is a challenging issue in cryptography. In this paper, we put forward a symmetric key encryption technique that does not require any common pre-shared “knowledge” between the parties. More specifically, we use a type of neural network called Tree Parity Machines (TPMs) which, when synchronized, enable two parties to reach a common state. The common state can be used to establish a common secret key. Our method makes use of the Tree Parity Machines to reach a common state between the parties communicating and encrypt the communications with an ElGamal-type encryption methodology. The advantage of our implementation is that the initial key exchange method is fast, lightweight and believed to become a post-quantum candidate. We have analyzed the randomness of the produced ciphertexts from our system using NIST randomness tests and the results are included in the paper. We also demonstrate security against chosen plaintext attacks.

    DOI: 10.1007/978-981-19-9307-7_6

    Web of Science

    Scopus

  • Towards the Design of Locally Differential Private Hardware System for Edge Computing

    Taguchi, K; Sakurai, K; Iida, M

    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING, CANDAR   186 - 191   2022年   ISSN:2379-1888 ISBN:978-1-6654-7530-3

     詳細を見る

    出版者・発行元:Proceedings - 2022 10th International Symposium on Computing and Networking, CANDAR 2022  

    A challenging issue for edge computing is how to correct meaningful information from sensor data while keeping the privacy of the data and individuals. One approach is given by the recent work [Choi et al. 'Guaranteeing Local Differential Privacy on Ultra-Low-Power Systems' 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)]. They point out that low resolution and fixed point characteristics of Ultra-Low-Power implementations may break privacy guarantees due to the low quality of noising. For overcoming this weakness, they introduce the techniques of resampling and thresholding. They also implemented in hardware to show the proposed method achieves both low overhead and high utility while keeping local differential privacy, with sensor/IoT benchmarks. Whereas, this research show some flaw in the existing work above and improve the method. We give the case in which infinite privacy loss still occurs because of low resolution even though the width of the output distribution is restricted, which was not investigated yet by the original paper of ISCA2018. Our major contribution is to propose an improvement to avoid privacy loss from low resolution and to enhance privacy protection in this circuit. Furthermore, we report the experimental results with software simulations, which guarantees the utility of our improving method. Finally, we discuss the power and limitation of our improved method with future challenging issues.

    DOI: 10.1109/CANDAR57322.2022.00033

    Web of Science

    Scopus

  • POSTER: Decentralized and Collaborative Tracing for Group Signatures

    Perera, MNS; Nakamura, T; Hashimoto, M; Yokoyama, H; Cheng, CM; Sakurai, K

    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY   1258 - 1260   2022年   ISBN:978-1-4503-9140-5

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security  

    We propose a decentralized but collaborative attribute-based tracing mechanism (a signer-identifying mechanism) for group signatures. Instead of a central tracing party in our scheme, a set of tracers satisfying the attribute set used for generating the group signature can identify the signer. Thus our proposal limits the parties who can identify the signer. On the other hand, it decentralized the tracing authority.

    DOI: 10.1145/3488932.3527295

    Web of Science

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/asiaccs/asiaccs2022.html#PereraNHYCS22

  • POSTER: A Systematic Study of Bulletin Board and Its Application

    Suwito, MH; Tama, BA; Santoso, B; Dutta, S; Tan, HW; Yoshifumi, U; Sakurai, K

    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY   1213 - 1215   2022年   ISBN:978-1-4503-9140-5

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security  

    Any person can post arbitrary strings on the bulletin board. Following publication on bulletin board, a party receives a "evidence"that the intended data were posted. The bulletin board is open to the public, which means that anyone can view its contents. The fundamental security criteria for a BB are that its contents cannot be deleted, and that no evidence of publication can be falsified. BB was commonly perceived as a trusted and publicly verifiable channel. It formed the backbone of many important protocols such as e-voting, secure multi-party computation etc. and quite often it was assumed to exist to support the execution of the main protocol. After the advent of blockchain technology, BB systems has found a strong footing regarding its implementation in a distributed manner. In this paper, we aim to provide a concise summary of the evolution of bulletin board, its implementation issues and security analysis with an emphasis on its impact to e-voting systems.

    DOI: 10.1145/3488932.3527280

    Web of Science

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/asiaccs/asiaccs2022.html#SuwitoTSDTUS22

  • On the Information-theoretic Security of Combinatorial All-or-nothing Transforms.

    Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai

    CoRR   abs/2202.10280   2022年

     詳細を見る

    All-or-nothing transforms (AONT) were proposed by Rivest as a message
    preprocessing technique for encrypting data to protect against brute-force
    attacks, and have numerous applications in cryptography and information
    security. Later the unconditionally secure AONT and their combinatorial
    characterization were introduced by Stinson. Informally, a combinatorial AONT
    is an array with the unbiased requirements and its security properties in
    general depend on the prior probability distribution on the inputs $s$-tuples.
    Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has
    perfect security provided that all the inputs $s$-tuples are equiprobable, and
    has weak security provided that all the inputs $s$-tuples are with non-zero
    probability.
    This paper aims to explore on the gap between perfect security and weak
    security for combinatorial $(t,s,v)$-AONTs. Concretely, we consider the typical
    scenario that all the $s$ inputs take values independently (but not necessarily
    identically) and quantify the amount of information
    $H(\mathcal{X}|\mathcal{Y})$ about any $t$ inputs $\mathcal{X}$ that is not
    revealed by any $s-t$ outputs $\mathcal{Y}$. In particular, we establish the
    general lower and upper bounds on $H(\mathcal{X}|\mathcal{Y})$ for
    combinatorial AONTs using information-theoretic techniques, and also show that
    the derived bounds can be attained in certain cases. Furthermore, the
    discussions are extended for the security properties of combinatorial
    asymmetric AONTs.

    arXiv

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/journals/corr/corr2202.html#abs-2202-10280

  • Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing

    Meraouche, I; Dutta, S; Mohanty, SK; Agudo, I; Sakurai, K

    IEEE ACCESS   10   121329 - 121339   2022年   ISSN:2169-3536

     詳細を見る

    出版者・発行元:IEEE Access  

    Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. The encryption has been proven weak at first but many follow up works have shown that the neural networks can be made to learn the One Time Pad (OTP) and produce perfectly secure ciphertexts. To the best of our knowledge, existing works only considered communications between two or three parties. In this paper, we show how multiple neural networks in an adversarial setup can remotely synchronize and establish a perfectly secure communication in the presence of different attackers eavesdropping their communication. As an application, we show how to build Secret Sharing Scheme based on this perfectly secure multi-party communication. The results show that it takes around 45,000 training steps for 4 neural networks to synchronize and reach equilibria. When reaching equilibria, all the neural networks are able to communicate between each other and the attackers are not able to break the ciphertexts exchanged between them.

    DOI: 10.1109/ACCESS.2022.3223430

    Web of Science

    Scopus

  • Handling class Imbalance problem in Intrusion Detection System based on deep learning.

    Mariama Mbow, Hiroshi Koide, Kouichi Sakurai

    Int. J. Netw. Comput.   12 ( 2 )   467 - 492   2022年

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/journals/ijnc/ijnc12.html#MbowKS22

  • Handling class Imbalance problem in Intrusion Detection System based on deep learning

    Mbow Mariama, Koide Hiroshi, Sakurai Kouichi

    International Journal of Networking and Computing   12 ( 2 )   467 - 492   2022年   ISSN:21852839 eISSN:21852847

     詳細を見る

    記述言語:英語   出版者・発行元:IJNC Editorial Committee  

    Network intrusion detection system(NIDS) is the most used tool to detect malicious network activities. The NIDS has achieved in the recent years promising results for detecting known and novel attacks, with the adoption of deep learning. However, these NIDSs still have shortcomings. Most of the datasets used for NIDS are highly imbalanced, where the number of samples that belong to normal traffic is much larger than the attack traffic. The problem of imbalanced class skews the results. It limits the deep learning classifier’s performance for minority classes by misleading the classifier to be biased in favor of the majority class. To improve the detection rate for minority classes while ensuring efficiency, this study proposes a hybrid approach to handle the imbalance problem. This hybrid approach is a combination of oversampling with Synthetic Minority Over-Sampling (SMOTE) and Tomek link, an under-sampling method to reduce noise. Additionally, this study uses two deep learning models such as Long Short-Term Memory Network (LSTM) and Convolutional Neural Network (CNN) to provide a better intrusion detection system. The advantage of our proposed model is tested in NSL-KDD, CICIDS2017 datasets. In addition, we evaluate the method in the most recent intrusion detection dataset, CICIDS2018 dataset. We use 10-fold cross validation in this work to train the learning models and an independent test set for evaluation. The experimental results show that in the multi-class classification with NSLKDD dataset, the proposed model reached an overall accuracy and Fscore of 99% and 99.0.2% respectively on LSTM, an overall accuracy and Fscore of 99.70% and 99.27% respectively for CNN. And with CICIDS2017 an overall ac- curacy and Fscore of 99.65% and 98 % respectively on LSTM, an overall accuracy and Fscore of 99.85% and 98.98% respectively for CNN. In CICIDS2018 the proposed method achieved an overall detection rate and Fscore of 95% and 94% respectively.

    DOI: 10.15803/ijnc.12.2_467

    CiNii Research

  • Federated Learning with Clustering-Based Participant Selection for IoT Applications

    Wang K.I.K., Ye X., Sakurai K.

    Proceedings - 2022 IEEE International Conference on Big Data, Big Data 2022   6830 - 6831   2022年   ISBN:9781665480451

     詳細を見る

    出版者・発行元:Proceedings - 2022 IEEE International Conference on Big Data, Big Data 2022  

    Modern Internet of Things (IoT) systems are highly complex due to its mobile, ad-hoc and geographically distributed nature. Very often, an edge-cloud infrastructure is established to offer intelligent services in modern IoT systems. However, IoT edge devices are typically resource-constrained and can not perform sophisticated machine learning algorithm on board. Data sharing with a central server is a common approach of crowdsourcing, but also brings privacy and security concerns. The emerging federated learning offers a promising pathway to achieve an accurate model through distributed machine learning while ensuring data privacy. The existing federated learning process is not tailored to the mobile and adhoc nature of IoT systems where devices are of varying data and system qualities and may not be able to participate the entire training process. Therefore, in this paper, a new federated learning framework is proposed to support asynchronous model fusion with clustering-based participant selection. The proposed framework aims to accommodate the ad-hoc nature of IoT devices, and at the same time avoiding low quality or even malicious data from its participants to ensure model convergence and performance.

    DOI: 10.1109/BigData55660.2022.10020575

    Scopus

  • Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions

    Ikebe, K; Sakurai, K

    PROCEEDINGS OF 2022 4TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2022   54 - 61   2022年   ISBN:978-1-4503-9662-2

     詳細を見る

    出版者・発行元:ACM International Conference Proceeding Series  

    When trading cryptocurrencies, mining is the process of searching for a solution to a computationally difficult problem. Due to the nature of the search, the time required for mining is subject to fluctuations. This is undesirable from the standpoint of security. In order to reduce the variance of mining time, we implemented the multiple concatenation mining method proposed in existing research and evaluated its performance. Although the results differ from theoretical values, the effect of small variance was confirmed.

    DOI: 10.1145/3559795.3559803

    Web of Science

    Scopus

  • Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities

    Perera, MNS; Nakamura, T; Matsunaka, T; Yokoyama, H; Sakurai, K

    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022   13620   554 - 572   2022年   ISSN:0302-9743 ISBN:978-3-031-21279-6 eISSN:1611-3349

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    This paper proposes a group signature scheme with a tracing mechanism that limits the tracing ability of tracers based on their attributes and decentralizes the tracing key generation method. Thus, no other party than the attributes satisfying tracer can identify the signer. The proposing scheme answers the single point of failure of the tracing mechanism in the existing group signature schemes. On the other hand, the multiple tracers setting of the proposing scheme reduces the tracing workload that the single tracer had, and provides selection flexibility for users to choose a tracer for their signatures based on tracers’ attributes. This paper discussed the related security definitions against outsiders and honest but curious authorities.

    DOI: 10.1007/978-3-031-21280-2_31

    Web of Science

    Scopus

    researchmap

    その他リンク: https://dblp.uni-trier.de/db/conf/ispec/ispec2022.html#PereraNMYS22

  • ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022

    AsiaCCS   2022年   ISBN:9781450391405

     詳細を見る

    掲載種別:研究論文(国際会議プロシーディングス)   出版者・発行元:ACM  

    DOI: 10.1145/3488932

    researchmap

  • Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining

    Kei, I; Sakurai, K

    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW   380 - 383   2022年   ISBN:978-1-6654-7532-7

     詳細を見る

    出版者・発行元:Proceedings - 2022 10th International Symposium on Computing and Networking Workshops, CANDARW 2022  

    Cryptocurrency involves the search for a solution to a computationally difficult problem when conducting transactions. This is called mining, and by its nature, the time required for mining can vary significantly. This is undesirable from a security perspective. Existing research has proposed mining using graph cliques and methods for linking multiple mines with the aim of reducing the variance in mining time. In this study, we evaluated and implemented the possibility of further reducing the variance of mining time by combining the existing studies. The results showed that the combination of the two methods was more effective than conventional mining and existing research to achieve small variance.

    DOI: 10.1109/CANDARW57323.2022.00089

    Web of Science

    Scopus

  • Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey 査読

    Mbow, M; Sakurai, K; Koide, H

    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS   1680   196 - 212   2022年   ISSN:1865-0929 ISBN:978-981-19-7768-8 eISSN:1865-0937

     詳細を見る

    記述言語:英語   掲載種別:論文集(書籍)内論文   出版者・発行元:Communications in Computer and Information Science  

    Machine learning is one of the predominant methods used in computer science and has been widely and successfully applied in many areas such as computer vision, pattern recognition, natural language processing, cyber security etc. In cyber security, the application of machine learning algorithms for network intrusion detection system (NIDS) has seen promising results for anomaly detection mostly with the adoption of deep learning and is still growing. However, machine learning algorithms are vulnerable to adversarial attacks resulting in significant performance degradation. Adversarial attacks are security threats that aim to deceive the learning algorithm by manipulating its predictions, and Adversarial machine learning is a research area that studies both the generation and defense of such attacks. Researchers have extensively worked on the adversarial machine learning in computer vision but not many works in Intrusion detection system. However, failure in this critical Intrusion detection area could compromise the security of an entire system, and need much attention. This paper provides a review of the advancement in adversarial machine learning based intrusion detection and explores the various defense techniques applied against. Finally discuss their limitations for future research direction in this emerging area.

    DOI: 10.1007/978-981-19-7769-5_15

    Web of Science

    Scopus

    researchmap

  • A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem

    Ghatak, D; Sakurai, K

    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS   1680   167 - 180   2022年   ISSN:1865-0929 ISBN:978-981-19-7768-8 eISSN:1865-0937

     詳細を見る

    出版者・発行元:Communications in Computer and Information Science  

    Sharing microdata is a very important part of the present day world, but when they contain sensitive information, privacy to individuals needs to be guaranteed before release of data. One idea is to study the distributional properties of a data-set and generate synthetic data which has similar properties but unlike the original data comes with a privacy guarantee. In this review paper, we describe in detail, some advanced privacy guarantees that needs to be checked before release of such information. Also, we discuss some utility metrics to measure the remaining utility of released data. Very few mechanisms have been developed to ensure utility to synthetic data, provided a very strong privacy guarantee is maintained. We discuss some existing methodologies on privacy preserving synthetic data generation and discuss a privacy utility tradeoff problem.

