default search action
Kouichi Sakurai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j121]Maharage Nisansala Sevwandi Perera, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Secured tracing for group signatures from attribute-based encryption. Concurr. Comput. Pract. Exp. 36(15) (2024) - [j120]Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 107(9): 1110-1111 (2024) - [j119]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments. Int. J. Netw. Comput. 14(2): 123-144 (2024) - [j118]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks. J. Inf. Secur. Appl. 84: 103797 (2024) - [c359]Hideki Sakurada, Kouichi Sakurai:
SoK: Directions and Issues in Formal Verification of Payment Protocols. AINA (4) 2024: 111-119 - [c358]Yang Lyu, Yaokai Feng, Kouichi Sakurai:
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds. AINA (4) 2024: 133-144 - [c357]Haibo Zhang, Kouichi Sakurai:
Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies. AINA (3) 2024: 151-162 - [c356]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Enhancing Security and Efficiency: A Lightweight Federated Learning Approach. AINA (4) 2024: 349-359 - [c355]Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai:
Extension of Resource Authorization Method with SSI in Edge Computing. AINA (6) 2024: 385-394 - [c354]Hong Zhao, Enting Guo, Xiuheng Liao, Kouichi Sakurai, Chunhua Su:
The Framework of General Channel Key Generation Based on Physical Layer. DSPP (2) 2024: 204-220 - [c353]Yiluo Liu, Yaokai Feng, Kouichi Sakurai:
A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy. IMCOM 2024: 1-8 - [i31]Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
Versatile Defense Against Adversarial Attacks on Image Recognition. CoRR abs/2403.08170 (2024) - [i30]Xiaozhou Ye, Kouichi Sakurai, Nirmal-Kumar C. Nair, Kevin I-Kai Wang:
Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity - A Review. CoRR abs/2403.15422 (2024) - [i29]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay:
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication. CoRR abs/2403.18247 (2024) - [i28]Kaito Taguchi, Yujie Gu, Kouichi Sakurai:
The Impact of Prompts on Zero-Shot Detection of AI-Generated Text. CoRR abs/2403.20127 (2024) - [i27]Yuzhang Chen, Jiangnan Zhu, Yujie Gu, Minoru Kuribayashi, Kouichi Sakurai:
FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks. CoRR abs/2409.09996 (2024) - [i26]Yukai Xu, Yujie Gu, Kouichi Sakurai:
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning. CoRR abs/2409.12072 (2024) - [i25]Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
Access Structure Hiding Verifiable Tensor Designs. IACR Cryptol. ePrint Arch. 2024: 902 (2024) - [i24]Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, Kouichi Sakurai:
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 1217 (2024) - 2023
- [j117]Surbhi Soni, Ayan Seal, Sraban Kumar Mohanty, Kouichi Sakurai:
Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection. Biomed. Signal Process. Control. 85: 104873 (2023) - [j116]Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Learning asymmetric encryption using adversarial neural networks. Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023) - [j115]Rodrigo Roman, Cristina Alcaraz, Javier López, Kouichi Sakurai:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. IEEE Secur. Priv. 21(4): 29-38 (2023) - [j114]Yang Lyu, Yaokai Feng, Kouichi Sakurai:
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection. Inf. 14(3): 191 (2023) - [j113]Haibo Zhang, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
A Review on Machine Unlearning. SN Comput. Sci. 4(4): 337 (2023) - [j112]Haowen Tan, Wenying Zheng, Pandi Vijayakumar, Kouichi Sakurai, Neeraj Kumar:
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(12): 15590-15600 (2023) - [j111]Chenmin Wang, Peng Li, Xuepeng Fan, Zaiyang Tang, Yulong Zeng, Kouichi Sakurai:
Phoenix: A Live Upgradable Blockchain Client. IEEE Trans. Sustain. Comput. 8(4): 703-714 (2023) - [c352]Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method. ACNS Workshops 2023: 601-620 - [c351]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance. ACNS Workshops 2023: 685-689 - [c350]Haibo Zhang, Zhihua Yao, Kouichi Sakurai:
POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses. ACNS Workshops 2023: 690-694 - [c349]Kei Ikebe, Yudai Hata, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT). ASSE 2023: 119-125 - [c348]Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments. candar 2023: 1-10 - [c347]Muyuan Niu, Yaokai Feng, Kouichi Sakurai:
A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds. IMCOM 2023: 1-8 - [c346]Hideki Sakurada, Kouichi Sakurai:
Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks. MobiSec 2023: 248-259 - [c345]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. NSS 2023: 155-176 - [c344]Pengju He, Haibo Zhang, Yaokai Feng, Kouichi Sakurai:
A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network. SciSec 2023: 513-523 - [i23]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. CoRR abs/2311.08625 (2023) - [i22]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1750 (2023) - [i21]Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil Lee, Bo-Gyeong Kang, Kouichi Sakurai:
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2023: 1889 (2023) - 2022
- [j110]Jong-Yeon Park, Yong-Hyuk Moon, Won-Il Lee, Sung-Hyun Kim, Kouichi Sakurai:
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100. IEEE Access 10: 2546-2563 (2022) - [j109]Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai:
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing. IEEE Access 10: 121329-121339 (2022) - [j108]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j107]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. Cryptogr. 6(2): 20 (2022) - [j106]Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. IEICE Trans. Inf. Syst. 105-D(2): 195-204 (2022) - [j105]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
Handling class Imbalance problem in Intrusion Detection System based on deep learning. Int. J. Netw. Comput. 12(2): 467-492 (2022) - [j104]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing. J. Inf. Secur. Appl. 66: 103127 (2022) - [j103]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms. IEEE Trans. Inf. Theory 68(10): 6904-6914 (2022) - [c343]Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. AsiaCCS 2022: 1213-1215 - [c342]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [c341]Kevin I-Kai Wang, Xiaozhou Ye, Kouichi Sakurai:
Federated Learning with Clustering-Based Participant Selection for IoT Applications. IEEE Big Data 2022: 6830-6831 - [c340]Kei Ikebe, Kouichi Sakurai:
Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions. BIOTC 2022: 54-61 - [c339]Kaito Taguchi, Kouichi Sakurai, Masahiro Iida:
Towards the Design of Locally Differential Private Hardware System for Edge Computing. CANDAR 2022: 186-191 - [c338]Kei Ikebe, Kouichi Sakurai:
Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining. CANDARW 2022: 380-383 - [c337]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Security Properties of Combinatorial All-or-nothing Transforms. ISIT 2022: 1447-1452 - [c336]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities. ISPEC 2022: 554-572 - [c335]Shohei Satake, Yujie Gu, Kouichi Sakurai:
Explicit Non-malleable Codes from Bipartite Graphs. WAIFI 2022: 221-236 - [c334]Issei Murata, Pengju He, Yujie Gu, Kouichi Sakurai:
Towards Evaluating the Security of Human Computable Passwords Using Neural Networks. WISA 2022: 303-312 - [e9]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - [e8]Chunhua Su, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3 [contents] - [i20]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Information-theoretic Security of Combinatorial All-or-nothing Transforms. CoRR abs/2202.10280 (2022) - 2021
- [j102]Haibo Zhang, Kouichi Sakurai:
A Survey of Software Clone Detection From Security Perspective. IEEE Access 9: 48157-48173 (2021) - [j101]Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Neural Networks-Based Cryptography: A Survey. IEEE Access 9: 124727-124740 (2021) - [j100]Haibo Zhang, Kouichi Sakurai:
Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. IEEE Access 9: 169031-169043 (2021) - [j99]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Kouichi Sakurai:
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. Theor. Comput. Sci. 891: 131-148 (2021) - [j98]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021) - [c333]Laltu Sardar, Gaurav Bansal, Sushmita Ruj, Kouichi Sakurai:
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data. COMSNETS 2021: 465-473 - [c332]Xiaojuan Cai, Yaokai Feng, Kouichi Sakurai:
Sequential Detection of Cyber-attacks Using a Classification Filter. DASC/PiCom/CBDCom/CyberSciTech 2021: 659-666 - [c331]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Perpetual Secret Sharing from Dynamic Data Structures. DSC 2021: 1-8 - [c330]Sumit Kumar Debnath, Kouichi Sakurai, Kunal Dey, Nibedita Kundu:
Secure Outsourced Private Set Intersection with Linear Complexity. DSC 2021: 1-8 - [c329]Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. DSC 2021: 1-8 - [c328]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. CANDAR 2021: 38-47 - [c327]Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. CANDAR (Workshops) 2021: 473-477 - [c326]Tao Wang, Yaokai Feng, Kouichi Sakurai:
Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding. IMCOM 2021: 1-7 - [i19]Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai:
Evolution of Bulletin Board & its application to E-Voting - A Survey. IACR Cryptol. ePrint Arch. 2021: 47 (2021) - [i18]Shohei Satake, Yujie Gu, Kouichi Sakurai:
Graph-Based Construction for Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2021: 164 (2021) - [i17]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. IACR Cryptol. ePrint Arch. 2021: 276 (2021) - [i16]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. IACR Cryptol. ePrint Arch. 2021: 618 (2021) - 2020
- [j97]Zhao Hao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks. Int. J. Netw. Comput. 10(2): 213-226 (2020) - [j96]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20(16): 4372 (2020) - [c325]Kosuke Kaneko, Ke Yan, Kouichi Sakurai:
Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract. CISIS 2020: 199-209 - [c324]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - [c323]Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. EIDWT 2020: 334-341 - [c322]Haibo Zhang, Kouichi Sakurai:
Blockchain for IoT-Based Digital Supply Chain: A Survey. EIDWT 2020: 564-573 - [c321]Shilei Cao, Kouichi Sakurai:
Face completion with pyramid semantic attention and latent codes. CANDAR 2020: 1-8 - [c320]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c319]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. NSS 2020: 292-308 - [c318]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. WISA 2020: 89-100 - [e7]Guojun Wang, Zhong Fan, Md. Zakirul Alam Bhuiyan, Kouichi Sakurai:
8th IEEE International Conference on Smart City and Informatization, iSCI 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0394-8 [contents] - [i15]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2020: 719 (2020)
2010 – 2019
- 2019
- [j95]Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j94]Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. Int. J. Netw. Comput. 9(2): 188-200 (2019) - [j93]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11: 1 (2019) - [j92]Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. J. Inf. Secur. Appl. 45: 10-19 (2019) - [j91]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 23(5): 828-841 (2019) - [c317]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. AINA 2019: 458-469 - [c316]Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. AINA 2019: 883-894 - [c315]Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. AINA 2019: 1266-1278 - [c314]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CEC 2019: 2221-2228 - [c313]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. DASC/PiCom/DataCom/CyberSciTech 2019: 238-244 - [c312]Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. DASC/PiCom/DataCom/CyberSciTech 2019: 338-343 - [c311]Rui Qiu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating. CANDAR Workshops 2019: 169-175 - [c310]Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. CANDAR 2019: 239-244 - [c309]Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Reliable Decentralized Oracle with Mechanisms for Verification and Disputation. CANDAR Workshops 2019: 346-352 - [c308]Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - [c307]Sabyasachi Dutta, Kouichi Sakurai:
Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability - Revisited. ICMC 2019: 97-109 - [c306]Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai:
Proposal and Evaluation of a Security Incident Response Training Method using Programming. SIGITE 2019: 165 - [c305]Longjian Ye, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai:
Efficient Shortest Path Routing Algorithms for Distributed XML Processing. WEBIST 2019: 265-272 - [c304]Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i14]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CoRR abs/1901.07132 (2019) - [i13]Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. IACR Cryptol. ePrint Arch. 2019: 323 (2019) - 2018
- [j90]Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - [c303]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c302]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - [c301]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. COMPSAC (2) 2018: 664-669 - [c300]Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai:
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks. DASC/PiCom/DataCom/CyberSciTech 2018: 173-180 - [c299]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. CANDAR Workshops 2018: 223-227 - [c298]Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai:
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding. CANDAR Workshops 2018: 417-423 - [c297]Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Neural Cryptography Based on the Topology Evolving Neural Networks. CANDAR Workshops 2018: 472-478 - [c296]Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. CANDAR Workshops 2018: 524-528 - [c295]Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. CANDAR Workshops 2018: 534-538 - [c294]Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. CANDAR Workshops 2018: 561-563 - [c293]Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018: 171-188 - [c292]Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [c291]Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai:
Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 257-262 - [e6]Satya V. Lokam, Sushmita Ruj, Kouichi Sakurai:
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June 4, 2018. ACM 2018 [contents] - [e5]Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh:
Mathematics and Computing - 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers. Communications in Computer and Information Science 834, Springer 2018, ISBN 978-981-13-0022-6 [contents] - [i12]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware based on Image Recognition. CoRR abs/1802.03714 (2018) - [i11]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking Convolutional Neural Network using Differential Evolution. CoRR abs/1804.07062 (2018) - 2017
- [j89]Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai:
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57: 241-256 (2017) - [j88]Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai:
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j87]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans. Inf. Forensics Secur. 12(8): 1967-1978 (2017) - [j86]Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai:
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions. J. Supercomput. 73(10): 4275-4301 (2017) - [c290]Xiang You, Yaokai Feng, Kouichi Sakurai:
Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow. CANDAR 2017: 522-528 - [c289]Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking. CANDAR 2017: 533-536 - [c288]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - [c287]Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai:
Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 - [c286]Tomohisa Ishikawa, Kouichi Sakurai:
A proposal of event study methodology with Twitter sentimental analysis for risk management. IMCOM 2017: 14 - [c285]Taku Nishigori, Junpei Kawamoto, Kouichi Sakurai:
Improving the accuracy of signature authentication using the eight principles of Yong. IMCOM 2017: 32 - [c284]Liang Lu, Yaokai Feng, Kouichi Sakurai:
C&C session detection using random forest. IMCOM 2017: 34 - [c283]Tomohisa Ishikawa, Kouichi Sakurai:
Parameter manipulation attack prevention and detection by using web application deception proxy. IMCOM 2017: 74 - [c282]Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai:
On unconditionally binding code-based commitment schemes. IMCOM 2017: 101 - [c281]Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. IML 2017: 35:1-35:8 - [c280]Kouichi Sakurai, Takashi Nishide, Amril Syalim:
Improved proxy re-encryption scheme for symmetric key cryptography. IWBIS 2017: 105-111 - [c279]Amril Syalim, Kouichi Sakurai:
How to sign multiple versions of digital documents. IWBIS 2017: 133-136 - [c278]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Evasion Attacks Against Statistical Code Obfuscation Detectors. IWSEC 2017: 121-137 - [c277]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation. SpaCCS 2017: 461-473 - [c276]Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. TrustCom/BigDataSE/ICESS 2017: 201-209 - [i10]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One pixel attack for fooling deep neural networks. CoRR abs/1710.08864 (2017) - 2016
- [j85]Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints. J. Internet Serv. Inf. Secur. 6(2): 23-36 (2016) - [j84]Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, Kouichi Sakurai:
Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 61: 59-80 (2016) - [j83]Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. Secur. Commun. Networks 9(12): 1717-1725 (2016) - [c275]Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai:
A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage. CIT 2016: 524-531 - [c274]Yoshifumi Ueshige, Kouichi Sakurai:
Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols. AINA 2016: 769-775 - [c273]Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai:
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing. AsiaJCIS 2016: 39-47 - [c272]Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation. AsiaJCIS 2016: 80-86 - [c271]Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. BWCCA 2016: 231-242 - [c270]Linghuan Xiao, Shinichi Matsumoto, Tomohisa Ishikawa, Kouichi Sakurai:
SQL Injection Attack Detection Method Using Expectation Criterion. CANDAR 2016: 649-654 - [c269]Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. ICDCN 2016: 14:1-14:10 - [c268]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. ICITS 2016: 3-23 - [c267]Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai:
Cross-group Secret Sharing for Secure Cloud Storage Service. IMCOM 2016: 63:1-63:8 - [c266]Tomohisa Ishikawa, Kouichi Sakurai:
A Study of Security Management with Cyber Insurance. IMCOM 2016: 68:1-68:6 - [c265]Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai:
Cyberbullying detection using parent-child relationship between comments. iiWAS 2016: 325-334 - [c264]Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. IMIS 2016: 603-607 - [c263]Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Behavior-Based Method for Detecting DNS Amplification Attacks. IMIS 2016: 608-613 - [c262]Samiran Bag, Kouichi Sakurai:
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. ISC 2016: 167-180 - [c261]Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. IWDW 2016: 251-262 - [c260]Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai:
Expressive Rating Scheme by Signatures with Predications on Ratees. NSS 2016: 363-379 - [c259]Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98 - [c258]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks. WISA 2016: 79-89 - [i9]Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures. IACR Cryptol. ePrint Arch. 2016: 483 (2016) - 2015
- [j82]Angsuman Das, Avishek Adhikari, Kouichi Sakurai:
Plaintext checkable encryption with designated checker. Adv. Math. Commun. 9(1): 37-53 (2015) - [j81]Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
A multivariate quadratic challenge toward post-quantum generation cryptography. ACM Commun. Comput. Algebra 49(3): 105-107 (2015) - [j80]Kouichi Sakurai:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 1-2 (2015) - [j79]Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, Kouichi Sakurai:
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. J. Inf. Sci. Eng. 31(2): 727-742 (2015) - [j78]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c257]Zhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms. AINA 2015: 406-413 - [c256]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding. AsiaJCIS 2015: 152-159 - [c255]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies. Inscrypt 2015: 260-279 - [c254]Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura:
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. CANDAR 2015: 457-462 - [c253]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields. CANDAR 2015: 477-483 - [c252]Takanori Yasuda, Kouichi Sakurai:
A Multivariate Encryption Scheme with Rainbow. ICICS 2015: 236-251 - [c251]Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Attribute-Based Two-Tier Signatures: Definition and Construction. ICISC 2015: 36-49 - [c250]Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors. ICOIN 2015: 104-109 - [c249]Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. ICT-EurAsia/CONFENIS 2015: 255-264 - [c248]Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. INTRUST 2015: 99-113 - [c247]Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai:
Application of NTRU Using Group Rings to Partial Decryption Technique. INTRUST 2015: 203-213 - [c246]Nobuyuki Teraura, Kouichi Sakurai:
Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones. NTMS 2015: 1-5 - [c245]Nobuyuki Teraura, Kunio Ito, Daisuke Kobayashi, Kouichi Sakurai:
Evaluation of gamma ray durability of RF tag and application to the radiation environment. RFID-TA 2015: 147-152 - [i8]Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. IACR Cryptol. ePrint Arch. 2015: 275 (2015) - [i7]Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS. IACR Cryptol. ePrint Arch. 2015: 1054 (2015) - [i6]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. IACR Cryptol. ePrint Arch. 2015: 1115 (2015) - [i5]Takanori Yasuda, Xavier Dahan, Kouichi Sakurai:
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security. IACR Cryptol. ePrint Arch. 2015: 1170 (2015) - 2014
- [j77]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J. Inf. Secur. 2014: 2 (2014) - [j76]Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j75]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Security of Multivariate Signature Scheme Using Non-commutative Rings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 245-252 (2014) - [j74]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search. IEICE Trans. Inf. Syst. 97-D(7): 1790-1803 (2014) - [j73]Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation. IEICE Trans. Inf. Syst. 97-D(10): 2576-2585 (2014) - [j72]Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units. J. Internet Serv. Inf. Secur. 4(3): 1-20 (2014) - [j71]Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework. J. Networks 9(11): 2905-2913 (2014) - [j70]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient variant of Rainbow using sparse secret keys. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 3-13 (2014) - [j69]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. Secur. Commun. Networks 7(6): 964-978 (2014) - [c244]Can Wang, Yaokai Feng, Junpei Kawamoto, Yoshiaki Hori, Kouichi Sakurai:
A Parameterless Learning Algorithm for Behavior-Based Detection. AsiaJCIS 2014: 11-18 - [c243]Shinichi Matsumoto, Kouichi Sakurai:
Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image. AsiaJCIS 2014: 148-155 - [c242]Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Attribute-based signatures without pairings via the fiat-shamir paradigm. AsiaPKC@AsiaCCS 2014: 49-58 - [c241]Yoshifumi Ueshige, Kouichi Sakurai:
Towards 'Receipt-Freeness' in Remote Biometric Authentication. EST 2014: 8-12 - [c240]Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda, Kouichi Sakurai:
Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units. CANDAR 2014: 543-548 - [c239]Junpei Kawamoto, Kouichi Sakurai:
Privacy-aware cloud-based input method editor. ICCC 2014: 209-213 - [c238]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient Variant of Rainbow without Triangular Matrix Representation. ICT-EurAsia 2014: 532-541 - [c237]Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Implementation of Efficient Operations over GF(232) Using Graphics Processing Units. ICT-EurAsia 2014: 602-611 - [c236]Motoki Kitahara, Junpei Kawamoto, Kouichi Sakurai:
A method of digital rights management based on Bitcoin protocol. ICUIMC 2014: 84:1-84:6 - [c235]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
A Zero-Watermarking-Like Steganography and Potential Applications. IIH-MSP 2014: 459-462 - [c234]Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
Identity-Embedding Method for Decentralized Public-Key Infrastructure. INTRUST 2014: 1-14 - [c233]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
Evaluation of a Zero-Watermarking-Type Steganography. IWDW 2014: 613-624 - [c232]Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222 - [c231]Pinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai:
Securing Sensor Networks by Moderating Frequencies. SecureComm (2) 2014: 173-185 - [c230]Nobuyuki Teraura, Kouichi Sakurai:
Evaluation of the Identity and Compatibility of Multi-valued Cells in Two-Dimensional Codes Using Smartphones. SOCA 2014: 252-259 - [c229]Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. SPACE 2014: 47-58 - [c228]Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai:
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage. WISA 2014: 83-94 - [e4]Shiho Moriai, Trent Jaeger, Kouichi Sakurai:
9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014. ACM 2014, ISBN 978-1-4503-2800-5 [contents] - [i4]Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency. IACR Cryptol. ePrint Arch. 2014: 628 (2014) - 2013
- [j68]Jingyu Hua, Kouichi Sakurai:
Botnet command and control based on Short Message Service and human mobility. Comput. Networks 57(2): 579-597 (2013) - [j67]Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient implementation for QUAD stream cipher with GPUs. Comput. Sci. Inf. Syst. 10(2): 897-911 (2013) - [j66]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Exploiting reference images for image splicing verification. Digit. Investig. 10(3): 246-258 (2013) - [j65]Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai:
General Fault Attacks on Multivariate Public Key Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 196-205 (2013) - [j64]Nobuyuki Teraura, Kouichi Sakurai:
Confidentiality of 2D Code using Infrared with Cell-level Error Correction. Int. J. Interact. Multim. Artif. Intell. 2(1): 23-31 (2013) - [j63]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets. Inf. Media Technol. 8(3): 843-854 (2013) - [j62]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets. J. Inf. Process. 21(3): 527-538 (2013) - [j61]Laiping Zhao, Yizhi Ren, Kouichi Sakurai:
Reliable workflow scheduling with less resource redundancy. Parallel Comput. 39(10): 567-585 (2013) - [j60]Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai:
Evolution of cooperation in reputation system by group-based scheme. J. Supercomput. 63(1): 171-190 (2013) - [c227]Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai:
Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM. AsiaJCIS 2013: 63-68 - [c226]Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai:
Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network. BWCCA 2013: 570-574 - [c225]Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai:
Upper bound of the length of information embedd in RSA public key efficiently. AsiaPKC@AsiaCCS 2013: 33-38 - [c224]Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai:
A variant of rainbow with shorter secret key and faster signature generation. AsiaPKC@AsiaCCS 2013: 57-62 - [c223]Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c222]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance. ICT-EurAsia 2013: 363-372 - [c221]Shinichi Matsumoto, Kouichi Sakurai:
A proposal for the privacy leakage verification tool for Android application developers. ICUIMC 2013: 54 - [c220]Satoshi Tanaka, Takanori Yasuda, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Computing over GF(2^16) Using Graphics Processing Unit. IMIS 2013: 843-846 - [c219]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Multivariate Signature Scheme Using Quadratic Forms. PQCrypto 2013: 243-258 - [c218]Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android API Call Using Logging Mechanism within Android Framework. SecureComm 2013: 393-404 - 2012
- [j59]Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo:
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks. Comput. Commun. 35(17): 2125-2137 (2012) - [j58]Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai:
DSSH: Digital signature based secure handover for network-based mobility management. Comput. Syst. Sci. Eng. 27(3) (2012) - [j57]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Securing Provenance of Distributed Processes in an Untrusted Environment. IEICE Trans. Inf. Syst. 95-D(7): 1894-1907 (2012) - [j56]Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang:
A Finite Equivalence of Verifiable Multi-secret Sharing. Int. J. Comput. Intell. Syst. 5(1): 1-12 (2012) - [j55]Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai:
Detecting Information Leakage via a HTTP Request Based on the Edit Distance. J. Internet Serv. Inf. Secur. 2(3/4): 18-28 (2012) - [j54]Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Flexible service selection with user-specific QoS support in service-oriented architecture. J. Netw. Comput. Appl. 35(3): 962-973 (2012) - [j53]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. J. Networks 7(1): 88-100 (2012) - [j52]Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai:
Security Analysis of Offline E-cash Systems with Malicious Insider. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 55-71 (2012) - [j51]Kouichi Sakurai, Dieter Gollmann:
Managing Insider Security Threats (MIST 2012 Volume 1). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 1-3 (2012) - [c217]Dong Hao, Kouichi Sakurai:
A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks. AINA 2012: 495-502 - [c216]Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai:
Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology. AINA Workshops 2012: 766-771 - [c215]Laiping Zhao, Kouichi Sakurai:
Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud. CLOSER (Selected Papers) 2012: 23-38 - [c214]Laiping Zhao, Kouichi Sakurai:
On Revenue Driven Server Management in Cloud. CLOSER 2012: 295-305 - [c213]Liang Zhao, Takashi Nishide, Kouichi Sakurai:
Differential Fault Analysis of Full LBlock. COSADE 2012: 135-150 - [c212]Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai:
Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic. CSS 2012: 212-226 - [c211]Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi:
Reducing the Key Size of Rainbow Using Non-commutative Rings. CT-RSA 2012: 68-83 - [c210]Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. ICITCS 2012: 53-60 - [c209]Yichao Xu, Kouichi Sakurai:
Cooperatively securing network coding against pollution attacks with incentive mechanism. ICUIMC 2012: 52:1-52:10 - [c208]Taketoshi Sakuraba, Kouichi Sakurai:
Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control. IMIS 2012: 639-644 - [c207]Nobuyuki Teraura, Kouichi Sakurai:
Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code. IMIS 2012: 645-650 - [c206]Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs. IMIS 2012: 660-664 - [c205]Motoki Kitahara, Takashi Nishide, Kouichi Sakurai:
A Method for Embedding Secret Key Information in RSA Public Key and Its Application. IMIS 2012: 665-670 - [c204]Nobuyuki Teraura, Kouichi Sakurai:
Information Hiding of Two-dimensional Code by Multi-layer Optical. ISPA 2012: 770-777 - [c203]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