    DOI: 10.1007/978-981-19-7769-5_13

    Web of Science

    Scopus

  • A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100

    Park, JY; Moon, YH; Lee, WI; Kim, SH; Sakurai, K

    IEEE ACCESS   10   2546 - 2563   2022年   ISSN:2169-3536

     詳細を見る

    掲載種別:研究論文(学術雑誌)   出版者・発行元:IEEE Access  

    Polynomial multiplication is one of the heaviest operations for a lattice-based public key algorithm in Post-Quantum Cryptography (PQC). Many studies have been done to accelerate polynomial multiplication with newly developed hardware accelerators or special CPU instructions. However, another method utilizes previously implemented and commercial hardware accelerators for RSA/elliptic curve cryptography (ECC). Reusing an existing hardware accelerator is advantageous, not only for the cost benefit but also for the improvement in performance. In this case, the developer should adopt the most efficient implementation method for the functions provided by a given legacy hardware accelerator. It is difficult to find an optimized implementation for a given hardware accelerator because there are a variety of methods, and each method depends on the functions provided by the given accelerator. In order to solve the problem, we survey methods for polynomial multiplication using RSA/ECC coprocessors and their application for Learning With Error (LWE)-based KEM algorithms of National Institute of Standards and Technology (NIST) PQC round 3 candidates. We implement all known methods for polynomial multiplication with RSA/ECC coprocessors in a platform, commercial mobile system-on-chip (SoC), the Exynos2100 Smart Secure Platform (SSP). We present and analyze the simulation results for various legacy hardware accelerators and give guidance for optimized implementation.

    DOI: 10.1109/ACCESS.2021.3138807

    Web of Science

    Scopus

    researchmap

  • A Survey of Software Clone Detection From Security Perspective 査読 国際誌

    #Haibo Zhang @Kouichi Sakurai

    IEEE Access 9: 48157-48173 (2021)   2021年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/ACCESS.2021.3065872

    その他リンク: https://ieeexplore.ieee.org/document/9378511

  • Deniable Secret Handshake Protocol - Revisited

    Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019 Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019   1266 - 1278   2020年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-030-15032-7_106

  • Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features 査読

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    Electronics (Switzerland)   9 ( 1 )   2020年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.3390/electronics9010144

  • Classification of Malicious Domains by Their LIFETIME

    Daiji Hara, Kouichi Sakurai, Yasuo Musashi

    Lecture Notes on Data Engineering and Communications Technologies   334 - 341   2020年1月

     詳細を見る

    記述言語:英語  

    DOI: 10.1007/978-3-030-39746-3_35

  • Blockchain for IoT-Based Digital Supply Chain A Survey

    Haibo Zhang, Kouichi Sakurai

    Lecture Notes on Data Engineering and Communications Technologies   564 - 573   2020年1月

     詳細を見る

    記述言語:英語  

    DOI: 10.1007/978-3-030-39746-3_57

  • 3-Party Adversarial Cryptography

    Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai

    Lecture Notes on Data Engineering and Communications Technologies   247 - 258   2020年1月

     詳細を見る

    記述言語:英語  

    DOI: 10.1007/978-3-030-39746-3_27

  • Simulation of Secure Volunteer Computing by Using Blockchain

    Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019 Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019   883 - 894   2020年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-030-15032-7_74

  • Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019 Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019   458 - 469   2020年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-030-15032-7_39

  • BCC'19 chairs' welcome 査読

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    3rd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2019, held in conjunction with the 14th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019   III   2019年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • RSA public keys with inside structure Proofs of key generation and identities for web-of-trust 査読

    Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

    Journal of Information Security and Applications   45   10 - 19   2019年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.jisa.2018.12.006

  • RSA public keys with inside structure Proofs of key generation and identities for web-of-trust 査読

    Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

    Journal of Information Security and Applications   45   10 - 19   2019年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.jisa.2018.12.006

  • Attacking convolutional neural network using differential evolution 査読

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    IPSJ Transactions on Computer Vision and Applications   11 ( 1 )   2019年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1186/s41074-019-0053-3

  • Analysis of variance of graph-clique mining for scalable proof of work

    Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai

    14th International Conference on Information Security and Cryptology, Inscrypt 2018 Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers   101 - 114   2019年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-030-14234-6_6

  • Universal Rules for Fooling Deep Neural Networks based Text Classification 査読

    Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi

    IEEE Congress on Evolutionary Computation(CEC)   2221 - 2228   2019年1月

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CEC.2019.8790213

  • Attacking convolutional neural network using differential evolution 査読

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    IPSJ Transactions on Computer Vision and Applications   11 ( 1 )   1   2019年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(学術雑誌)  

  • A new design for evaluating moving target defense system

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   561 - 563   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00111

  • Tracing MIRAI malware in networked system

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   534 - 538   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00104

  • Suppressing chain size of blockchain-based information sharing for swarm robotic systems

    Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   524 - 528   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00102

  • Proof of disease A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

    Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai

    4th IEEE SmartWorld, 15th IEEE International Conference on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018 Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018   257 - 262   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SmartWorld.2018.00079

  • Neural cryptography based on the topology evolving neural networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   472 - 478   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00091

  • Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   223 - 227   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00049

  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   417 - 423   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00083

  • A new design for evaluating moving target defense system

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   561 - 563   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00111

  • Tracing MIRAI malware in networked system

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   534 - 538   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00104

  • Suppressing chain size of blockchain-based information sharing for swarm robotic systems

    Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   524 - 528   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00102

  • Proof of disease A blockchain consensus protocol for accurate medical decisions and reducing the disease burden

    Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai

    4th IEEE SmartWorld, 15th IEEE International Conference on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018 Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018   257 - 262   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SmartWorld.2018.00079

  • Neural cryptography based on the topology evolving neural networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   472 - 478   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00091

  • Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   223 - 227   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00049

  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018 Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   417 - 423   2018年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDARW.2018.00083

  • Feature selection for machine learning-based early detection of distributed cyber attacks

    Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai

    16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018 Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018   181 - 186   2018年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00040

  • Feature selection for machine learning-based early detection of distributed cyber attacks

    Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai

    16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018 Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018   181 - 186   2018年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00040

  • Active attack against oblivious RAM

    Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai

    32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018 Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018   744 - 751   2018年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AINA.2018.00112

  • Lightweight Classification of IoT Malware Based on Image Recognition

    Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Sgandurra Daniele, Yaokai Feng, Kouichi Sakurai

    42nd IEEE Computer Software and Applications Conference, COMPSAC 2018 Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018   664 - 669   2018年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/COMPSAC.2018.10315

  • Light Weight Write Mechanism for Cloud Data 査読

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TPDS.2017.2782253

  • Light Weight Write Mechanism for Cloud Data 査読

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TPDS.2017.2782253

  • BCC'18 chairs' welcome 査読

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2018 BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018   iii   2018年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Light Weight Write Mechanism for Cloud Data 査読

    Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    IEEE Transactions on Parallel and Distributed Systems   29 ( 5 )   1131 - 1146   2018年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TPDS.2017.2782253

  • BCC'18 chairs' welcome 査読

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2018 BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018   iii   2018年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Effectively Protect Your Privacy Enabling Flexible Privacy Control on Web Tracking

    Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   533 - 536   2018年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2017.26

  • Attacking Convolutional Neural Network using Differential Evolution 査読

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    CoRR   abs/1804.07062   2018年4月

     詳細を見る

    記述言語:その他  

  • Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

    Xiang You, Yaokai Feng, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   2018-January   522 - 528   2018年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2017.93

  • Effectively Protect Your Privacy Enabling Flexible Privacy Control on Web Tracking

    Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   533 - 536   2018年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2017.26

  • Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

    Xiang You, Yaokai Feng, Kouichi Sakurai

    5th International Symposium on Computing and Networking, CANDAR 2017 Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017   2018-January   522 - 528   2018年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2017.93

  • Lightweight Classification of IoT Malware based on Image Recognition 査読

    Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai

    Proceedings - International Computer Software and Applications Conference   2   664 - 669   2018年2月

     詳細を見る

    記述言語:その他  

    DOI: 10.1109/COMPSAC.2018.10315

  • Preface 査読

    Debdas Ghosh, Debasis Giri, R. N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh

    4th International Conference on Mathematics and Computing, ICMC 2018 Communications in Computer and Information Science   834   IX - X   2018年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Light weight and fine-grained access mechanism for secure access to outsourced data* 査読

    Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    Concurrency Computation   2018年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/cpe.4736

  • A New Design for Evaluating Moving Target Defense System

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   561 - 563   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Tracing MIRAI Malware in Networked System

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   534 - 538   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Neural Cryptography Based on the Topology Evolving Neural Networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   472 - 478   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Lightweight classification of IoT malware based on image recognition

    Jiawei Su, Vargas Danilo Vasconcellos, Sanjiva Prasad, Sgandurra Daniele, Yaokai Feng, Kouichi Sakurai

    2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)   2   664 - 669   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   223 - 227   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • A New Design for Evaluating Moving Target Defense System

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   561 - 563   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Tracing MIRAI Malware in Networked System

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   534 - 538   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Neural Cryptography Based on the Topology Evolving Neural Networks

    Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   472 - 478   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Lightweight classification of IoT malware based on image recognition

    Jiawei Su, Vargas Danilo Vasconcellos, Sanjiva Prasad, Sgandurra Daniele, Yaokai Feng, Kouichi Sakurai

    2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)   2   664 - 669   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)   223 - 227   2018年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(その他学術会議資料等)  

  • Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies magneto optic sensors 査読

    Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai

    Concurrency Computation Practice and Experience   29 ( 23 )   2017年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/cpe.4017

  • Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors 査読

    Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE   29 ( 23 )   2017年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/cpe.4017

  • Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions 査読

    Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai

    Journal of Supercomputing   73 ( 10 )   4275 - 4301   2017年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s11227-017-2009-7

  • One pixel attack for fooling deep neural networks 査読

    Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi

    IEEE Trans. Evol. Comput.   23 ( 5 )   828 - 841   2017年10月

     詳細を見る

    記述言語:その他   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TEVC.2019.2890858

  • Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions 査読

    Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai

    JOURNAL OF SUPERCOMPUTING   73 ( 10 )   4275 - 4301   2017年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s11227-017-2009-7

  • A new security middleware architecture based on fog computing and cloud to support IoT constrained devices 査読

    Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai

    ACM International Conference Proceeding Series   2017年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3109761.3158413

  • Secure and light weight fine-grained access mechanism for outsourced data

    Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha

    16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017   201 - 209   2017年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.238

  • Bitcoin Block Withholding Attack Analysis and Mitigation 査読

    Samiran Bag, Sushmita Ruj, Kouichi Sakurai

    IEEE Transactions on Information Forensics and Security   12 ( 8 )   1967 - 1978   2017年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TIFS.2016.2623588

  • Bitcoin Block Withholding Attack: Analysis and Mitigation 査読

    Samiran Bag, Sushmita Ruj, Kouichi Sakurai

    IEEE Transactions on Information Forensics and Security   12 ( 8 )   1967 - 1978   2017年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TIFS.2016.2623588

  • Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 査読 国際誌

    Ryosuke MIYAZAKI, Junpei Kawamoto, Shinichi MATSUMOTO, Kouichi Sakurai

    2017 International Conference on Information Networking (ICOIN)   2017年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: DOI: 10.1109/ICOIN.2017.7899511

    その他リンク: http://ieeexplore.ieee.org/document/7899511/authors

  • BCC'17 chairs' Welcome 査読

    Satya Lokam, Sushmita Ruj, Kouichi Sakurai

    BCC 2017 - Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, co-located with ASIA CCS 2017   iii   2017年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Host independent and distributed detection system of the network attack by using OpenFlow

    Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai

    31st International Conference on Information Networking, ICOIN 2017 31st International Conference on Information Networking, ICOIN 2017   236 - 241   2017年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ICOIN.2017.7899511

  • Comments and improvements of 'HOTA Handover optimized ticket-based authentication in network-based mobility management'

    Mojtaba Alizadeh, Mohammad Hessam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017 Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017   112 - 116   2017年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ICIN.2017.7899399

  • A traceable signcryption scheme for secure sharing of data in cloud storage

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    16th IEEE International Conference on Computer and Information Technology, CIT 2016 Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016   524 - 531   2017年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CIT.2016.52

  • A Brief Review on Anomaly Detection and its Applications to Cybersecurity (情報通信システムセキュリティ)

    116 ( 522 )   37 - 42   2017年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A behavior-based online engine for detecting distributed cyber-attacks

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai

    17th International Workshop on Information Security Applications, WISA 2016 Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers   10144 LNCS   79 - 89   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-56549-1_7

  • A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing 査読

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    COMPUTERS & ELECTRICAL ENGINEERING   57   241 - 256   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.compeleceng.2016.11.028

  • SQL injection attack detection method using expectation criterion

    Linghuan Xiao, Shinichi Matsumoto, Tomohisa Ishikawa, Kouichi Sakurai

    4th International Symposium on Computing and Networking, CANDAR 2016 Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016   649 - 654   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2016.74

  • Parameter manipulation attack prevention and detection by using web application deception proxy

    Tomohisa Ishikawa, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3022227.3022300

  • On unconditionally binding code-based commitment schemes

    Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3022227.3022327

  • Improving the accuracy of signature authentication using the eight principles of yong

    Taku Nishigori, Junpei Kawamoto, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3022227.3022258

  • Evasion attacks against statistical code obfuscation detectors

    Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai

    12th International Workshop on Security, IWSEC 2017 Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings   10418 LNCS   121 - 137   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-64200-0_8

  • C&C session detection using random forest

    Liang Lu, Yaokai Feng, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3022227.3022260

  • A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing 査読

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    Computers and Electrical Engineering   57   241 - 256   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.compeleceng.2016.11.028

  • A proposal of Event Study Methodology with Twitter Sentimental Analysis for risk management

    Tomohisa Ishikawa, Kouichi Sakurai

    11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3022227.3022240

  • A detection system for distributed DoS attacks based on automatic extraction of normal mode and its performance evaluation

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai

    10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017 Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Proceedings   461 - 473   2017年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-72389-1_37

  • On the robustness of visual cryptographic schemes

    Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai

    15th International Workshop on Digital-Forensics and Watermarking, IWDW 2016 Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers   10082 LNCS   251 - 262   2017年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-53465_719

  • A Brief Review on Anomaly Detection and its Applications to Cybersecurity (\情\報\通\信\シ\ス\テ\ム\セ\キ\ュ\リ\テ\

    \電\子\情\報\通\信\学\会\技\術\研\究\報\ IEICE technical report: \信\学\技\報   116 ( 522 )   37 - 42   2017年

     詳細を見る

    記述言語:その他   掲載種別:研究論文(学術雑誌)  

  • A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

    Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

    11th Asia Joint Conference on Information Security, AsiaJCIS 2016 Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016   80 - 86   2016年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AsiaJCIS.2016.24

  • An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing

    Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai

    11th Asia Joint Conference on Information Security, AsiaJCIS 2016 Proceedings - 11th Asia Joint Conference on Information Security, AsiaJCIS 2016   39 - 47   2016年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AsiaJCIS.2016.23

  • A proposal for cyber-attack trace-back using packet marking and logging

    Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

    10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016   603 - 607   2016年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2016.89

  • A behavior-based method for detecting DNS amplification attacks

    Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

    10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016   608 - 613   2016年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2016.88

  • Cyberbullying detection using parent-child relationship between comments

    Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai

    18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings   Part F126325   325 - 334   2016年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3011141.3011182

  • Cyberbullying detection using parent-child relationship between comments 査読

    Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai

    ACM International Conference Proceeding Series   325 - 334   2016年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/3011141.3011182

  • Character-based symmetric searchable encryption and its implementation and experiment on mobile devices 査読

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    Security and Communication Networks   9 ( 12 )   1717 - 1725   2016年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/sec.876

  • Character-based symmetric searchable encryption and its implementation and experiment on mobile devices 査読

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    Security and Communication Networks   9 ( 12 )   1717 - 1725   2016年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1002/sec.876

  • Analysis of "receipt-freeness" and "coercion-resistance" in biometric authentication protocols

    Yoshifumi Ueshige, Kouichi Sakurai

    30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016 Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications, IEEE AINA 2016   2016-May   769 - 775   2016年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AINA.2016.97

  • Message from the STPA 2016 Workshop Organizers 査読

    Kouichi Sakurai, Amiya Nayak, Sushmita Ruj, Haojin Zhu, Arindam Pal

    Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016   lxviii   2016年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/WAINA.2016.215

  • A multivariate encryption scheme with Rainbow 査読

    Takanori Yasuda, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9543   236 - 251   2016年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-29814-6_19

  • Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm

    Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura

    3rd International Symposium on Computing and Networking, CANDAR 2015 Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015   457 - 462   2016年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2015.68

  • Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    3rd International Symposium on Computing and Networking, CANDAR 2015 Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015   477 - 483   2016年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2015.28

  • A multivariate encryption scheme with Rainbow 査読

    Takanori Yasuda, Kouichi Sakurai

    Lecture Notes in Computer Science   9543   236 - 251   2016年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/978-3-319-29814-6_19

  • Authentication in mobile cloud computing A survey 査読

    Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baaaharun, Kouichi Sakurai

    Journal of Network and Computer Applications   61   59 - 80   2016年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.jnca.2015.10.005

  • Authentication in mobile cloud computing: A survey. 59-80 査読 国際誌

    Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, Kouichi Sakurai

    Journal of Network and Computer Applications   59 - 80   2016年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: https://doi.org/10.1016/j.jnca.2015.10.005

    その他リンク: http://www.sciencedirect.com/science/article/pii/S1084804515002258

  • Retricoin: Bitcoin based on compact proofs of retrievability 査読

    Binanda Sengupta, Samiran Bag, Kouichi Sakurai, Sushmita Ruj

    ACM International Conference Proceeding Series   04-07-   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2833312.2833317

  • Cross-group secret sharing for secure cloud storage service 査読

    Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai

    ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2857546.2857610

  • A study of security management with cyber insurance 査読

    Tomohisa Ishikawa, Kouichi Sakurai

    ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2857546.2857615

  • Yet another note on block withholding attack on bitcoin mining pools

    Samiran Bag, Kouichi Sakurai

    19th Annual International Conference on Information Security, ISC 2016 Information Security - 19th International Conference, ISC 2016, Proceedings   9866 LNCS   167 - 180   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-45871-7_11

  • Retricoin Bitcoin based on compact proofs of retrievability

    Binanda Sengupta, Samiran Bag, Kouichi Sakurai, Sushmita Ruj

    17th International Conference on Distributed Computing and Networking, ICDCN 2016 Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016   04-07-January-2016   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2833312.2833317

  • On the application of clique problem for proof-of-work in cryptocurrencies

    Samiran Bag, Sushmita Ruj, Kouichi Sakurai

    11th International Conference on Information Security and Cryptology, Inscrypt 2015 Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers   260 - 279   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-38898-4_16

  • Expressive rating scheme by signatures with predications on ratees

    Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai

    10th International Conference on Network and System Security, NSS 2016 Network and System Security - 10th International Conference, NSS 2016, Proceedings   9955 LNCS   363 - 379   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-46298-1_24

  • Evaluation of gamma ray durability of RF tag and application to the radiation environment

    Nobuyuki Teraura, Kunio Ito, Daisuke Kobayashi, Kouichi Sakurai

    IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015   147 - 152   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/RFID-TA.2015.7379809

  • Efficient threshold secret sharing schemes secure against rushing cheaters

    Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu

    9th International Conference on Information-Theoretic Security, ICITS 2016 Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers   10015 LNCS   3 - 23   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-49175-2_1

  • Cross-group secret sharing for secure cloud storage service

    Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai

    10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016 ACM IMCOM 2016 Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2857546.2857610

  • Computational soundness of uniformity properties for multi-party computation based on LSSS

    Hui Zhao, Kouichi Sakurai

    7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015 Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers   99 - 113   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-31550-8_7

  • CCA-secure keyed-fully homomorphic encryption

    Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng

    19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016 Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings   70 - 98   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-662-49384-7_4

  • Attribute-based two-tier signatures Definition and construction

    Hiroaki Anada, Seiko Arita, Kouichi Sakurai

    18th International Conference on Information Security and Cryptology, ICISC 2015 Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers   9558   36 - 49   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-30840-1_3

  • Application of NTRU using group rings to partial decryption technique

    Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai

    7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015 Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers   9565   203 - 213   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-31550-8_13

  • An analysis of IT assessment security maturity in higher education institution

    Misni Harjo Suwito, Shinchi Matsumoto, Junpei Kawamoto, Dieter Gollmann, Kouichi Sakurai

    International Conference on Information Science and Applications, ICISA 2016 Information Science and Applications, ICISA 2016   376   701 - 713   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-981-10-0557-2_69

  • A study of security management with cyber insurance

    Tomohisa Ishikawa, Kouichi Sakurai

    10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016 ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2857546.2857615

  • Cross-group Secret Sharing for Secure Cloud Storage Service 査読 国際誌

    Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill MOROZOV, Kouichi Sakurai

    ACM IMCOM '16, January 04-06, 2016, Danang, Viet Nam   2016年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: DOI: http://dx.doi.org/10.1145/2857546.2857610

  • Erratum Cryptanalysis and improvement of "A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" (PLoS ONE (2015) 10:11 (e0142716) DOI:10.1371/journal.pone.0142716) 査読

    Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroaki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    PLoS One   10 ( 12 )   2015年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1371/journal.pone.0145975

  • Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" 査読

    Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    PLOS ONE   10 ( 11 )   2015年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1371/journal.pone.0142716

  • Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" 査読

    Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Azizah Abdul Manaf, Kouichi Sakurai, Hiroki Anada, Hassan Keshavarz, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan

    PLoS One   10 ( 11 )   2015年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1371/journal.pone.0142716

  • A note on the security of KHL scheme 査読

    Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai

    Theoretical Computer Science   602   1 - 6   2015年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.tcs.2015.07.051

  • A multivariate quadratic challenge toward post-quantum generation cryptography 査読

    Takanori Yasuda, Xavier Dahan, Yun Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai

    ACM Communications in Computer Algebra   49 ( 3 )   105 - 107   2015年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1145/2850449.2850462

  • Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones 査読

    Nobuyuki Teraura, Kouichi Sakurai

    2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops   2015年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/NTMS.2015.7266514

  • A multivariate quadratic challenge toward post-quantum generation cryptography 査読

    Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai

    ACM Communications in Computer Algebra   49 ( 3 )   105 - 107   2015年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2850449.2850462

  • Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

    Nobuyuki Teraura, Kouichi Sakurai

    7th International Conference on New Technologies, Mobility and Security, NTMS 2015 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops   2015年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/NTMS.2015.7266514

  • Detection of illegal players in massively multiplayer online role playing game by classification algorithms

    Zhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai

    29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015 Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015   2015-April   406 - 413   2015年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AINA.2015.214

  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

    Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai

    2015 International Conference on Information Networking, ICOIN 2015 2015 International Conference on Information Networking, ICOIN 2015   2015-January   104 - 109   2015年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ICOIN.2015.7057865

  • Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms. 査読 国際誌

    Zhongqqiang Zhang, Hiroaki Aanada, Junpei Kawamoto, Kouichi Sakurai

    AINA, IEEE Computer Society   2015年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks 査読 国際誌

    Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, Kouichi Sakurai

    J. Inf. Sci. Eng.   31 ( 2 )   727 - 742   2015年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units 査読

    Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda, Kouichi Sakurai

    Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014   543 - 548   2015年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2014.85

  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

    Satoshi Tanaka, Chen Mou Cheng, Takanori Yasuda, Kouichi Sakurai

    2nd International Symposium on Computing and Networking, CANDAR 2014 Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014   543 - 548   2015年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CANDAR.2014.85

  • Message from the workshop/symposium chairs TrustCom 2014 査読

    Yang Xiang, Kouichi Sakurai

    Quaternary International   xx   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TrustCom.2014.141

  • Identity-embedding method for decentralized public-key infrastructure

    Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai

    6th International Conference on Trusted Systems, INTRUST 2014 Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers   9473   1 - 14   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-27998-5_1

  • Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

    Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai

    3rd IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015 Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings   9357   255 - 264   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-24315-3_26

  • Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

    Satoshi Tanaka, Chen Mou Cheng, Kouichi Sakurai

    2nd International Conference on Mathematics and Computing, ICMC 2015 Mathematics and Computing - ICMC 2015   139   349 - 361   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-81-322-2452-5_24

  • A note on the security of KHL scheme 査読

    Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai

    Theoretical Computer Science   602   1 - 6   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.tcs.2015.07.051

  • Privacy-aware cloud-based input method editor

    Junpei Kawamoto, Kouichi Sakurai

    2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014   209 - 213   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ICCChina.2014.7008273

  • Special section on cryptography and information security 査読

    Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E98A ( 1 )   1 - 2   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Securing sensor networks by moderating frequencies

    Pinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai

    10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014 International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers   153   173 - 185   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-23802-9_15

  • Provably secure anonymous authentication scheme for roaming service in global mobility networks 査読

    Kuo Yan Wu, Kuo Y. Tsai, Tzong Che Wu, Kouichi Sakurai

    Journal of Information Science and Engineering   31 ( 2 )   727 - 742   2015年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A proposal for detecting distributed cyber-attacks using automatic thresholding

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai

    10th Asia Joint Conference on Information Security, AsiaJCIS 2015 Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015   152 - 159   2015年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AsiaJCIS.2015.22

  • Reconstructing and visualizing evidence of artifact from firefox sessionstorage

    Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai

    15th International Workshop on Information Security Applications, WISA 2014 Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers   8909   83 - 94   2015年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-15087-1_7

  • Plaintext checkable encryption with designated checker 査読

    Angsuman Das, Avishek Adhikari, Kouichi Sakurai

    Advances in Mathematics of Communications   9 ( 1 )   37 - 53   2015年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.3934/amc.2015.9.37

  • Evaluation of gamma ray durability and its application of shielded RF tags

    Nobuyuki Teraura, Kunio Ito, Daisuke Kobayashi, Kouichi Sakurai

    23rd International Conference on Nuclear Engineering: Nuclear Power - Reliable Global Energy, ICONE 2015 ICONE 2015 - 23rd International Conference on Nuclear Engineering: Nuclear Power - Reliable Global Energy   2015-January   2015年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Evaluation of a zero-watermarking-type steganography 査読

    Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai

    Lecture Notes in Computer Science   9023   613 - 624   2015年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/978-3-319-19321-2_47

  • Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units. 査読 国際誌

    Satoshi TANAKA, Chen-Mou CHENG, Takanori YASUDA, Kouichi Sakurai

    CANDAR 2014: 543-548   2014年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones 査読

    Nobuyuki Teraura, Kouichi Sakurai

    Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014   252 - 259   2014年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SOCA.2014.17

  • Towards "receipt-freeness" in remote biometric authentication

    Yoshifumi Ueshige, Kouichi Sakurai

    5th International Conference on Emerging Security Technologies, EST 2014 Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014   8 - 12   2014年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/EST.2014.22

  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

    Nobuyuki Teraura, Kouichi Sakurai

    7th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2014 Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014   252 - 259   2014年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SOCA.2014.17

  • A zero-watermarking-like steganography and potential applications

    Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai

    10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014 Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014   459 - 462   2014年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IIH-MSP.2014.121

  • Comparison of access pattern protection schemes and proposals for efficient implementation 査読

    Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E97D ( 10 )   2576 - 2585   2014年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.2013THP0007

  • Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation 査読

    Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E97D ( 10 )   2576 - 2585   2014年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.2013THP0007

  • Efficient variant of Rainbow using sparse secret keys 査読

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   5 ( 3 )   3 - 13   2014年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Collaborative agglomerative document clustering with limited information disclosure 査読 国際誌

    Chunhua Su, Jianying Zho, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai

    Security and Communication Networks   7 ( 6 )   964 - 978   2014年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Collaborative agglomerative document clustering with limited information disclosure 査読

    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai

    SECURITY AND COMMUNICATION NETWORKS   7 ( 6 )   964 - 978   2014年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/sec.811

  • Welcome to ASIACCS 2014! 査読

    Trent Jaeger, Kouichi Sakurai, Shiho Moriai

    Quaternary International   iii   2014年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • An enhanced audio ownership protection scheme based on visual cryptography. 査読 国際誌

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    EURASIP J. Information Security   2014年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A parameterless learning algorithm for behavior-based detection

    Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai

    2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014 Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014   11 - 18   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AsiaJCIS.2014.29

  • Security of Multivariate Signature Scheme Using Non-commutative Rings 査読

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E97A ( 1 )   245 - 252   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E97.A.245

  • Fast Implementation of KCipher-2 for Software and Hardware 査読

    Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E97D ( 1 )   43 - 52   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E97.D.43

  • Survey and new idea for attribute-based identification scheme secure against reset attacks

    Ji Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee Huay Heng, Raphael Phan

    4th International Cryptology and Information Security Conference 2014, Cryptology 2014 Conference Proceedings - Cryptology 2014 Proceedings of the 4th International Cryptology and Information Security Conference 2014   39 - 47   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Security of multivariate signature scheme using non-commutative rings? 査読

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E97-A ( 1 )   245 - 252   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E97.A.245

  • Security model and analysis of fhmqv, Revisited

    Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao, Yunlei Zhao

    9th China International Conference on Information Security and Cryptology, Inscrypt 2013 Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers   255 - 269   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-12087-4_16

  • Fast implementation of Kcipher-2 for software and hardware 査読

    Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E97-D ( 1 )   43 - 52   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E97.D.43

  • Efficient variant of rainbow without triangular matrix representation

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    2nd IFIP TC5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2014 Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings   8407 LNCS   532 - 541   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-55032-4_55

  • Attribute-based signatures without pairings via the Fiat-Shamir paradigm

    Hiroaki Anada, Seiko Arita, Kouichi Sakurai

    2nd ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2014 ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography   49 - 58   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2600694.2600696

  • An enhanced audio ownership protection scheme based on visual cryptography 査読

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    Eurasip Journal on Information Security   2014   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1186/1687-417X-2014-2

  • Acquisition of evidence of web storage in HTML5 web browsers from memory image

    Shinichi Matsumoto, Kouichi Sakurai

    2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014 Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014   148 - 155   2014年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AsiaJCIS.2014.30

  • A Method of Digital Rights Management based on Bitcoin Protocol

    Motoki Kitahara, Junpei Kawamoto, Kouichi Sakurai

    8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014 Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2557977.2558034

  • Implementation of efficient operations over GF(232) using graphics processing units

    Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai

    2nd IFIP TC5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2014 Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings   8407 LNCS   602 - 611   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-55032-4_62

  • Fine-grained conditional proxy re-encryption and application

    Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai

    21st International Conference on Neural Information Processing, ICONIP 2014 Provable Security - 8th International Conference, ProvSec 2014, Proceedings   8782   206 - 222   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Fine-grained access control aware multi-user data sharing with secure keyword search 査読

    Fangming Zhao, Takashi Nishide, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E97-D ( 7 )   1790 - 1803   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E97.D.1790

  • Collaborative agglomerative document clustering with limited information disclosure 査読

    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai

    Security and Communication Networks   7 ( 6 )   964 - 978   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/sec.811

  • An efficient robust secret sharing scheme with optimal cheater resiliency

    Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai

    4th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2014 Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings   8804   47 - 58   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • A competitive three-level pruning technique for information security 査読

    Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai

    Communications in Computer and Information Science   490   25 - 32   2014年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/978-3-662-45670-5

  • Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

    Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai

    2013 IEEE 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013 Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013   570 - 574   2013年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/BWCCA.2013.99

  • Exploiting reference images for image splicing verification

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    Digital Investigation, Volume 10   2013年10月

     詳細を見る

    記述言語:英語  

  • Reliable workflow scheduling with less resource redundancy

    Laiping Zhao, Yizhi Ren, Kouichi Sakurai

    Parallel Computing, Volume 39(10)   2013年10月

     詳細を見る

    記述言語:英語  

  • Multivariate signature scheme using quadratic forms

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013 Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings   7932 LNCS   243 - 258   2013年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-38616-9_17

  • A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets

    Yaokai Feng, Yoshiaki Hori, Jun'ichi Takeuchi, Kouichi Sakurai

    Journal of Information Processing, Volume 21   2013年7月

     詳細を見る

    記述言語:英語  

  • Reliable workflow scheduling with less resource redundancy 査読

    Laiping Zhao, Yizhi Ren, Kouichi Sakurai

    Parallel Computing   39 ( 10 )   567 - 585   2013年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.parco.2013.06.003

  • A variant of rainbow with shorter secret key and faster signature generation

    Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai

    1st ACM Workshop on Asia Public-Key Cryptography, AsiaPKC 2013 AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography   57 - 62   2013年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2484389.2484401

  • Upper bound of the length of information embedd in RSA public key efficiently

    Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai

    1st ACM Workshop on Asia Public-Key Cryptography, AsiaPKC 2013 AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography   33 - 38   2013年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2484389.2484396

  • Efficient implementation for QUAD stream cipher with GPUs 査読

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    Computer Science and Information Systems   10 ( 2 SPL )   897 - 911   2013年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.2298/CSIS121102040T

  • Efficient implementation for QUAD stream cipher with GPUs 査読

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    Computer Science and Information Systems   10 ( 2 )   897 - 911   2013年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.2298/CSIS121102040T

  • Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance 国際誌

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    ICT-EurAsia 2013   2013年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Confidentiality of 2D Code using Infrared with Cell-level Error Correction

    Nobuyuki Teraura, Kouichi Sakurai

    International Journal of Interactive Multimedia and Artificial Intelligence, Volume 2   2013年3月

     詳細を見る

    記述言語:英語  

  • Efficient implementation for QUAD stream cipher with GPUs

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    Computer Science and Information Systems, Volume 10   2013年2月

     詳細を見る

    記述言語:英語  

  • Botnet command and control based on Short Message Service and human mobility 査読

    Jingyu Hua, Kouichi Sakurai

    Computer Networks   57 ( 2 )   579 - 597   2013年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.comnet.2012.06.007

  • Botnet command and control based on Short Message Service and human mobility 査読

    Jingyu Hua, Kouichi Sakurai

    Computer Networks   57 ( 2 )   579 - 597   2013年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.comnet.2012.06.007

  • Analysis of methods for detecting compromised nodes and its countermeasures

    Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

    International Conference on IT Convergence and Security, ICITCS 2012 IT Convergence and Security 2012   215 LNEE   53 - 60   2013年2月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-94-007-5860-5_7

  • Botnet command and control based on Short Message Service and human mobility

    Jingyu Hua, Kouichi Sakurai

    Computer Networks [and ISDN Systems], Volume 57   2013年2月

     詳細を見る

    記述言語:英語  

  • Evolution of cooperation in reputation system by group-based scheme

    Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai

    The Journal of Supercomputing, Volume 63   2013年1月

     詳細を見る

    記述言語:英語  

  • Evolution of cooperation in reputation system by group-based scheme 査読

    Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai

    Journal of Supercomputing   63 ( 1 )   171 - 190   2013年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s11227-010-0498-8

  • Exploiting reference images for image splicing verification 査読

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    Digital Investigation   10 ( 3 )   246 - 258   2013年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.diin.2013.06.014

  • Evolution of cooperation in reputation system by group-based scheme 査読

    Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai

    Journal of Supercomputing   63 ( 1 )   171 - 190   2013年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s11227-010-0498-8

  • General Fault Attacks on Multivariate Public Key Cryptosystems

    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions, Volume 96-A   2013年1月

     詳細を見る

    記述言語:英語  

  • A behavior-based method for detecting distributed scan attacks in darknets 査読

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Junnichi Takeuchi

    Journal of Information Processing   21 ( 3 )   527 - 538   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.2197/ipsjjip.21.527

  • The development of radiation-resistant rf TAGS for use at nuclear power plants

    Nobuyuki Teraura, Kunio Ito, Naoki Takahashi, Kouichi Sakurai

    2013 21st International Conference on Nuclear Engineering, ICONE 2013 Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications   1   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1115/ICONE21-16605

  • Supporting secure provenance update by keeping "provenance" of the provenance

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    International Conference on Information and Communication Technology, ICT-EurAsia 2013 Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings   7804 LNCS   363 - 372   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-36818-9_40

  • Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

    Sushmita Ruj, Kouichi Sakurai

    2013 IEEE Global Communications Conference, GLOBECOM 2013 2013 IEEE Global Communications Conference, GLOBECOM 2013   402 - 407   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/GLOCOM.2013.6831104

  • Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

    Laiping Zhao, Kouichi Sakurai

    2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers   367 CCIS   23 - 38   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-319-04519-1_2

  • Image splicing verification based on pixel-based alignment method

    Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    11th International Workshop on Digital Forensics and Watermaking, IWDW 2012 Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers   7809 LNCS   198 - 212   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-40099-5_17

  • General fault attacks on multivariate public key cryptosystems 査読

    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E96-A ( 1 )   196 - 205   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E96.A.196

  • Efficient computing over GF(216) using graphics processing unit

    Satoshi Tanaka, Takanori Yasuda, Bo Yin Yang, Chen Mou Cheng, Kouichi Sakurai

    7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013 Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013   843 - 846   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2013.151

  • Detection of android API call using logging mechanism within android framework

    Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai

    9th International Conference on Security and Privacy in Communication Networks, SecureComm 2013 Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers   127 LNICST   393 - 404   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai

    2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013 Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013   63 - 68   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ASIAJCIS.2013.17

  • DASC 2013 Message from the general chairs 査読

    Vincenzo Piuri, Jose M.Alcaraz Calero, Kouichi Sakurai, Yiming Pi

    Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/DASC.2013.7

  • A proposal for the privacy leakage verification tool for android application developers

    Shinichi Matsumoto, Kouichi Sakurai

    7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013 Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013   2013年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2448556.2448610

  • Guest editorial Managing insider security threats (MIST 2012 Volume 1) 査読

    Kouichi Sakurai, Dieter Gollmann

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   3 ( 4 )   1 - 3   2012年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Workflow scheduling with fault tolerance

    Laiping Zhao, Kouichi Sakurai

    Network and Traffic Engineering in Emerging Distributed Computing Applications   94 - 123   2012年12月

     詳細を見る

    記述言語:英語  

    DOI: 10.4018/978-1-4666-1888-6.ch005

  • Revocation and tracing based on ternary tree Towards optimal broadcast encryption scheme

    Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    8th International Joint Conference on e-Business and Telecommunications, ICETE 2011 E-Business and Telecommunications International Joint Conference, ICETE 2011 Seville, Spain, July 18-21, 2011 Revised Selected Papers   233 - 248   2012年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-35755-8_17

  • Cryptanalysis of randomized arithmetic codes based on markov model

    Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai

    7th China International Conference on Information Security and Cryptography, Inscrypt 2011 Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers   341 - 362   2012年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-34704-7-24

  • A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks 査読

    Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo

    Computer Communications   35 ( 17 )   2125 - 2137   2012年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.comcom.2012.07.006

  • A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks 査読

    Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo

    COMPUTER COMMUNICATIONS   35 ( 17 )   2125 - 2137   2012年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.comcom.2012.07.006

  • Providing secure location-aware services for cooperative vehicular Ad Hoc networks 査読

    Chul Sur, Youngho Park, Kouichi Sakurai, Kyung Hyune Rhee

    Journal of Internet Technology   13 ( 4 )   631 - 644   2012年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Mixed-strategy game based trust management for clustered wireless sensor networks

    Dong Hao, Avishek Adhikari, Kouichi Sakurai

    3rd International Conference on Trusted Systems, INTRUST 2011 Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers   7222 LNCS   239 - 257   2012年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-32298-3_16

  • On revenue driven server management incloud

    Laiping Zhao, Kouichi Sakurai

    2nd International Conference on Cloud Computing and Services Science, CLOSER 2012 CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science   295 - 305   2012年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption 査読

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION   17 ( 8 )   3303 - 3327   2012年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.cnsns.2011.12.015

  • On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption 査読

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    Communications in Nonlinear Science and Numerical Simulation   17 ( 8 )   3303 - 3327   2012年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.cnsns.2011.12.015

  • Securing provenance of distributed processes in an untrusted environment 査読

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E95-D ( 7 )   1894 - 1907   2012年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E95.D.1894

  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Yichao Xu, Kouichi Sakurai

    6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12   2012年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2184751.2184815

  • Flexible service selection with user-specific QoS support in service-oriented architecture 査読

    Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai

    Journal of Network and Computer Applications   35 ( 3 )   962 - 973   2012年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.jnca.2011.03.013

  • Adaptive and composable non-interactive string-commitment protocols

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    7th International Joint Conference on e-Business and Telecommunications, ICETE 2010 e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers   222 CCIS   233 - 242   2012年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25206-8_15

  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    7th International Joint Conference on e-Business and Telecommunications, ICETE 2010 e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers   222 CCIS   274 - 288   2012年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25206-8_18

  • Security analysis of offline E-cash systems with malicious insider 査読

    Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   3 ( 1-2 )   55 - 71   2012年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Reducing the key size of rainbow using non-commutative rings

    Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi

    12th Cryptographers' Track at the RSA Conference, CT-RSA 2012 Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings   7178 LNCS   68 - 83   2012年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-27954-6_5

  • A finite equivalence of verifiable multi-secret sharing 査読

    Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang

    International Journal of Computational Intelligence Systems   5 ( 1 )   1 - 12   2012年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1080/18756891.2012.670517

  • A behavior-based detection method for outbreaks of low-rate attacks

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Junnichi Takeuchi

    2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012   267 - 272   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SAINT.2012.50

  • Weakness of provably secure searchable encryption against frequency analysis

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    5th Mosharaka International Conference on Communications, Computers and Applications, MIC-CCA 2012 Proceedings of the 5th International Conference on Communications, Computers and Applications, MIC-CCA 2012   142 - 147   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Secure keyword search using bloom filter with specified character positions

    Takanori Suga, Takashi Nishide, Kouichi Sakurai

    6th International Conference on Provable Security, ProvSec 2012 Provable Security - 6th International Conference, ProvSec 2012, Proceedings   7496 LNCS   235 - 252   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-33272-2_15

  • Proposal of the hierarchical file server groups for implementing mandatory access control

    Taketoshi Sakuraba, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   639 - 644   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2012.129

  • Preventing the access of fraudulent WEB sites by using a special two-dimensional code

    Nobuyuki Teraura, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   645 - 650   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2012.57

  • Multi-user keyword search scheme for secure data sharing with fine-grained access control

    Fangming Zhao, Takashi Nishide, Kouichi Sakurai

    14th International Conference on Information Security and Cryptology, ICISC 2011 Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers   7259 LNCS   406 - 418   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-31912-9_27

  • Message from ISSR-2012 workshop chairs 査読

    Kouichi Sakurai, Lizhe Wang, Ei Sayed M Ei-Alfy

    Quaternary International   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TrustCom.2012.311

  • Information hiding of two-dimensional code by multi-layer optical

    Nobuyuki Teraura, Kouichi Sakurai

    2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012 Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012   770 - 777   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ISPA.2012.113

  • Information hiding in subcells of a two-dimensional code

    Nobuyuki Teraura, Kouichi Sakurai

    1st IEEE Global Conference on Consumer Electronics, GCCE 2012 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012   652 - 656   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/GCCE.2012.6379943

  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Satoshi Tanaka, Tung Chou, Bo Yin Yang, Chen Mou Cheng, Kouichi Sakurai

    13th International Workshop on Information Security Applications, WISA 2012 Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers   7690 LNCS   28 - 42   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Efficient implementation of evaluating multivariate quadratic system with GPUs

    Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   660 - 664   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2012.139

  • Differential fault analysis of full lblock

    Liang Zhao, Takashi Nishide, Kouichi Sakurai

    3rd International Workshop, Constructive Side-Channel Analysis and Secure Design, COSADE 2012 Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings   7275 LNCS   135 - 150   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-29912-4_11

  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai

    26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012   766 - 771   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/WAINA.2012.175

  • Collaborative behavior visualization and its detection by observing darknet traffic

    Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai

    4th International Symposium on Cyberspace Safety and Security, CSS 2012 Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings   7672 LNCS   212 - 226   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-35362-8_17

  • Barrier A lightweight hypervisor for protecting kernel integrity via memory isolation

    Jingyu Hua, Kouichi Sakurai

    27th Annual ACM Symposium on Applied Computing, SAC 2012 27th Annual ACM Symposium on Applied Computing, SAC 2012   1470 - 1477   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/2245276.2232011

  • Application of scalar multiplication of edwards curves to pairing-based cryptography

    Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai

    7th International Workshop on Security, IWSEC 2012 Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings   7631 LNCS   19 - 36   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-34117-5-2

  • Analytic hierarchy process aided key management schemes evaluation in wireless sensor network 査読

    Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    Journal of Networks   7 ( 1 )   88 - 100   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.4304/jnw.7.1.88-100

  • Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

    Chunhua Su, Guilin Wang, Kouichi Sakurai

    11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012   1012 - 1017   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/TrustCom.2012.87

  • An image splicing detection based on interpolation analysis

    Rimba W. Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai

    13th Pacific-Rim Conference on Multimedia, PCM 2012 Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings   7674 LNCS   390 - 401   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-34778-8_36

  • A method for embedding secret key information in RSA public key and its application

    Motoki Kitahara, Takashi Nishide, Kouichi Sakurai

    6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012 Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012   665 - 670   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2012.123

  • A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

    Dong Hao, Kouichi Sakurai

    26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012 Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012   495 - 502   2012年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AINA.2012.84

  • A security analysis of uniformly-layered rainbow Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Takanori Yasuda, Kouichi Sakurai

    4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011 Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings   7071 LNCS   275 - 294   2011年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25405-5_18

  • Towards countermeasure of insider threat in network security

    Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai

    3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011 Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011   634 - 636   2011年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/INCoS.2011.156

  • Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

    Takashi Nishide, Kouichi Sakurai

    3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011 Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011   656 - 661   2011年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/INCoS.2011.146

  • Realizing proxy re-encryption in the symmetric world

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    International Conference on Informatics Engineering and Information Science, ICIEIS 2011 Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding   251 CCIS   259 - 274   2011年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25327-0_23

  • Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

    Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai

    10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011 Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011   352 - 361   2011年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/TrustCom.2011.46

  • General fault attacks on multivariate public key cryptosystems

    Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai

    4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011 Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings   7071 LNCS   1 - 18   2011年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25405-5_1

  • A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

    Dong Hao, Yizhi Ren, Kouichi Sakurai

    2nd International Conference on Trusted Systems, INTRUST 2010 Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers   6802 LNCS   237 - 252   2011年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25283-9_16

  • Design and implementation of document access control model based on role and security policy

    Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai

    2nd International Conference on Trusted Systems, INTRUST 2010 Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers   6802 LNCS   26 - 36   2011年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-25283-9_2

  • Enhancing SVO logic for mobile IPv6 security protocols 査読

    Ilsun You, Yoshiaki Hori, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   2 ( 3 )   26 - 52   2011年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Using game theory to classify wireless Ad Hoc network attacks with analysis on countermeasures 査読

    Xiaojuan Liao, Dong Hao, Kouichi Sakurai

    International Journal of Advancements in Computing Technology   3 ( 8 )   296 - 303   2011年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.4156/ijact.vol3.issue8.35

  • Traceback framework against botmaster by sharing network communication pattern information

    Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai

    2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011   639 - 644   2011年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2011.152

  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai

    International Conference on Security and Cryptography, SECRYPT 2011 SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography   37 - 49   2011年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Securing location-aware services based on online/offline signatures in VANETs

    Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee

    IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop on Availability, Reliability and Security for Business, Enterprise and Health Information Systems, ARES 2011 Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings   271 - 285   2011年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-23300-5_21

  • A SMS-based mobile botnet using flooding algorithm

    Jingyu Hua, Kouichi Sakurai

    5th Workshop in Information Security Theory and Practice, WISTP 2011 Information Security Theory and Practice Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings   264 - 279   2011年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-21040-2_19

  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Laiping Zhao, Yizhi Ren, Kouichi Sakurai

    25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011 Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011   275 - 282   2011年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/AINA.2011.87

  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

    5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011   2011年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/1968613.1968715

  • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

    Fangming Zhao, Takashi Nishide, Kouichi Sakurai

    7th International Conference on Information Security Practice and Experience, ISPEC 2011 Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings   6672 LNCS   83 - 97   2011年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-21031-0_7

  • Guest editorial Addressing insider threats and information leakage 査読

    Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications   2 ( 1 )   1 - 3   2011年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Towards formal analysis of wireless LAN security with MIS protocol 査読

    Ilsun You, Yoshiaki Hori, Kouichi Sakurai

    International Journal of Ad Hoc and Ubiquitous Computing   7 ( 2 )   112 - 120   2011年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1504/IJAHUC.2011.038997

  • Towards formal analysis of wireless LAN security with MIS protocol 査読

    Ilsun You, Yoshiaki Hori, Kouichi Sakurai

    International Journal of Ad Hoc and Ubiquitous Computing   7 ( 2 )   112 - 120   2011年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1504/IJAHUC.2011.038997

  • FineTrust: a fine-grained trust model for peer-to-peer networks 査読 国際誌

    Yizhi Ren, MingChu Li, Kouichi Sakurai

    Security and Communication Networks 4(1): 61-69 (2011)   Vol.4 ( No.1 )   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Enhancing MISP with fast mobile IPv6 security 査読

    Ilsun You, Jong Hyouk Lee, Yoshiaki Hori, Kouichi Sakurai

    Mobile Information Systems   7 ( 3 )   271 - 283   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.3233/MIS-2011-0121

  • Efficient context-sensitive intrusion detection based on state transition table 査読

    Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E94-A ( 1 )   255 - 264   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E94.A.255

  • Distributed Paillier Cryptosystem without Trusted Dealer

    Takashi Nishide, Kouichi Sakurai

    11th International Workshop on Information Security Applications, WISA 2010 Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers   44 - 60   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-17955-6_4

  • Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   45 - 59   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-18405-5_5

  • A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

    Liang Zhao, Avishek Adhikari, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   29 - 44   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-18405-5_4

  • FineTrust: a fine-grained trust model for peer-to-peer networks 査読 国際誌

    Yizhi Ren, MingChu Li, Kouichi Sakurai

    Security and Communication Networks 4(1): 61-69 (2011)   Vol.4 ( No.1 )   2011年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A generic evaluation method for key management schemes in wireless sensor network

    Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1145/1968613.1968680

  • Welcome message from MIST-2011 international workshop co-chairs 査読

    Ilsun You, Christian W. Probst, Yoshiaki Hori, Kouichi Sakurai

    Quaternary International   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/INCoS.2011.171

  • Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

    Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011 Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011   1739 - 1744   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/TrustCom.2011.243

  • Improvement on secrecy capacity of wireless LAN using matched filter

    Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai

    2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011 Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011   463 - 469   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/MSN.2011.40

  • Guest editorial Trusted computing and communications 査読

    Guojun Wang, Laurence T. Yang, Kouichi Sakurai

    Security and Communication Networks   4 ( 1 )   1 - 2   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/sec.195

  • FineTrust A fine-grained trust model for peer-to-peer networks 査読

    Yizhi Ren, Mingchu Li, Kouichi Sakurai

    Security and Communication Networks   4 ( 1 )   61 - 69   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/sec.165

  • FCST 2011 Welcome message from the program chairs 査読

    Jianer Chen, Kouichi Sakurai, Cho Li Wang

    Quaternary International   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/TrustCom.2011.268

  • Distributed Paillier cryptosystem without trusted dealer

    Takashi Nishide, Kouichi Sakurai

    11th International Workshop on Information Security Applications, WISA 2010 Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers   6513 LNCS   44 - 60   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-17955-6-4

  • Design and implementation of a forced encryption kernel module

    Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

    2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011   607 - 611   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IMIS.2011.68

  • Customized program protection for a user customized data protection framework

    Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Kouichi Sakurai

    2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011 Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011   1   643 - 649   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CSAE.2011.5953301

  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   6526 LNCS   45 - 59   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-18405-5-5

  • Classification on attacks in wireless ad hoc networks A game theoretic view

    Xiaojuan Liao, Dong Hao, Kouichi Sakurai

    7th International Conference on Networked Computing and Advanced Information Management, NCM 2011 Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011   144 - 149   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • An efficient key generation method in audio zero-watermarking

    Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai

    7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011   336 - 339   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IIHMSP.2011.63

  • Achieving cooperative detection against Sybil attack in wireless ad hoc networks A game theoretic approach

    Xiaojuan Liao, Dong Hao, Kouichi Sakurai

    17th Asia Pacific Conference on Communications, APCC 2011 17th Asia Pacific Conference on Communications, APCC 2011   806 - 811   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/APCC.2011.6152918

  • A study of communication route selection considering route security

    Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai

    11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011 Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011   360 - 365   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SAINT.2011.69

  • A robust and compression-combined digital image encryption method based on compressive sensing

    Rong Huang, Kouichi Sakurai

    7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011   105 - 108   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IIHMSP.2011.53

  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Liang Zhao, Avishek Adhikari, Kouichi Sakurai

    9th International Workshop on Digital Watermarking, IWDW 2010 Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers   6526 LNCS   29 - 44   2011年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-18405-5-4

  • Adaptive and composable non-committing encryptions

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    15th Australasian Conference on Information Security and Privacy, ACISP 2010 Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings   6168 LNCS   135 - 144   2010年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-14081-5_9

  • Improved subset difference method with ternary tree 査読

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E93-A ( 11 )   2034 - 2044   2010年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E93.A.2034

  • Towards a fairness multimedia transmission using layered-based multicast protocol 査読

    Heru Sukocof, Yoshiaki Hori, Hendrawan, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E93-D ( 11 )   2953 - 2961   2010年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E93.D.2953

  • Model-based intrusion detection by abstract interpretation

    Jingyu Hua, Takashi Nishide, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   359 - 362   2010年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SAINT.2010.107

  • Preserving integrity and confidentiality of a directed acyclic graph model of provenance

    Amril Syalim, Takashi Nishide, Kouichi Sakurai

    24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings   6166 LNCS   311 - 318   2010年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-13739-6_22

  • Modeling and containment of search worms targeting web applications

    Jingyu Hua, Kouichi Sakurai

    7th GI International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2010 Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings   6201 LNCS   183 - 199   2010年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-14215-4_11

  • Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus 査読

    Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren

    ICIC Express Letters   4 ( 3 )   1053 - 1058   2010年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A behavior based malware detection scheme for avoiding false positive

    Yoshiro Fukushima, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010   79 - 84   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/NPSEC.2010.5634444

  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    International Conference on Security and Cryptography, SECRYPT 2010 SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography   389 - 398   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • Study of log file dispersion management method

    Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   371 - 374   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SAINT.2010.104

  • Special section on trust, security and privacy for pervasive applications 査読

    Guojun Wang, Laurence T. Yang, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E93-D ( 3 )   409 - 410   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • SPSE A flexible QoS-based service scheduling algorithm for service-oriented Grid

    Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai

    2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010 Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/IPDPSW.2010.5470920

  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Seiichiro Mizoguchi, Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai

    2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010   73 - 78   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/NPSEC.2010.5634446

  • Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Liang Zhao, Di Xiao, Kouichi Sakurai

    2010 International Conference in Information Science and Applications, ICISA 2010 2010 International Conference on Information Science and Applications, ICISA 2010   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ICISA.2010.5480269

  • Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

    Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai

    2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010 Proceedings - 2010 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010   434 - 441   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/HPCC.2010.72

  • ESS-FH Enhanced security scheme for fast handover in hierarchical mobile IPv6 査読

    Ilsun You, Jong Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori

    IEICE Transactions on Information and Systems   E93-D ( 5 )   1096 - 1105   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E93.D.1096

  • Darknet monitoring on real-operated networks

    Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai

    5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010 Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010   278 - 285   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/BWCCA.2010.82

  • Behavior control based on dynamic code translation

    Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   375 - 378   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SAINT.2010.103

  • Analysis of existing privacy-preserving protocols in domain name system 査読

    Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E93-D ( 5 )   1031 - 1043   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E93.D.1031

  • Adaptive and composable non-interactive string-commitment protocols

    Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai

    International Conference on Security and Cryptography, SECRYPT 2010 SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography   354 - 361   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

  • A design of history based traffic filtering with probabilistic packet marking against DoS attacks

    Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai

    2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010   261 - 264   2010年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/SAINT.2010.44

  • Efficient intrusion detection based on static analysis and stack walks

    Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren

    4th International Workshop on Security, IWSEC 2009 Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings   5824 LNCS   158 - 173   2009年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-04846-3_11

  • Enhancing cooperative behavior for online reputation systems by group selection

    Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo, Kouichi Sakurai

    Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009 UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences   568 - 573   2009年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/UIC-ATC.2009.81

  • Formal verification for access control in web information sharing system

    Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    3rd International Conference on Information Security and Assurance, ISA 2009 Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings   5576 LNCS   80 - 89   2009年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-02617-1_9

  • Ternary subset difference method and its quantitative analysis

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    9th International Workshop on Information Security Applications, WISA 2008 Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers   5379 LNCS   225 - 239   2009年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-00306-6_17

  • Grouping provenance information to improve efficiency of access Control

    Amril Syalim, Yoshiaki Hori, Kouichi Sakurai

    3rd International Conference on Information Security and Assurance, ISA 2009 Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings   5576 LNCS   51 - 59   2009年11月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-02617-1_6

  • An Enhanced Security Protocol for Fast Mobile IPv6 査読 国際誌

    YOU Ilsun, SAKURAI Kouichi, HORI Yoshiaki

    IEICE Transactions on Information and Systems   2009年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • The 3rd International workshop on intelligent, mobile and internet services in ubiquitous computing (IMIS 2009) Welcome message from IMIS 2009 organizers 査読

    Kouichi Sakurai, Ilsun You, Bonam Kim, Feilong Tang

    Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009   2009年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/CISIS.2009.212

  • 個別アドレス発行によるメーリングリストへのスパムメール削減方式の提案と評価 査読 国際誌

    高橋健一, 境顕宏, 堀良彰, 櫻井幸一

    情報処理学会論文誌(IPSJ Journal)   2009年9月

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

  • Importance of data standardization in privacy-preserving k-means clustering

    Chunhua Su, Justin Zhan, Kouichi Sakurai

    International Workshops on Database Systems for Advanced Applications, DASFAA 2009: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD Database Systems for Advanced Applications - DASFAA 2009 International Workshops BenchmarX, MCIS, WDPP, PPDA, MBC, PhD   5667 LNCS   276 - 286   2009年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-04205-8_23

  • Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party 査読 国際誌

    SU Chunhua, BAO Feng, ZHOU Jianying, TAKAGI Tsuyoshi, SAKURAI Kouich

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2009年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party 査読

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E92A ( 8 )   1868 - 1871   2009年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1868

  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Kenichi Takahashi, Yoshiki Mitsuyuki, Tsunenori Mine, Kouichi Sakurai, Makoto Amamiya

    10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007 Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers   5044 LNAI   134 - 145   2009年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-01639-4_12

  • Reconsidering data logging in light of digital forensics

    Bin Hui Chou, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

    Advances in Information Security and Its Application Third International Conference, ISA 2009, Proceedings   36   111 - 118   2009年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-02633-1_15

  • Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks

    Yi Han, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

    Advances in Information Security and Its Application Third International Conference, ISA 2009, Proceedings   36   105 - 110   2009年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-642-02633-1_14

  • A Security Analysis on Kempf-Koodlis Security Scheme for Fast Mobile IPv6 査読 国際誌

    YOU Ilsun, SAKURAI Kouichi, HORI Yoshiaki

    IEICE Transactions on Communications   2009年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A security analysis on Kempf-Koodli's security scheme for Fast Mobile IPv6 査読

    Ilsun You, Kouichi Sakurai, Yoshiaki Hori

    IEICE Transactions on Communications   E92-B ( 6 )   2287 - 2290   2009年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transcom.E92.B.2287

  • Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection 査読 国際誌

    Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo and Kouichi Sakurai

    RIMS Kokyuroku   2009年5月

     詳細を見る

    掲載種別:研究論文(学術雑誌)  

  • An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation 査読 国際誌

    Yongrui CUI, Mingchu LI, Yizhi REN, Kouichi SAKURAI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2009年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes 査読 国際誌

    SU Chunhua, BAO Feng, ZHOU Jianying, TAKAGI Tsuyoshi, SAKURAI Kouichi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   2009年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes 査読

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E92A ( 4 )   1246 - 1250   2009年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1246

  • A new secret sharing scheme based on the multi-dealer 査読

    Cheng Guo, Mingchu Li, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 5 )   1373 - 1378   2009年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1373

  • A signature scheme associated with universal re-signcryption

    Kohei Tatara, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   780 - 785   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ARES.2009.104

  • Security analysis for P2P routing protocols

    Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   899 - 904   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ARES.2009.82

  • Secrecy capacity of wireless LAN

    Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   905 - 910   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ARES.2009.91

  • Polymorphic worm detection by analyzing maximum length of instruction sequence in network packets

    Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   972 - 977   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ARES.2009.103

  • Modeling security bridge certificate authority architecture 査読

    Yizhi Ren, Mingchu Li, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 6 )   1544 - 1547   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1544

  • Message from the trustcom 2009 symposium chairs 査読

    Guojun Wang, Peter Mueller, Kouichi Sakurai, Maria S. Perez-Hernandez

    Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009   2   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/CSE.2009.524

  • Foreword Special section on information and communication system security 査読

    Kouichi Sakurai

    IEICE Transactions on Information and Systems   E92-D ( 5 )   765   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Flow traffic classification with support vector machine by using payload length

    Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, Heejo Lee, Jae Cheol Ryou

    2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/CSA.2009.5404180

  • Distributed noise generation for density estimation based clustering without trusted third party 査読

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 8 )   1868 - 1871   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1868

  • Design and object-oriented implementation of an intelligence entity sharing pool

    Runhe Huang, Jianhua Ma, Kenichi Takahashi, Kouichi Sakurai

    2009 WRI Global Congress on Intelligent Systems, GCIS 2009 Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009   2   583 - 587   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/GCIS.2009.269

  • Comparison of risk analysis methods Mehari, magerit, NIST800-30 and microsoft's security management guide

    Amril Syalim, Yoshiaki Hori, Kouichi Sakurai

    International Conference on Availability, Reliability and Security, ARES 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009   726 - 731   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ARES.2009.75

  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    Ilsun You, Kouichi Sakurai, Yoshiaki Hori

    4th International Conference on Frontier of Computer Science and Technology, FCST 2009 4th International Conference on Frontier of Computer Science and Technology, FCST 2009   351 - 355   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/FCST.2009.75

  • An enhanced security protocol for fast mobile IPv6 査読

    Ilsun You, Kouichi Sakurai, Yoshiaki Hori

    IEICE Transactions on Information and Systems   E92-D ( 10 )   1979 - 1982   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transinf.E92.D.1979

  • An adaptive reputation-based algorithm for grid virtual organization formation 査読

    Yongrui Cui, Mingchu Li, Yizhi Ren, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 5 )   1339 - 1346   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1339

  • Security and correctness analysis on privacy-preserving k-means clustering schemes 査読

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 4 )   1246 - 1250   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1587/transfun.E92.A.1246

  • The optimal choice by resource consumers in Grid market

    Laiping Zhao, Mingchu Li, Weifeng Sun, Kouichi Sakurai, Yizhi Ren

    Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009 UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences   580 - 585   2009年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/UIC-ATC.2009.75

  • Trust similarity measure in trust model for P2P networks

    Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai

    5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008   2   107 - 112   2008年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/EUC.2008.137

  • A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

    Bin Hui Chou, Kohei Tatara, Taketoshi Sakuraba, Yoshiaki Hori, Kouichi Sakurai

    2nd International Conference on Information Security and Assurance, ISA 2008 Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008   421 - 426   2008年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ISA.2008.96

  • Key distribution scheme using matched filter resistant against DoS attack

    Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai

    22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008 Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008   1534 - 1539   2008年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/WAINA.2008.180

  • IMIS 2008 message from the workshop organizers MUE 2008 査読

    2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008 Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008   2008年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1109/MUE.2008.7

  • Reliable key distribution scheme for lossy channels 査読

    Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai

    IEICE Transactions on Information and Systems   E91-D ( 5 )   1485 - 1488   2008年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietisy/e91-d.5.1485

  • Characterizing economic and social properties of trust and reputation systems in P2P environment 査読

    Yu Feng Wang, Yoshiaki Hori, Kouichi Sakurai

    Journal of Computer Science and Technology   23 ( 1 )   129 - 140   2008年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s11390-008-9118-y

  • Analysis of program obfuscation schemes with variable encoding technique 査読

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 1 )   316 - 329   2008年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e91-a.1.316

  • Optimization of group key management structure with a client join-leave mechanism 査読

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    Journal of Information Processing   16   130 - 141   2008年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.2197/ipsjjip.16.130

  • Toward a scalable visualization system for network traffic monitoring 査読

    IEICE Transactions on Information and Systems   E91-D ( 5 )   1300 - 1310   2008年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietisy/e91-d.5.1300

  • A distributed privacy-preserving association rules mining scheme using frequent-pattern tree

    Chunhua Su, Kouichi Sakurai

    4th International Conference on Advanced Data Mining and Applications, ADMA 2008 Advanced Data Mining and Applications - 4th International Conference, ADMA 2008, Proceedings   5139 LNAI   170 - 181   2008年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1007/978-3-540-88192-6-17

  • Definition of security practices in security management part of security level management model 査読

    Tai Hoon Kim, Kouichi Sakurai

    International Journal of Security and its Applications   2 ( 1 )   63 - 71   2008年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Analysis of program obfuscation schemes with variable encoding technique 査読

    Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E91-A ( 1 )   316 - 329   2008年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e91-a.1.316

  • Achieving evenhandedness in certified email system for contract signing 査読

    Kenji Imamoto, Jianying Zhou, Kouichi Sakurai

    International Journal of Information Security   7 ( 6 )   383 - 394   2008年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s10207-008-0056-z

  • A study on security level management model description 査読

    Tai Hoon Kim, Kouichi Sakurai

    International Journal of Multimedia and Ubiquitous Engineering   3 ( 1 )   87 - 94   2008年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A new scheme for distributed density estimation based privacy-preserving clustering

    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai

    3rd International Conference on Availability, Security, and Reliability, ARES 2008 ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings   112 - 119   2008年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1109/ARES.2008.129

  • A framework for user privacy protection using trusted programs 査読

    Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya

    International Journal of Security and its Applications   1 ( 2 )   59 - 70   2007年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Efficient verifier-based password-authenticated key exchange in the three-party setting 査読

    Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee

    Computer Standards and Interfaces   29 ( 5 )   513 - 520   2007年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/j.csi.2006.12.002

  • A proposal of key management scheme and its operation using Anonymous biometrics on ID-based infrastructure 査読

    Akitoshi Izumi, Yoshifumi Ueshige, Kouichi Sakurai

    International Journal of Security and its Applications   1 ( 1 )   83 - 94   2007年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Special section on cryptography and information security 査読

    Masakatu Morii, Shiho Moriai, Goichiro Hanaoka, Toru Akishita, Tetsuya Izu, Tetsu Iwata, Koji Okada, Toshinobu Kaneko, Hiroaki Kikuchi, Kwangjo Kim, Shinsaku Kiyomoto, Noboru Kunthiro, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Kazue Sako, Takashi Satoh, Akira Shiozaki, Hiroki Shizuya, Tsuyoshi Takagi, Mitsuru Tada, Keisuke Tanaka, Hiroshi Doi, Toru Nakanishi, Shoichi Hirose, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Natsume Matsuzaki, Tsutomu Matsumoto, Atsuko Miyaji, Maid Yoshida

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E90-A ( 1 )   2007年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e90-a.1.1

  • Privacy-preservation techniques in data mining

    Chunhua Su, Jianying Zhou, Feng Bao, Guilin Wang, Kouichi Sakurai

    Digital Privacy Theory, Technologies, and Practices   187 - 226   2007年1月

     詳細を見る

    記述言語:英語  

  • On effectiveness of clock control in stream ciphers 査読

    Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E90-A ( 9 )   1780 - 1787   2007年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e90-a.9.1780

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Preface 査読

    Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3960 LNCS   2006年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Preface 査読

    Laurence T. Yang, Hai Jin, Jianhua Ma, Theo Ungerer, David Ogle, Manish Parashar, Kouichi Sakurai

    Thrid International Conference on Autonomic and Trusted Computing, ATC 2006 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   4158 LNCS   2006年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Simple power analysis on fast modular reduction with generalized Mersenne prime for elliptic curve cryptosystems 査読

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E89-A ( 1 )   231 - 237   2006年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e89-a.1.231

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Preface 査読

    Yuko Murayama, Shinichi Kawamura, Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg

    Lecture Notes in Computer Science   4266 LNCS   2006年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Security protocol for IMT-2000-based contents service 査読

    Sang Soo Yeo, Deok Gyu Lee, Kouichi Sakurai

    International Journal of Multimedia and Ubiquitous Engineering   1 ( 4 )   11 - 20   2006年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Security countermeasure design for information systems by using block model 査読

    Tai Hoon Kim, Kouichi Sakurai

    International Journal of Multimedia and Ubiquitous Engineering   1 ( 2 )   30 - 33   2006年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers 査読

    Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 10 )   2778 - 2791   2005年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e88-a.10.2778

  • Analysis and comparison of cryptographic techniques in e-voting and e-auction 査読

    Yong Sork Her, Kenji Imamoto, Kouichi Sakurai

    Research Reports on Information Science and Electrical Engineering of Kyushu University   10 ( 2 )   91 - 96   2005年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic 査読

    Kenji Imamoto, Kouichi Sakurai

    Electronic Notes in Theoretical Computer Science   135 ( 1 )   79 - 94   2005年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(その他学術会議資料等)  

    DOI: 10.1016/j.entcs.2005.06.003

  • A collaborative role-based access control for trusted operating systems in distributed environment 査読

    Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   270 - 279   2005年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/E88-A.1.270

  • Special section on cryptography and information security 査読

    Tetsuya Izu, Tetsu Iwata, Shiho Moriai, Tomoyuki Asano, Toshinobu Kaneko, Kwangjo Kim, Noboru Kunihiro, Hidenori Kuwakado, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Takashi Satoh, Akira Shiozaki, Hideo Shimizu, Mitsuru Tada, Tsuyoshi Takagi, Keisuke Tanaka, Toshiaki Tanaka, Yukiyasu Tsunoo, Hiroshi Doi, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Tsutomu Matsumoto, Natsume Matsuzaki, Masahiro Mambo, Atsuko Miyaji, Yuko Murayama, Maki Yoshida, Hajime Watanabe, Akira Hayashi

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   2005年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/E88-A.1.1

  • Proposal and analysis of a distributed online certificate status protocol with low communication cost 査読

    Satoshi Koga, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   247 - 254   2005年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/E88-A.1.247

  • Procedural constraints in the extended RBAC and the coloured Petri net modeling 査読

    Wook Shin, Jeong Gun Lee, Hong Kook Klm, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   327 - 330   2005年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/E88-A.1.327

  • On the vulnerability of exponent recodings for the exponentiation against side channel attacks 査読

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   154 - 160   2005年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/E88-A.1.154

  • On the pseudorandomness of a modification of KASUMI type permutations 査読

    Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee

    Lecture Notes in Computer Science   3506   313 - 329   2005年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • The improved risk analysis mechanism in the practical risk analysis system 査読

    SangCheol Hwang, NamHoon Lee, Kouichi Sakurai, GungGil Park, JaeCheol Ryou

    Unknown Journal   3391   835 - 842   2005年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Side channel cryptanalysis on XTR public key cryptosystem 査読

    Dong Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 5 )   1214 - 1223   2005年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/e88-a.5.1214

  • PGV-style block-cipher-based hash families and black-box analysis 査読

    Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   39 - 48   2005年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1093/ietfec/E88-A.1.39

  • A DRM framework for secure distribution of mobile contents 査読

    Kwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae Cheol Ryou

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3090   905 - 914   2004年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Pre-production methods of a response to certificates with the common status - Design and theoretical evaluation 査読

    Satoshi Koga, Jae Cheol Ryou, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3093   85 - 97   2004年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Modified power-analysis attacks on XTR and an efficient countermeasure 査読

    Dong Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3269   305 - 317   2004年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A software fingerprinting scheme for java using classfiles obfuscation 査読

    Kazuhide Fukushima, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2908   303 - 316   2004年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A generalization of PGV-hash functions and security analysis in black-box model 査読

    Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   3108   212 - 223   2004年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A distributed online certificate status protocol with a single public key 査読

    Satoshi Koga, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2947   389 - 401   2004年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • チャレンジ-レスポンスとベイジアンフィルタを併用した迷惑メール対策の提案 査読

    岩永学, 田端利宏, 櫻井 幸一

    情報処理学会論文誌   2004年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • 普遍再暗号化によるRFIDタグのプライバシ保護の実現 査読

    齊藤純一郎, 櫻井 幸一

    情報処理学会論文誌   2004年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Timing Attacks against a Parallelized RSA Implementation 査読

    Yasuyuki Sakai and Kouichi Sakurai

    2004年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • On Security of XTR Public Key Cryptosystems Against Side Channel Attacks 査読 国際誌

    Dong-Guk Han, Jongin Lim, Kouichi Sakurai

    Proc. ACISP 2004   2004年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Pseudorandomness of SPN-Type Transformations 査読 国際誌

    Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakura

    Proc. ACISP 2004   2004年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation 査読 国際誌

    Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai

    Proc. EuroPKI 2004   3093   85 - 97   2004年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Special section on Discrete Mathematics and its applications 査読

    Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E87-A ( 5 )   977   2004年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A Distributed Online Certificate Status Protocol with a Single Public Key 査読 国際誌

    Satoshi Koga, Kouichi SAKURAI

    Proc. Public Key Cryptography 2004   2947   389 - 401   2004年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model 査読 国際誌

    Kenji IMAMOTO, Kouichi SAKURAI

    Proc. AINA (1) 2004   327 - 332   2004年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Merging Method of Certification Authorities Without Using Cross-Certifications 査読 国際誌

    Satoshi Koga, Kouichi SAKURAI

    Proc. AINA (2) 2004   174 - 177   2004年3月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • 検証エージェントを用いたモバイルエージェントのためのリアルタイム改竄検出システムの提案 査読

    小手川祐樹, 櫻井幸一

    情報処理学会論文誌   2004年2月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • A New Attack with Side Channel Leakage During Exponent Recoding Computations 査読 国際誌

    Yasuyuki Sakai, Kouichi SAKURAI

    Proc. CHES 2004   3156   298 - 311   2004年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Analysis and Design for Private Message Board Systems 査読

    Kenji Imamotoh, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E87-A ( 1 )   204 - 211   2004年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Analysis and Design for Private Message Board Systems 査読 国際誌

    Kenji IMAMOTO, Kouichi SAKURAI

    IEICE Trans. Fundamentals   E87A ( 1 )   204 - 211   2004年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A new attack with side channel leakage during exponent recoding computations 査読

    Yasuyuki Sakai, Kouichi Sakurai

    Lecture Notes in Computer Science   3156   298 - 311   2004年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On security of XTR public key cryptosystems against side channel attacks 査読

    Dong Guk Han, Jongin Lim, Kouichi Sakurai

    Lecture Notes in Computer Science   3108   454 - 465   2004年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Enhancing privacy of universal re-encryption scheme for RFID tags 査読

    Junichiro Saito, Jae Cheol Ryou, Kouichi Sakurai

    Lecture Notes in Computer Science   3207   879 - 890   2004年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On the Security of SELinux with a Simplified Policy 査読 国際誌

    Katsuya SUEYASU, Toshihiro TABATA, Kouichi SAKURAI

    Proc. of the IASTED International Conference on Communication   2003年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Single-path authenticated-encryption scheme based on universal hashing 査読

    Soichi Furuya, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2595   94 - 109   2003年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using montgomery trick 査読

    Katsuyuki Okeya, Kouichi Sakurai

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2523   564 - 578   2003年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party 査読

    Jae Gwi Choi, Kouichi Sakurai, Ji Hwan Park

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2846   265 - 279   2003年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A reject timing attack on an IND-CCA2 public-key cryptosystem 査読

    Kouichi Sakurai, Tsuyoshi Takagi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   2587   359 - 373   2003年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response 査読 国際誌

    Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI

    Proc. of IASTED Int. Conf. on Communication, Network, and Information Security (CNIS 2003)   2003年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party 査読 国際誌

    Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park

    Prof. ACNS 2003   2846   265 - 279   2003年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation 査読 国際誌

    Yasuyuki Sakai, Kouichi SAKURAI

    Proc. ACNS 2003   2846   319 - 330   2003年10月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Mechanism to Detect Tampering on Mobile Agents using The Verification Agent 査読 国際誌

    Yuki Kotegawa, Kouichi SAKURAI

    Proc. International Workshop on Cryptology and Network Security (CANS03)   2003年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Private Certified E-mail Systems with Electronic Notice Board 査読 国際誌

    Kenji IMAMOTO, Kouichi SAKURAI

    Proc. International Workshop on Cryptology and Network Security (CANS03)   2003年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Tampering Detection Mechanism using a Trusted Host for Mobile Agents 査読 国際誌

    Yuki KOTEGAWA, Kouichi SAKURAI

    Proc. of the 2003 International Workshop on CRYPTOLOGY AND NETWORK SECURITY (CANS2003)   2003年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Certified E-mail Systems Using Public Notice Board 査読 国際誌

    Kenji IMAMOTO, Kouichi SAKURAI

    Trust and Privacy in Digital Business (TrustBus'03)   460 - 464   2003年9月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: 10.1109/DEXA.2003.1232065

  • A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation 査読 国際誌

    Kazuhide Fukushima, Kouichi SAKURAI

    Proc. WISA 2003   2908   303 - 316   2003年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • 配達仲介人を利用した配達証明付き電子メールの改良 査読

    今本 健二, 櫻井 幸一

    情報処理学会論文誌   2003年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Enhancing Airport Access Control Security With Multiple Biometrics Contactless Smart Card 査読

    M.David and K.SAKURAI

    2003年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • A secure digital watermark system for secondary distribution 査読

    Keiichi Iwamura, Kouichi Sakurai, Hideki Imai

    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)   86 ( 6 )   76 - 85   2003年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/ecjc.1151

  • A secure digital watermark system for secondary distribution 査読

    Keiichi Iwamura, Kouichi Sakurai, Hideki Imai

    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)   86 ( 6 )   76 - 85   2003年6月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1002/ecjc.1151

  • Decentralization Methods of Certification Authority Using the Digital Signature Schemes 査読 国際誌

    Satoshi KOGA, Kouichi SAKURAI

    2nd Annual PKI Research Workshop   2003年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem 査読 国際誌

    Kouichi SAKURAI and Tsuyoshi TAKAGI

    5th International Conference on Information Security and Cryptology, ICISC 2002   2587   359 - 373   2003年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • “A Secure Fragile Watermarking” 査読

    32 ( 1 )   22 - 28   2003年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    Previous fragile watermarking algorithms have been kept in secret, and not been discussed about the security except2).In 2), a secure fragile watermarking algorithm was proposed, even if it opens to the public. However, the algorithm needs to use different keys for different images. In this paper, we propose a fragile watermarking algorithm which can use the same key for different images. We show that this algorithm is secure, if it uses secure cryptographic function, pseudo-random number and self-synchronized pattern.

    DOI: 10.11371/iieej.32.22

  • Use of montgomery trick in precomputation of multi-scalar multiplication in elliptic curve cryptosystems 査読

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86-A ( 1 )   98 - 112   2003年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication 査読

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86-A ( 5 )   1135 - 1146   2003年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A Simple Power Attack On a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Trans. Fundamentals   E86A ( 5 )   1171 - 1180   2003年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystem 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Trans. Fundamentals   E86A ( 1 )   98 - 112   2003年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • サイドチャネル攻撃へのウィンドウ法を用いた防御法に対する2階電力差分攻撃 査読

    桶屋 勝幸, 櫻井 幸一

    情報処理学会論文誌   2003年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • 高度版ランダム化加算減算鎖法に対する多重電力解析 査読

    桶屋 勝幸, 櫻井 幸一

    情報処理学会論文誌   2003年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems 査読

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86-A ( 5 )   1171 - 1180   2003年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Timing attack against implementation of a parallel algorithm for modular exponentiation 査読

    Yasuyuki Sakai, Kouichi Sakurai

    Lecture Notes in Computer Science   2846   319 - 330   2003年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On the security of yet another reduced version of 3-pass HAVAL 査読

    Yong Sork Her, Kouichi Sakurai

    Unknown Journal   137   2003年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Analysis and design of SHA-V and RIPEMD-V with variable output-length 査読

    Yong Sork Her, Kouichi Sakurai

    Research Reports on Information Science and Electrical Engineering of Kyushu University   8 ( 1 )   13 - 18   2003年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Risks with Raw-key Masking the Security Evaluation of 2-key XCBC 査読 国際誌

    Soichi Furuya, Kouichi Sakurai

    Information and Communications Security, 4th International Conference, ICICS 2002   2513   327 - 341   2002年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Certified E-mail System With Receiver's Selective Usage of Delivery Authority 査読 国際誌

    Kenji IMAMOTO, Kouichi SAKURAI

    Third International Cryptology Conference in India (INDOCRYPT2002)   2551   326 - 338   2002年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Single-path Authenticated-encryption Scheme Based on Universal Hashing 査読 国際誌

    Soichi Furuya, Kouichi Sakurai

    9th Annual Workshop, SAC 2002   2595   94 - 109   2002年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Scalable On-line Certified E-mail Protocol Using Password Authentication 査読 国際誌

    Kenji IMAMOTO, Kouichi SAKURAI

    The 3rd International Workshop on Information Security Applications (WISA2002)   2002年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks 査読 国際誌

    Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai

    The 4th International Conference on Information Security and Cryptology (ICISC 2001)   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Trans. Fundamentals   E85A ( 1 )   84 - 93   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication 査読 国際誌

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E86A ( 5 )   1135 - 1146   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Speeding Up Elliptic Scalar Multiplication Using Multidoubling 査読 国際誌

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E85A ( 5 )   1075 - 1083   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • 暗号に利用可能なモンゴメリ型楕円曲線の存在数に関する一考察 査読

    桶屋 勝幸, 宮崎 邦彦, 櫻井 幸一

    応用数理学会論文誌   2002年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • サイドチャネル攻撃を防ぐモンゴメリ型楕円曲線上の 高速なスカラー倍計算方法 - 理論的アプローチ - 査読

    桶屋 勝幸, 宮崎 邦彦, 櫻井 幸一

    情報処理学会論文誌   2002年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive 査読 国際誌

    Kouichi SAKURAI and Tsuyoshi TAKAGI

    5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    Information Security Conference (ISC 2002)   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    Cryptographic Hardware and Embedded System (CHES 2002)   2523   564 - 578   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    Information Security and Privacy, 7th Australasian Conference (ACISP 2002)   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • An IND-CCA2 Public-Key Cryptosystem with Fast Decryption 査読 国際誌

    Johannes Buchmann, Kouichi SAKURAI and Tsuyoshi TAKAGI

    4th International Conference on Information Security and Cryptology, ICISC'01   2002年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery form and analysis of efficiency for elliptic curve cryptosystems 査読

    Katsuyuki Okeya, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E85-A ( 1 )   84 - 93   2002年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Speeding up elliptic scalar multiplication using multidoubling 査読

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E85-A ( 5 )   1075 - 1083   2002年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On the Power of Direct Computations in Speeding Up Elliptic Scalar Multiplication 査読 国際誌

    Y.Sakai and K.SAKURAI

    PreProc. Eighth Annual Workshop on Selected Areas in Cryptography (Aug. 2001)   2001年8月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve 査読 国際誌

    K.Okeya and K.SAKURAI

    Proc. Workshop on Cryptographic Hardware and Embedded Systems 2001   2001年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • English vs. Sealed bid in anonymous electronic auction protocols 査読 国際誌

    Hirakiuchi DAISUKE , Kouichi Sakurai

    Proc. of 10th IEEE international workshops on enabling technologies, WETICE 2001   171 - 176   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

    DOI: 10.1109/ENABL.2001.953409

  • On distributed cryptographic protocols for threshold RSA signing and decrypting with no dealer 査読

    Shingo Miyazaki, Kouichi Sakurai, Moti Yung

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E84-A ( 5 )   1177 - 1184   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Efficient scalar multiplications on elliptic curves with direct computations of several doublings 査読

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E84-A ( 1 )   120 - 129   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A theory of demonstrating program result-correctness with cryptographic applications 査読

    Kouichi Sakurai

    IEICE Transactions on Information and Systems   E84-D ( 1 )   4 - 14   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings 査読 国際誌

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E84A ( 1 )   120 - 129   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A Theory of Demonstrating Program Result-Correctness with Cryptographic Applications 招待 査読 国際誌

    Kouichi SAKURAI

    IEICE Trans.   E84D ( 1 )   4 - 14   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer 査読 国際誌

    Shingo MIYAZAKI, Kouichi SAKURAI and Moti YUNG

    IEICE Trans   E84A ( 5 )   1177 - 1183   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • 非周期的自己アフィンタイル貼りにおけるタイルの境界集合の構成と彩色 査読

    貞広 泰造, 櫻井幸一

    情報処理学会論文誌   2001年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • 複数の機密画像を埋め込み可能なグラフタイプ視覚複合型秘密分散方式の拡張 査読

    須賀 祐治, 岩村 恵市, 櫻井幸一, 今井 秀樹

    情報処理学会論文誌   2001年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • 2次配布に対して安全な電子透かしシステム 査読

    岩村 恵市, 櫻井 幸一, 今井 秀樹

    電子情報通信学会論文誌   2001年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the $y$-Coordinate on a Montgomery-Form Elliptic Curve 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    Cryptographic Hardware and Embedded System (CHES 2001)   2001年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • An Anonymous Electronic Bidding Protocol Based on New Convertible Group Signature Scheme 査読 国際誌

    Kouichi SAKURAI, Shingo Miyazaki

    Proc. ACISP2000   2000年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • 配布者の不正に対して安全な電子透かしシステム 査読

    岩村 恵市, 櫻井 幸一, 今井 秀樹

    電子情報通信学会論文誌   2000年7月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Efficient Scalar Multiplication on Elliptic Curves without Repeated Doublings and their Practical Performance 査読 国際誌

    Yasuyuki Sakai, Kouichi SAKURAI

    Proc. ACISP2000   2000年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • On zero-knowledge proofs: "from membership to decision" 査読 国際誌

    G. Di Crecenzo, K. SAKURAI and M. Yung

    Proc. ACM STOC2000   2000年5月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications 査読 国際誌

    Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai

    Public Key Cryptography (PKC 2000)   1751   238 - 257   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem 査読

    Shingo Miyazaki, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83-A ( 1 )   106 - 108   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A Progress Report on Lattice Based Public-Key Cryptosystems -Theoretical Security versus Practical Cryptanalysis 査読

    Kouichi Sakurai

    IEICE Transactions on Information and Systems   E83-D ( 3 )   570 - 579   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation 査読 国際誌

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83A ( 4 )   692 - 703   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A Progress Report on Lattice Based Public-Key Cryptosystems --Theoretical Security versus Practical Cryptanalysis -- 招待 査読 国際誌

    Kouichi SAKURAI

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E83D ( 3 )   570 - 579   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A practical off-line digital-money system with partilly blind signatures based on the discrete logarithm problem 査読 国際誌

    Shingo MIYAZAKI, Kouichi SAKURAI

    IEICE Transactions   E83A ( 1 )   106 - 108   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • 変換可能なグループ署名を用いた電子電子入札方式 査読

    宮崎真悟, 櫻井幸一

    情報処理学会論文誌   2000年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack 査読 国際誌

    Katsuyuki Okeya, Kouichi Sakurai

    Progress in Cryptology - INDOCRYPT 2000   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Making Hash Functions from Block Ciphers secure and efficient by using convolutional codes 査読 国際誌

    Toru Inoue and Kouichi SAKURAI

    Proc. PKC2000   1751   391 - 404   2000年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • On the practical performance of hyperelliptic curve cryptosystems in software implementation 査読

    Yasuyuki Sakai, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E83-A ( 4 )   692 - 701   2000年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Cryptosystems 査読 国際誌

    Tetsuya Tamura, Kouichi SAKURAI

    PreProc. 1999 International Conference on Information Security and Cryptology   1787   221 - 235   1999年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Over $F_p$ vs. $F_{2^n}$ over and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve 査読 国際誌

    Yasuyuki Sakai and Kouichi SAKURAI

    PreProc. 1999 International Conference on Information Security and Cryptology   1787   82 - 101   1999年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • On Threshold RSA-Signing with no Dealer 査読 国際誌

    Shingo MIYAZAKI, Kouichi SAKURAI and Moti YUNG

    PreProc. 1999 International Conference on Information Security and Cryptology   1787   197 - 207   1999年12月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • 公開掲示板を用いた競り下げ電子オークション方式 査読

    宮崎真悟, 櫻井幸一

    情報処理学会論文誌   1999年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • 有限体$F_{2^n}$上の超楕円曲線暗号のソフトウエア実装 査読

    酒井 康行, 櫻井幸一

    電子情報通信学会論文誌   1999年8月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • オフライン型電子現金システムの分類と管理機関の内部不正に対する安全性評価 査読

    宮崎 真悟, 櫻井 幸一

    情報処理学会論文誌   1999年3月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Toward Fair International Key Escrow -- An attempt by distributed Trusted Third Agencies with threshold cryptography -- 査読 国際誌

    S.Miyazaki, I. Kuroda, and K. SAKURAI

    Proc. 1999 International Workshop on Practice and Theory in Public Key Cryptography   1560   171 - 187   1999年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Divertible and subliminal-free zero-knowledge proofs for languages 査読 国際誌

    T.Itoh, M.Burmester, Y.Desmdet, K.SAKURAI, and H.Shizuya

    J. of Cryptology   12 ( 3 )   197 - 223   1999年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s001459900053

  • Efficient algorithms for the Jacobian variety fo hyperelliptic curves $y^2 = x^p -x + 1$ over a finite field of odd characteristic $p$ 査読 国際誌

    I. Duursma, and K. SAKURAI

    Coding Theory, Cryptography and related areas   1999年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Parallel Withstanding Attack with Forging Key Certificates on an Electronic Cash System Based on Message-Recovery Blind Digital Signatures 査読 国際誌

    S.Miyazaki, and K. SAKURAI

    Proc. International Workshop on Cryptographic Techniques & E-Commerce   1999年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Bulletin-Board Based Digital Auction Scheme with Bidding Down Strategy - Towards Anonymous Electronic Bidding without Anonymous Channels nor Trusted Centers 査読 国際誌

    K. SAKURAI and S.Miyazaki

    Proc. International Workshop on Cryptographic Techniques & E-Commerce   1999年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Classification of Chaum-Fiat-Naor Paradigm based anonymous electronic cash systems accroding to vulunerability aganist insider-attacks from untrusted authorities 査読 国際誌

    M.Shingo and K. SAKURAI

    Proc. International Workshop on Cryptographic Techniques & E-Commerce   1999年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • An improvement of ElYaniv-Fiat-Karp-Tarpin's money-making bi-directional strategy 査読 国際誌

    E. Dannoura and K.SAKURAI

    Information Processing Letters   66 ( 1 )   27 - 33   1998年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/S0020-0190(98)00032-5

  • An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy 査読

    Eisuke Dannoura, Kouichi Sakurai

    Information Processing Letters   66 ( 1 )   27 - 33   1998年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Secure hyperelliptic cryptosystems and their performance 査読 国際誌

    Y.Sakai, K. SAKURAI and M. Ishizuka

    Proc. PKC'98   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A Structural comparison of the computational difficulty of breaking discrete log cryptosystems. 査読 国際誌

    K.SAKURAI and H. Shizuya

    J. of Cryptology   11 ( 1 )   29 - 43   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1007/s001459900033

  • 取引手数料を考慮したオンライン為替交換アルゴリズムの効率解析 査読

    檀浦 詠介, 櫻井 幸一

    情報処理学会論文誌   1998年1月

     詳細を見る

    記述言語:日本語   掲載種別:研究論文(学術雑誌)  

  • Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over $F_{2^n}$ 査読 国際誌

    Y.Sakai, K. SAKURAI

    Proc. of ASIACRYPT'98   1514   80 - 94   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Checking programs discreteetly: Demonstrating result-correctness efficiently while concealing it 査読 国際誌

    G. Di Crecenzo, K. SAKURAI and M. Yung

    Algorithms and Computation 9th International Symposium, ISAAC'98   1533   59 - 68   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Secure hyperelliptic cryptosystems and their performance 査読 国際誌

    Y.Sakai, K. SAKURAI and M. Ishizuka

    Proc. Public Key Cryptography'98   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • A more efficient untraceable e-cash system with partially blind signatures based on the the discrete logarithm problem 査読 国際誌

    S.Miyazaki, and K. SAKURAI

    Proc.Financial Cryptology'98   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Result-indistinguishable zero-knowledge proofs: increased power and constant-round protocols 査読 国際誌

    G. Di Crecenzo, K. SAKURAI and M. Yung

    STACS 98, 15th Annual Symposium on Theoretical Aspects of Computer Science   1373   511 - 521   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Security Issues for Contactless Smart Cards 査読 国際誌

    M.David and K. SAKURAI

    Proc. PKC'98   1998年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(国際会議プロシーディングス)  

  • Practical proofs of knowledge without relying on theoretical proofs of membership on languages 査読

    Kouichi Sakurai

    Theoretical Computer Science   181 ( 2 )   317 - 335   1997年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/S0304-3975(96)00277-0

  • Practical proofs of knowledge without relying on theoretical proofs of membership on languages 査読

    Kouichi Sakurai

    Theoretical Computer Science   181 ( 2 )   317 - 335   1997年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/S0304-3975(96)00277-0

  • On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis 査読

    Kouichi Sakurai, Yuliang Zheng

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E80-A ( 1 )   19 - 24   1997年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • A short certificate of the number of universal optimal strategies for stopping simple stochastic games 査読

    Akio Yanbe, Kouichi Sakurai

    Information Processing Letters   57 ( 1 )   17 - 24   1996年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/0020-0190(95)00181-6

  • A short certificate of the number of universal optimal strategies for stopping simple stochastic games 査読

    Akio Yanbe, Kouichi Sakurai

    Information Processing Letters   57 ( 1 )   17 - 24   1996年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

    DOI: 10.1016/0020-0190(95)00181-6

  • On the complexity of the discrete logarithm for a general finite group 査読

    Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E79-A ( 1 )   61 - 65   1996年

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Subliminal channels for transferring signatures Yet another cryptographic primitive 査読

    Kouichi Sakurai, Toshiya Itoh

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E77-A ( 1 )   31 - 38   1994年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Constant round perfect ZKIP of computational ability 査読

    Toshiya Itoh, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 7 )   1225 - 1233   1993年7月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Characterization of languages in constant round perfect zero-knowledge interactive proofs 査読

    Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 4 )   546 - 554   1993年4月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • On the complexity of constant round ZKIP of possession of knowledge 査読

    Tosyiya Itoh, Kouichi Sakurai

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 1 )   31 - 39   1993年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

  • Practical consequences of the discrepancy between zero-knowledge protocols and their parallel execution 査読

    Kouichi Sakurai, Toshiya Itoh

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E76-A ( 1 )   14 - 22   1993年1月

     詳細を見る

    記述言語:英語   掲載種別:研究論文(学術雑誌)  

▼全件表示

書籍等出版物

  • 情報セキュリティ (IT Text)

    宮地 充子 編著、菊池 浩明 編著 執筆分担 /櫻井幸一( 担当: 共著)

    オーム社  2003年10月 

     詳細を見る

    記述言語:日本語   著書種別:学術書

    ネットワーク化の進展により重要度が増している情報セキュリティ技術について、基礎となる現代暗号理論から評価、認証技術、ネットワークセキュリティの最新の具体的技術まで、基準や情報倫理も含めて網羅した教科書。  情報セキュリティの全分野を体系的に学習できる。

  • 数論アルゴリズムと楕円暗号理論入門 ニール コブリッツ (著), 桜井 幸一 (翻訳)

    ニール コブリッツ (著), 桜井 幸一 (翻訳)( 担当: 単訳)

    (シュプリンガー数学クラブ)  1997年8月 

     詳細を見る

    記述言語:日本語   著書種別:学術書

    リポジトリ公開URL: http://hdl.handle.net/2324/1001353021

講演・口頭発表等

  • Application and limitations of non-fungible tokens from a cryptographic perspective 招待

    Kouichi SAKURAI

    BIOTC 2023  2023年7月 

     詳細を見る

    開催年月日: 2023年7月

    記述言語:英語   会議種別:口頭発表(一般)  

    国名:日本国  

    その他リンク: https://www.biotc.net/biotc2023.html

  • Revisiting computationally independent pair of one-way functions from the point of view of non-malleability 招待 国際会議

    The 2021 IEEE Conference on Dependable and Secure Computing  2021年2月 

     詳細を見る

    開催年月日: 2021年1月 - 2021年2月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    国名:日本国  

    その他リンク: http://nsclab.org/dsc2021/keynote.html

  • Hiding digital information with AI: Power and Generalization of Adversarial Cryptography 招待

    The International Conference on Security & Privacy (ICSP 2020)  2020年11月 

     詳細を見る

    開催年月日: 2020年11月 - 2021年11月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    国名:インド  

    その他リンク: https://sites.google.com/view/icsp2020/invited-speakers

  • How does Blockchain improve Electronic Voting ? 招待 国際会議

    International Conference on Computational Intelligence, Data Science and Cloud Computing  2020年11月 

     詳細を見る

    開催年月日: 2020年9月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    国名:インド  

    その他リンク: http://www.iem-icdc.org/index.html#

  • Power and limitation of Adversarial Machine Learning an thdeir consequences 招待 国際会議

    Kouichi SAKURAI

    The Conference for ICT-Research in the Netherlands  2018年3月 

     詳細を見る

    開催年月日: 2018年3月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    国名:オランダ王国  

    その他リンク: http://www.ictopen.nl

  • Non-commutative approach enhance security of cryptosytems ?—    from Ong-Schnorr-Shamir via Sato-Araki towards Post Quantum Paradigm -- 招待 国際会議

    2018年1月 

     詳細を見る

    開催年月日: 2018年1月 - 2018年6月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    開催地:IIT (BHU) Varanasi   国名:インド  

  • (1)Bitcoin, Blockchain, FinTech, IoT, AI and your Future (2) Cryptography with Blockchain 招待 国際会議

    Koichi SAKURAI

    2018年6月 

     詳細を見る

    開催年月日: 2017年11月 - 2017年12月

    記述言語:日本語   会議種別:シンポジウム・ワークショップ パネル(公募)  

    国名:インド  

    その他リンク: https://www.isical.ac.in/~rcbose/blockchain2017/

  • Anti-forensic aspects of biometirics towards Receipt-freeness and Coercion-Resistance in authentication protocols 招待 国際会議

    ATCS workshop of 12th EAI International Conference on Security and Privacy in Communication Networks  2016年10月 

     詳細を見る

    開催年月日: 2016年10月

    記述言語:日本語  

    国名:中華人民共和国  

    その他リンク: http://securecomm.org/2016/show/program-preliminary

  • Anti-forensic Aspects in Biometric Authentication Protocols: Receipt-freeness, Coercion-Resistance, and Undeniability 招待 国際会議

    Kouichi Sakurai

    UAE Cyber Security Workshop  2016年4月 

     詳細を見る

    開催年月日: 2016年4月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    国名:アラブ首長国連邦  

    その他リンク: https://cybersecurityseminar.splashthat.com/

  • New infrastructure and applications developed from a cryptocurrency BITCOIN and a platform ETHEREUM 招待 国際会議

    Kouichi Sakurai

    ICoICT 2015 (The 3rd International Conference of Information and Communication Technology)  2015年5月 

     詳細を見る

    開催年月日: 2015年5月

    記述言語:英語   会議種別:口頭発表(招待・特別)  

    国名:インドネシア共和国  

    その他リンク: http://2015.icoict.org/keynote-speaker/

  • A recent progress on design and analysis of Neural Cryptosystems 招待 国際会議

    Kouichi Sakurai

    The 8th IEEE International Conference on Smart City and Informatization (iSCI 2020)  2020年12月 

     詳細を見る

    開催年月日: 2020年12月 - 2021年1月

    記述言語:英語   会議種別:口頭発表(一般)  

    国名:中華人民共和国  

  • An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

    Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai

    7th International Symposium on Computing and Networking, CANDAR 2019  2019年11月 

     詳細を見る

    開催年月日: 2019年11月

    記述言語:英語  

    国名:日本国  

  • Reliable decentralized oracle with mechanisms for verification and disputation

    Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    7th International Symposium on Computing and Networking Workshops, CANDARW 2019  2019年11月 

     詳細を見る

    開催年月日: 2019年11月

    記述言語:英語  

    国名:日本国  

  • Frame difference generative adversarial networks Clearer contour video generating

    Rui Qiu, Danilo Vasconcellos Vargas, Kouich Sakurai

    7th International Symposium on Computing and Networking Workshops, CANDARW 2019  2019年11月 

     詳細を見る

    開催年月日: 2019年11月

    記述言語:英語  

    国名:日本国  

  • Proposal and evaluation of a security incident response training method using programming

    Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai

    20th Annual Conference on Information Technology Education, SIGITE 2019  2019年9月 

     詳細を見る

    開催年月日: 2019年10月

    記述言語:英語  

    国名:アメリカ合衆国  

  • Efficient shortest path routing algorithms for distributed XML processing

    Ye Longjian, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai

    15th International Conference on Web Information Systems and Technologies, WEBIST 2019  2019年1月 

     詳細を見る

    開催年月日: 2019年9月

    記述言語:英語  

    国名:オーストリア共和国  

  • Secret Sharing on Evolving Multi-level Access Structure

    Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai

    20th World Conference on Information Security Applications, WISA 2019  2020年1月 

     詳細を見る

    開催年月日: 2019年8月

    記述言語:英語  

    国名:大韓民国  

  • A sequential scheme for detecting cyber attacks in IoT environment

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    17th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019  2019年8月 

     詳細を見る

    開催年月日: 2019年8月

    記述言語:英語  

    国名:日本国  

  • Security and trust issues on digital supply chain

    Haibo Zhang, Toru Nakamura, Kouichi Sakurai

    17th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Science and Technology Congress, DASC-PiCom-CBDCom-CyberSciTech 2019  2019年8月 

     詳細を見る

    開催年月日: 2019年8月

    記述言語:英語  

    国名:日本国  

  • Universal Rules for Fooling Deep Neural Networks based Text Classification

    Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi

    2019 IEEE Congress on Evolutionary Computation, CEC 2019  2019年6月 

     詳細を見る

    開催年月日: 2019年6月

    記述言語:英語  

    国名:ニュージーランド  

  • Deniable Secret Handshake Protocol - Revisited

    Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月

    記述言語:英語  

    国名:日本国  

  • Simulation of Secure Volunteer Computing by Using Blockchain

    Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月

    記述言語:英語  

    国名:日本国  

  • Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月

    記述言語:英語  

    国名:日本国  

  • Deniable Secret Handshake Protocol - Revisited

    Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月

    記述言語:英語  

    国名:日本国  

  • Simulation of Secure Volunteer Computing by Using Blockchain

    Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月

    記述言語:英語  

    国名:日本国  

  • Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation

    Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月

    記述言語:英語  

    国名:日本国  

  • Deniable Secret Handshake Protocol - Revisited

    Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai

    33rd International Conference on Advanced Information Networking and Applications, AINA-2019  2020年1月 

     詳細を見る

    開催年月日: 2019年3月