Image Splicing Verification Based on Pixel-Based Alignment Method. IWDW 2012: 198-212 - [c202]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. IWSEC 2012: 19-36 - [c201]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An Image Splicing Detection Based on Interpolation Analysis. PCM 2012: 390-401 - [c200]Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Secure Keyword Search Using Bloom Filter with Specified Character Positions. ProvSec 2012: 235-252 - [c199]Jingyu Hua, Kouichi Sakurai:
Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation. SAC 2012: 1470-1477 - [c198]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:
A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks. SAINT 2012: 267-272 - [c197]Chunhua Su, Guilin Wang, Kouichi Sakurai:
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. TrustCom 2012: 1012-1017 - [c196]Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. WISA 2012: 28-42 - 2011
- [j50]Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi Sakurai:
Efficient Context-Sensitive Intrusion Detection Based on State Transition Table. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 255-264 (2011) - [j49]Ilsun You, Yoshiaki Hori, Kouichi Sakurai:
Towards formal analysis of wireless LAN security with MIS protocol. Int. J. Ad Hoc Ubiquitous Comput. 7(2): 112-120 (2011) - [j48]Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai:
Addressing Insider Threats and Information Leakage. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 1-3 (2011) - [j47]Ilsun You, Yoshiaki Hori, Kouichi Sakurai:
Enhancing SVO Logic for Mobile IPv6 Security Protocols. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(3): 26-52 (2011) - [j46]Ilsun You, Jong-Hyouk Lee, Yoshiaki Hori, Kouichi Sakurai:
Enhancing MISP with Fast Mobile IPv6 Security. Mob. Inf. Syst. 7(3): 271-283 (2011) - [j45]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Guest editorial: Trusted computing and communications. Secur. Commun. Networks 4(1): 1-2 (2011) - [j44]Yizhi Ren, Mingchu Li, Kouichi Sakurai:
FineTrust: a fine-grained trust model for peer-to-peer networks. Secur. Commun. Networks 4(1): 61-69 (2011) - [c195]Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee:
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. ARES 2011: 271-285 - [c194]Laiping Zhao, Yizhi Ren, Kouichi Sakurai:
A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems. AINA 2011: 275-282 - [c193]Xiaojuan Liao, Dong Hao, Kouichi Sakurai:
Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach. APCC 2011: 806-811 - [c192]Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Inscrypt 2011: 341-362 - [c191]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme. ICETE (Selected Papers) 2011: 233-248 - [c190]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. ICISC 2011: 406-418 - [c189]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
A generic evaluation method for key management schemes in wireless sensor network. ICUIMC 2011: 55 - [c188]Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Integrity for the In-flight web page based on a fragile watermarking chain scheme. ICUIMC 2011: 86 - [c187]Rong Huang, Kouichi Sakurai:
A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing. IIH-MSP 2011: 105-108 - [c186]Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai:
An Efficient Key Generation Method in Audio Zero-Watermarking. IIH-MSP 2011: 336-339 - [c185]Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Design and Implementation of a Forced Encryption Kernel Module. IMIS 2011: 607-611 - [c184]Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai:
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information. IMIS 2011: 639-644 - [c183]Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai:
Towards Countermeasure of Insider Threat in Network Security. INCoS 2011: 634-636 - [c182]Takashi Nishide, Kouichi Sakurai:
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited. INCoS 2011: 656-661 - [c181]Dong Hao, Avishek Adhikari, Kouichi Sakurai:
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. INTRUST 2011: 239-257 - [c180]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. ISPEC 2011: 83-97 - [c179]Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai:
Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter. MSN 2011: 463-469 - [c178]Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai:
General Fault Attacks on Multivariate Public Key Cryptosystems. PQCrypto 2011: 1-18 - [c177]Takanori Yasuda, Kouichi Sakurai:
A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm. PQCrypto 2011: 275-294 - [c176]Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai:
A Study of Communication Route Selection Considering Route Security. SAINT 2011: 360-365 - [c175]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49 - [c174]Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai:
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. TrustCom 2011: 352-361 - [c173]Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. TrustCom 2011: 1739-1744 - [c172]Jingyu Hua, Kouichi Sakurai:
A SMS-Based Mobile Botnet Using Flooding Algorithm. WISTP 2011: 264-279 - 2010
- [j43]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 93-D(3): 409-410 (2010) - [j42]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Existing Privacy-Preserving Protocols in Domain Name System. IEICE Trans. Inf. Syst. 93-D(5): 1031-1043 (2010) - [j41]Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori:
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6. IEICE Trans. Inf. Syst. 93-D(5): 1096-1105 (2010) - [j40]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Improved Subset Difference Method with Ternary Tree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2034-2044 (2010) - [j39]Heru Sukoco, Yoshiaki Hori, Hendrawan, Kouichi Sakurai:
Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol. IEICE Trans. Inf. Syst. 93-D(11): 2953-2961 (2010) - [c171]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-committing Encryptions. ACISP 2010: 135-144 - [c170]Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai:
Darknet Monitoring on Real-Operated Networks. BWCCA 2010: 278-285 - [c169]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. DBSec 2010: 311-318 - [c168]Jingyu Hua, Kouichi Sakurai:
Modeling and Containment of Search Worms Targeting Web Applications. DIMVA 2010: 183-199 - [c167]Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai:
Fault tolerant scheduling with dynamic number of replicas in heterogeneous system. HPCC 2010: 434-441 - [c166]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-Commitment Protocols. ICETE (Selected Papers) 2010: 233-242 - [c165]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. ICETE (Selected Papers) 2010: 274-288 - [c164]Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai:
Design and Implementation of Document Access Control Model Based on Role and Security Policy. INTRUST 2010: 26-36 - [c163]Dong Hao, Yizhi Ren, Kouichi Sakurai:
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). INTRUST 2010: 237-252 - [c162]Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid. IPDPS Workshops 2010: 1-8 - [c161]Liang Zhao, Avishek Adhikari, Kouichi Sakurai:
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane. IWDW 2010: 29-44 - [c160]Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai:
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. IWDW 2010: 45-59 - [c159]Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai:
A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. SAINT 2010: 261-264 - [c158]Jingyu Hua, Takashi Nishide, Kouichi Sakurai:
Model-Based Intrusion Detection by Abstract Interpretation. SAINT 2010: 359-362 - [c157]Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai:
Study of Log File Dispersion Management Method. SAINT 2010: 371-374 - [c156]Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:
Behavior Control Based on Dynamic Code Translation. SAINT 2010: 375-378 - [c155]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-commitment Protocols. SECRYPT 2010: 354-361 - [c154]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. SECRYPT 2010: 389-398 - [c153]Takashi Nishide, Kouichi Sakurai:
Distributed Paillier Cryptosystem without Trusted Dealer. WISA 2010: 44-60 - [e3]Tai-Hoon Kim, Thanos Vasilakos, Kouichi Sakurai, Yang Xiao, Gansen Zhao, Dominik Slezak:
Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II. Communications in Computer and Information Science 120, Springer 2010, ISBN 978-3-642-17603-6 [contents]
2000 – 2009
- 2009
- [j38]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(4): 1246-1250 (2009) - [j37]Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 92-D(5): 765 (2009) - [j36]Yongrui Cui, Mingchu Li, Yizhi Ren, Kouichi Sakurai:
An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(5): 1339-1346 (2009) - [j35]Cheng Guo, Mingchu Li, Kouichi Sakurai:
A New Secret Sharing Scheme Based on the Multi-Dealer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(5): 1373-1378 (2009) - [j34]Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Modeling Security Bridge Certificate Authority Architecture. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(6): 1544-1547 (2009) - [j33]Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6. IEICE Trans. Commun. 92-B(6): 2287-2290 (2009) - [j32]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1868-1871 (2009) - [j31]Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
An Enhanced Security Protocol for Fast Mobile IPv6. IEICE Trans. Inf. Syst. 92-D(10): 1979-1982 (2009) - [c152]Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. ARES 2009: 726-731 - [c151]Kohei Tatara, Kouichi Sakurai:
A Signature Scheme Associated with Universal Re-signcryption. ARES 2009: 780-785 - [c150]Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Security Analysis for P2P Routing Protocols. ARES 2009: 899-904 - [c149]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Secrecy Capacity of Wireless LAN. ARES 2009: 905-910 - [c148]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. ARES 2009: 972-977 - [c147]Chunhua Su, Justin Zhan, Kouichi Sakurai:
Importance of Data Standardization in Privacy-Preserving K-Means Clustering. DASFAA Workshops 2009: 276-286 - [c146]Ilsun You, Kouichi Sakurai, Yoshiaki Hori:
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6. FCST 2009: 351-355 - [c145]Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren:
Efficient Intrusion Detection Based on Static Analysis and Stack Walks. IWSEC 2009: 158-173 - [c144]Amril Syalim, Yoshiaki Hori, Kouichi Sakurai:
Grouping Provenance Information to Improve Efficiency of Access Control. ISA 2009: 51-59 - [c143]Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:
Formal Verification for Access Control in Web Information Sharing System. ISA 2009: 80-89 - [e2]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, Mingchu Li, Kouichi Sakurai:
Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3 [contents] - 2008
- [j30]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 316-329 (2008) - [j29]Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai:
Toward a Scalable Visualization System for Network Traffic Monitoring. IEICE Trans. Inf. Syst. 91-D(5): 1300-1310 (2008) - [j28]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Reliable Key Distribution Scheme for Lossy Channels. IEICE Trans. Inf. Syst. 91-D(5): 1485-1488 (2008) - [j27]Kenji Imamoto, Jianying Zhou, Kouichi Sakurai:
Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008) - [j26]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. Inf. Media Technol. 3(4): 788-799 (2008) - [j25]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. J. Comput. Sci. Technol. 23(1): 129-140 (2008) - [j24]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. J. Inf. Process. 16: 130-141 (2008) - [c142]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 - [c141]Chunhua Su, Kouichi Sakurai:
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree. ADMA 2008: 170-181 - [c140]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. AINA Workshops 2008: 241-246 - [c139]Mingchu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang:
Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312 - [c138]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. AINA Workshops 2008: 1534-1539 - [c137]Kenichi Takahashi, Akihiro Sakai, Kouichi Sakurai:
Invalidation of Mailing List Address to Block Spam Mails. APSCC 2008: 841-846 - [c136]Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai:
Trust Similarity Measure in Trust Model for P2P Networks. EUC (2) 2008: 107-112 - [c135]Masakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai:
Intrusion Detection Using Third-Parties Support. FTDCS 2008: 206-212 - [c134]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. MUE 2008: 485-489 - [c133]Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai:
Monitoring Unused IP Addresses on Segments Managed by DHCP. NCM (1) 2008: 510-515 - [c132]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
FPGA-Targeted Hardware Implementations of K2. SECRYPT 2008: 270-277 - [c131]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239 - 2007
- [j23]Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5): 513-520 (2007) - [j22]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1780-1787 (2007) - [j21]Kouichi Sakurai, Kazuhide Fukushima:
Actual Condition and Issues for Mobile Security System. J. Inf. Process. Syst. 3(2): 54-63 (2007) - [c130]Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. ARES 2007: 1160-1166 - [c129]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 - [c128]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. APWeb/WAIM Workshops 2007: 211-216 - [c127]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. ATC 2007: 249-258 - [c126]Sang-Soo Yeo, Kouichi Sakurai, Jin Kwak:
A Practical Proxy Device for Protecting RFID Tag's Identifier. BLISS 2007: 55-58 - [c125]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks. FTDCS 2007: 80-88 - [c124]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2 Stream Cipher. ICETE (Selected Papers) 2007: 214-226 - [c123]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:
Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving. IPC 2007: 299-302 - [c122]Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai:
Bot Detection Based on Traffic Analysis. IPC 2007: 303-306 - [c121]Sang-Soo Yeo, Kouichi Sakurai, Sung-Eon Cho, KiSung Yang, Sung Kwon Kim:
Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. ISPA Workshops 2007: 245-254 - [c120]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 - [c119]Satoshi Hada, Kouichi Sakurai:
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. IWSEC 2007: 1-12 - [c118]Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai:
Enforcement of Integrated Security Policy in Trusted Operating Systems. IWSEC 2007: 214-229 - [c117]Tai-Hoon Kim, Kouichi Sakurai, Sun-Myung Hwang:
Induction and Implementation of Security Requirements in Each System Block. MMM (2) 2007: 694-701 - [c116]Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai:
An Approach of Program Analysis Prevention for Information Protection. MUE 2007: 35-40 - [c115]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Privacy Disclosure in DNS Query. MUE 2007: 952-957 - [c114]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment. PAKDD Workshops 2007: 502-514 - [c113]Kenichi Takahashi, Yoshiki Mitsuyuki, Tsunenori Mine, Kouichi Sakurai, Makoto Amamiya:
Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. PRIMA 2007: 134-145 - [c112]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213 - [c111]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network. TAMC 2007: 362-373 - [c110]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. UIC 2007: 382-391 - [c109]Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya:
An Approach of Trusted Program Generation for User-Responsible Privacy. UIC 2007: 1159-1170 - 2006
- [j20]Yasuyuki Sakai, Kouichi Sakurai:
Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 231-237 (2006) - [j19]Amril Syalim, Toshihiro Tabata, Kouichi Sakurai:
Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider. Inf. Media Technol. 1(2): 762-767 (2006) - [c108]Fumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata:
An Intrusion Detection System using Alteration of Data. AINA (1) 2006: 243-248 - [c107]Zhan Wang, Yoshiaki Hori, Kouichi Sakurai:
Application and Evaluation of Bayesian Filter for Chinese Spam. Inscrypt 2006: 253-263 - [c106]Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee:
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96 - [c105]Kenichi Takahashi, Kouichi Sakurai:
A Framework for the User-Oriented Personal Information Protection. Security and Management 2006: 12-19 - [c104]Yoshifumi Ueshige, Kouichi Sakurai:
A Proposal of One-Time Biometric Authentication. Security and Management 2006: 78-83 - [c103]Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won:
An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 - [c102]Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee:
Distributing Security-Mediated PKI Revisited. EuroPKI 2006: 31-44 - [c101]Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai:
A Proactive Secret Sharing for Server Assisted Threshold Signatures. HPCC 2006: 250-259 - [c100]Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee:
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980 - [c99]Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai:
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. ISPEC 2006: 235-247 - [c98]Satoshi Hada, Kouichi Sakurai:
Ciphertext-Auditable Public Key Encryption. IWSEC 2006: 308-321 - [c97]Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
Actively Modifying Control Flow of Program for Efficient Anormaly Detection. KES (2) 2006: 737-744 - [c96]Yoshiaki Hori, Kouichi Sakurai:
Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i. Mobility Conference 2006: 11 - [c95]Kenji Imamoto, Kouichi Sakurai:
Off-line verification of one-time ID in distributed environment. PST 2006: 60 - [c94]Kenji Imamoto, Kouichi Sakurai:
Enhanced Privacy in Key-Exchange Protocols by One-time ID. SecPerU 2006: 63-68 - [c93]Yufeng Wang, Wendong Wang, Kouichi Sakurai, Yoshiaki Hori:
On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance. UIC 2006: 1008-1018 - [c92]Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai:
Interactively combining 2D and 3D visualization for network traffic monitoring. VizSEC 2006: 123-127 - [e1]Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura:
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Lecture Notes in Computer Science 4266, Springer 2006, ISBN 3-540-47699-7 [contents] - [i3]Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Password-Authenticated Multi-Party Key Exchange with Different Passwords. IACR Cryptol. ePrint Arch. 2006: 476 (2006) - 2005
- [j18]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 39-48 (2005) - [j17]Yasuyuki Sakai, Kouichi Sakurai:
On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 154-160 (2005) - [j16]Satoshi Koga, Kouichi Sakurai:
Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 247-254 (2005) - [j15]Hyung Chan Kim, Rudrapatna S. Ramakrishna, Kouichi Sakurai:
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 270-279 (2005) - [j14]Wook Shin, Jeong-Gun Lee, Hong Kook Kim, Kouichi Sakurai:
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 327-330 (2005) - [j13]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(5): 1214-1223 (2005) - [j12]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2778-2791 (2005) - [c91]Junichiro Saito, Kouichi Sakurai:
Grouping Proof for RFID Tags. AINA 2005: 621-624 - [c90]Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai:
Trends and Issues for Security of Home-Network Based on Power Line Communication. AINA 2005: 655-660 - [c89]Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya:
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. EUC Workshops 2005: 433-442 - [c88]Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai:
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. EUC Workshops 2005: 916-925 - [c87]Junichiro Saito, Kenji Imamoto, Kouichi Sakurai:
Reassignment Scheme of an RFID Tag's Key for Owner Transfer. EUC Workshops 2005: 1303-1312 - [c86]Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254 - [c85]Kenji Imamoto, Jianying Zhou, Kouichi Sakurai:
An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13 - [c84]Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52 - [c83]Yasuyuki Sakai, Kouichi Sakurai:
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. ICICS 2005: 169-180 - [c82]Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai:
Some Remarks on Security of Receipt-Free E-auction. ICITA (2) 2005: 560-563 - [c81]SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou:
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ICOIN 2005: 835-842 - [c80]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai:
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. ICPADS (2) 2005: 235-239 - [c79]Ryuzou Nishi, Kouichi Sakurai:
Group key distribution scheme for reducing required rekey message size. ICPADS (2) 2005: 280-284 - [c78]Yoshifumi Ueshige, Kouichi Sakurai:
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository. IWAP 2005: 155-168 - [c77]Kenji Imamoto, Kouichi Sakurai:
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic. ARSPA@ICALP 2005: 79-94 - 2004
- [j11]Kenji Imamoto, Kouichi Sakurai:
Analysis and Design for Private Message Board Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 204-211 (2004) - [c76]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223 - [c75]Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465 - [c74]Satoshi Koga, Kouichi Sakurai:
A Merging Method of Certification Authorities Without Using Cross-Certifications. AINA (2) 2004: 174-177 - [c73]Kenji Imamoto, Kouichi Sakurai:
A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model. AINA (1) 2004: 327-333 - [c72]Yasuyuki Sakai, Kouichi Sakurai:
A New Attack with Side Channel Leakage During Exponent Recoding Computations. CHES 2004: 298-311 - [c71]Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai:
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. EUC 2004: 879-890 - [c70]Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai:
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. EuroPKI 2004: 85-97 - [c69]Toshihiro Tabata, Kouichi Sakurai:
Design of Intrusion Detection System at User Level with System-Call Interposing. ICETE (2) 2004: 263-268 - [c68]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317 - [c67]Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee:
On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329 - [c66]Kwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae-Cheol Ryou:
A DRM Framework for Secure Distribution of Mobile Contents. ICOIN 2004: 905-914 - [c65]Satoshi Koga, Kouichi Sakurai:
A Distributed Online Certificate Status Protocol with a Single Public Key. Public Key Cryptography 2004: 389-401 - [c64]Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
A Probabilistic Method for Detecting Anomalous Program Behavior. WISA 2004: 87-98 - [c63]Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai:
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. WISA 2004: 135-143 - [c62]Kenji Imamoto, Kouichi Sakurai:
Key-Exchange Protocol Using Pre-agreed Session-ID. WISA 2004: 375-387 - [i2]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. IACR Cryptol. ePrint Arch. 2004: 69 (2004) - [i1]Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On security of XTR public key cryptosystems against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2004: 123 (2004) - 2003
- [j10]Katsuyuki Okeya, Kouichi Sakurai:
Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 98-112 (2003) - [j9]Yasuyuki Sakai, Kouichi Sakurai:
An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1135-1146 (2003) - [j8]Katsuyuki Okeya, Kouichi Sakurai:
A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1171-1180 (2003) - [c61]Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park:
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. ACNS 2003: 265-279 - [c60]Yasuyuki Sakai, Kouichi Sakurai:
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. ACNS 2003: 319-330 - [c59]Michael W. David, Kouichi Sakurai:
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. AINA 2003: 716-722 - [c58]Kenji Imamoto, Kouichi Sakurai:
Certified E-mail Systems Using Public Notice Board. DEXA Workshops 2003: 460-464 - [c57]Katsuyuki Okeya, Kouichi Sakurai:
A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks. ITW 2003: 175-178 - [c56]Kazuhide Fukushima, Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. WISA 2003: 303-316 - [c55]Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park:
An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme. WWW (Posters) 2003 - 2002
- [j7]Katsuyuki Okeya, Kouichi Sakurai:
A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 84-93 (2002) - [j6]Yasuyuki Sakai, Kouichi Sakurai:
Speeding Up Elliptic Scalar Multiplication Using Multidoubling. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1075-1083 (2002) - [c54]Katsuyuki Okeya, Kouichi Sakurai:
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. ACISP 2002: 420-435 - [c53]Kouichi Sakurai, Tsuyoshi Takagi:
On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448 - [c52]Katsuyuki Okeya, Kouichi Sakurai:
Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. CHES 2002: 564-578 - [c51]Soichi Furuya, Kouichi Sakurai:
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. ICICS 2002: 327-341 - [c50]Kouichi Sakurai, Tsuyoshi Takagi:
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373 - [c49]Kenji Imamoto, Kouichi Sakurai:
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. INDOCRYPT 2002: 326-338 - [c48]Katsuyuki Okeya, Kouichi Sakurai:
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. ISC 2002: 389-401 - [c47]Yasuyuki Sakai, Kouichi Sakurai:
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. ISC 2002: 484-500 - [c46]Kouichi Sakurai, Tsuyoshi Takagi:
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16 - [c45]Soichi Furuya, Kouichi Sakurai:
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Selected Areas in Cryptography 2002: 94-109 - 2001
- [c44]Katsuyuki Okeya, Kouichi Sakurai:
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. CHES 2001: 126-141 - [c43]Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi:
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71 - [c42]Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai:
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. ICISC 2001: 81-102 - [c41]Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai:
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. ICISC 2001: 428-439 - [c40]Yasuyuki Sakai, Kouichi Sakurai:
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Selected Areas in Cryptography 2001: 268-283 - [c39]Daisuke Hirakiuchi, Kouichi Sakurai:
English vs. Sealed Bid in Anonymous Electronic Auction Protocols. WETICE 2001: 171-176 - 2000
- [c38]Yasuyuki Sakai, Kouichi Sakurai:
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000: 59-73 - [c37]Kouichi Sakurai, Shingo Miyazaki:
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. ACISP 2000: 385-399 - [c36]Katsuyuki Okeya, Kouichi Sakurai:
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. INDOCRYPT 2000: 178-190 - [c35]Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai:
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. Public Key Cryptography 2000: 238-257 - [c34]Toro Inoue, Kouichi Sakurai:
Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. Public Key Cryptography 2000: 391-404 - [c33]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung:
On zero-knowledge proofs (extended abstract): "from membership to decision". STOC 2000: 255-264
1990 – 1999
- 1999
- [j5]Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya:
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptol. 12(3): 197-223 (1999) - [c32]Shingo Miyazaki, Kouichi Sakurai, Moti Yung:
On Threshold RSA-Signing with no Dealer. ICISC 1999: 197-207 - [c31]Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto:
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. ICISC 1999: 221-235 - [c30]Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai:
Toward Fair International Key Escrow. Public Key Cryptography 1999: 171-187 - 1998
- [j4]Eisuke Dannoura, Kouichi Sakurai:
An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy. Inf. Process. Lett. 66(1): 27-33 (1998) - [j3]Kouichi Sakurai, Hiroki Shizuya:
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. J. Cryptol. 11(1): 29-43 (1998) - [c29]Yasuyuki Sakai, Kouichi Sakurai:
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. ASIACRYPT 1998: 80-94 - [c28]Shingo Miyazaki, Kouichi Sakurai:
A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem. Financial Cryptography 1998: 296-308 - [c27]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung:
Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it. ISAAC 1998: 59-68 - [c26]Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka:
Secure Hyperelliptic Cryptosystems and Their Performances. Public Key Cryptography 1998: 164-181 - [c25]Michael W. David, Kouichi Sakurai:
Security Issues for Contactless Smart Cards. Public Key Cryptography 1998: 247-252 - [c24]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung:
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. STACS 1998: 511-521 - 1997
- [j2]Kouichi Sakurai:
Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages. Theor. Comput. Sci. 181(2): 317-335 (1997) - [c23]Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai:
Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282 - [c22]Kouichi Sakurai, Souichi Furuya:
Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. FSE 1997: 114-133 - [c21]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung:
Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. ICICS 1997: 17-27 - [c20]Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka:
On weak RSA-keys produced from Pretty Good Privacy. ICICS 1997: 314-324 - [c19]Eisuke Dannoura, Kouichi Sakurai:
On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE. ISAAC 1997: 173-182 - [c18]Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue:
A Key Escrow System with Protecting User's Privacy by Blind Decoding. ISW 1997: 147-157 - 1996
- [j1]Akio Yanbe, Kouichi Sakurai:
A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games. Inf. Process. Lett. 57(1): 17-24 (1996) - [c17]Kouichi Sakurai:
A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. ASIACRYPT 1996: 159-172 - [c16]Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto:
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333 - [c15]Akio Yanbe, Kouichi Sakurai:
On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract). COCOON 1996: 310-322 - [c14]Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung:
A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168 - [c13]Kouichi Sakurai, Yoshinori Yamane:
Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. Information Hiding 1996: 257-264 - [c12]Kouichi Sakurai, Yuliang Zheng:
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ISAAC 1996: 376-385 - 1995
- [c11]Kouichi Sakurai:
On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract). COCOON 1995: 496-509 - [c10]Kouichi Sakurai, Hiroki Shizuya:
Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. EUROCRYPT 1995: 341-355 - 1992
- [c9]Kouichi Sakurai, Toshiya Itoh:
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. AUSCRYPT 1992: 231-243 - [c8]Kouichi Sakurai, Toshiya Itoh:
On Bit Correlations Among Preimages of "Many to One" One-Way Functions. AUSCRYPT 1992: 435-446 - [c7]Kouichi Sakurai, Toshiya Itoh:
On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract). CRYPTO 1992: 246-259 - [c6]Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya:
How Intractable Is the Discrete Logarithm for a General Finite Group? EUROCRYPT 1992: 420-428 - 1991
- [c5]Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai:
4 Move Perfect ZKIP of Knowledge with No Assumption. ASIACRYPT 1991: 321-330 - [c4]Toshiya Itoh, Kouichi Sakurai:
On the Complexity of Constant Round ZKIP of Possession of Knowledge. ASIACRYPT 1991: 331-345 - [c3]Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya:
Any Language in IP Has a Divertable ZKIP. ASIACRYPT 1991: 382-396 - [c2]Tatsuaki Okamoto, Kouichi Sakurai:
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. CRYPTO 1991: 267-278 - [c1]Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai:
On the Complexity of Hyperelliptic Discrete Logarithm Problem. EUROCRYPT 1991: 337-351
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint