Kouichi Sakurai
#143,801
Most Influential Person Now
Kouichi Sakurai's AcademicInfluence.com Rankings
Kouichi Sakuraicomputer-science Degrees
Computer Science
#7066
World Rank
#7443
Historical Rank
Database
#4126
World Rank
#4292
Historical Rank

Download Badge
Computer Science
Kouichi Sakurai's Degrees
- PhD Computer Science Kyushu University
Similar Degrees You Can Earn
Why Is Kouichi Sakurai Influential?
(Suggest an Edit or Addition)Kouichi Sakurai's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- One Pixel Attack for Fooling Deep Neural Networks (2017) (1690)
- Lightweight Classification of IoT Malware Based on Image Recognition (2018) (201)
- Grouping proof for RFID tags (2005) (172)
- Authentication in mobile cloud computing: A survey (2016) (144)
- Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (2011) (139)
- Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack (2000) (133)
- Bitcoin Block Withholding Attack: Analysis and Mitigation (2017) (126)
- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications (2000) (106)
- Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control (2011) (101)
- Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags (2004) (99)
- Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve (2001) (88)
- Flexible service selection with user-specific QoS support in service-oriented architecture (2012) (82)
- Reassignment Scheme of an RFID Tag's Key for Owner Transfer (2005) (75)
- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme (2000) (73)
- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party (2003) (70)
- Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems (2010) (64)
- Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture † (2020) (61)
- A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing (2011) (61)
- Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide (2009) (58)
- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling (2002) (58)
- Distributed Paillier Cryptosystem without Trusted Dealer (2010) (57)
- On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption (2012) (56)
- Reliable workflow scheduling with less resource redundancy (2013) (55)
- Analysis of Privacy Disclosure in DNS Query (2007) (53)
- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model (2005) (47)
- Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features (2020) (47)
- A SMS-Based Mobile Botnet Using Flooding Algorithm (2011) (45)
- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks (2002) (42)
- A new security middleware architecture based on fog computing and cloud to support IoT constrained devices (2017) (41)
- A behavior based malware detection scheme for avoiding false positive (2010) (38)
- Retricoin: Bitcoin based on compact proofs of retrievability (2016) (37)
- Secure Hyperelliptic Cryptosystems and Their Performances (1998) (37)
- Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection (1996) (36)
- Bot Detection Based on Traffic Analysis (2007) (36)
- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance (2010) (36)
- K2: A Stream Cipher Algorithm using Dynamic Feedback Control (2007) (34)
- Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n (1998) (33)
- Attacking convolutional neural network using differential evolution (2018) (32)
- A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems (2011) (32)
- Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden (2018) (32)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security) (1997) (31)
- Realizing Proxy Re-encryption in the Symmetric World (2011) (31)
- Efficient verifier-based password-authenticated key exchange in the three-party setting (2007) (30)
- Interactively combining 2D and 3D visualization for network traffic monitoring (2006) (30)
- Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation (2007) (30)
- Secure Keyword Search Using Bloom Filter with Specified Character Positions (2012) (30)
- On the practical performance of hyperelliptic curve cryptosystems in software implementation (2000) (30)
- Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving (2007) (30)
- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks (2001) (29)
- Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems (1995) (29)
- MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems (2015) (28)
- Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools (2016) (28)
- General Fault Attacks on Multivariate Public Key Cryptosystems (2011) (28)
- A Progress Report on Subliminal-Free Channels (1996) (27)
- A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks (2012) (27)
- Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment (2008) (27)
- A Multivariate Encryption Scheme with Rainbow (2015) (27)
- Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration (2011) (26)
- Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow (2017) (25)
- Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow (2005) (25)
- Fine-Grained Conditional Proxy Re-Encryption and Application (2014) (24)
- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring (2001) (24)
- Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters (2016) (23)
- A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks (2012) (23)
- Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks (2018) (23)
- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority (2002) (22)
- Botnet command and control based on Short Message Service and human mobility (2013) (22)
- Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings (2001) (22)
- FineTrust: a fine-grained trust model for peer-to-peer networks (2011) (22)
- A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree (2008) (21)
- Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" (2015) (20)
- A Proposal of One-Time Biometric Authentication (2006) (20)
- On the Complexity of Constant Round ZKIP of Possession of Knowledge (1991) (20)
- A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems (1998) (20)
- Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation (2019) (20)
- Enhancing SVO Logic for Mobile IPv6 Security Protocols (2011) (20)
- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive (2002) (19)
- Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick (2002) (19)
- Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic (2005) (19)
- Attribute-based signatures without pairings via the fiat-shamir paradigm (2014) (18)
- Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited (2011) (18)
- Efficient algorithms for the Jacobian variety of hyperelliptic curves $y^2=x^p-x+1$ over a finite field of odd characteristic $p$ (2000) (18)
- Reducing the Key Size of Rainbow Using Non-commutative Rings (2012) (17)
- A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation (2016) (17)
- An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency (2014) (16)
- An Analysis of IT Assessment Security Maturity in Higher Education Institution (2016) (16)
- A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing (2017) (16)
- Classification on attacks in wireless ad hoc networks: A game theoretic view (2011) (15)
- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems (1991) (15)
- Multivariate Signature Scheme Using Quadratic Forms (2013) (15)
- C&C session detection using random forest (2017) (15)
- Blockchain for IoT-Based Digital Supply Chain: A Survey (2020) (15)
- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance (2000) (15)
- Towards Countermeasure of Insider Threat in Network Security (2011) (14)
- Grouping Provenance Information to Improve Efficiency of Access Control (2009) (14)
- A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model (2004) (14)
- An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy (1998) (14)
- Efficient variant of Rainbow using sparse secret keys (2014) (13)
- Parameter manipulation attack prevention and detection by using web application deception proxy (2017) (13)
- Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages (1999) (13)
- Rule Generation for Signature Based Detection Systems of Cyber Attacks in IoT Environments (2019) (13)
- Any Language in IP Has a Divertable ZKIP (1991) (13)
- Reliable Decentralized Oracle with Mechanisms for Verification and Disputation (2019) (13)
- On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract) (1992) (12)
- Evolution of cooperation in reputation system by group-based scheme (2010) (12)
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique (2008) (12)
- A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks (2003) (12)
- Differential Fault Analysis of Full LBlock (2012) (12)
- Detection of Android API Call Using Logging Mechanism within Android Framework (2013) (12)
- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation (2003) (12)
- CCA-Secure Keyed-Fully Homomorphic Encryption (2016) (12)
- Universal Rules for Fooling Deep Neural Networks based Text Classification (2019) (11)
- How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem (1996) (11)
- On securing open networks through trust and reputation-architecture, challenges and solutions (2006) (11)
- Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security (2015) (11)
- A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets (2013) (11)
- Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i (2006) (11)
- Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems (2018) (11)
- Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method (1997) (11)
- A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem (1998) (11)
- Security and Trust Issues on Digital Supply Chain (2019) (11)
- On the Security of a Modified Paillier Public-Key Primitive (2002) (11)
- A Zero-Watermarking-Like Steganography and Potential Applications (2014) (11)
- Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II (2010) (11)
- A variant of rainbow with shorter secret key and faster signature generation (2013) (11)
- An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency (2014) (11)
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes (2009) (11)
- Improved proxy re-encryption scheme for symmetric key cryptography (2017) (10)
- Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters (2018) (10)
- A proposal for the privacy leakage verification tool for Android application developers (2013) (10)
- On the Complexity of Hyperelliptic Discrete Logarithm Problem (1991) (10)
- Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks (2006) (10)
- A Sequential Scheme for Detecting Cyber Attacks in IoT Environment (2019) (10)
- A Distributed Online Certificate Status Protocol with a Single Public Key (2004) (10)
- Efficient Variant of Rainbow without Triangular Matrix Representation (2014) (10)
- Cyberbullying detection using parent-child relationship between comments (2016) (10)
- An enhanced audio ownership protection scheme based on visual cryptography (2014) (10)
- A reject timing attack on an IND-CCA2 public-key cryptosystem (2003) (10)
- A merging method of certification authorities without using cross-certifications (2004) (10)
- Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems (2006) (10)
- An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing (2016) (9)
- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks (2004) (9)
- 4 Move Perfect ZKIP of Knowledge with No Assumption (1991) (9)
- Importance of Data Standardization in Privacy-Preserving K-Means Clustering (2009) (9)
- English vs. sealed bid in anonymous electronic auction protocols (2001) (9)
- Two-Party Privacy-Preserving Agglomerative Document Clustering (2007) (9)
- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption (2001) (9)
- Neural Cryptography Based on the Topology Evolving Neural Networks (2018) (9)
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model (2004) (9)
- A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints (2016) (9)
- SQL Injection Attack Detection Method Using Expectation Criterion (2016) (9)
- Towards formal analysis of wireless LAN security with MIS protocol (2011) (8)
- Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation (2012) (8)
- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs (2012) (8)
- A Key Escrow System with Protecting User's Privacy by Blind Decoding (1997) (8)
- On zero-knowledge proofs (extended abstract): “from membership to decision” (2000) (8)
- Providing Secure Location-Aware Services for Cooperative Vehicular Ad Hoc Networks (2012) (8)
- A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering (2008) (8)
- On Threshold RSA-Signing with no Dealer (1999) (8)
- A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks (2010) (8)
- Combating cyber terrorism: countering cyber terrorist advantages of surprise and anonymity (2003) (8)
- Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search (2014) (8)
- Trends and issues for security of home-network based on power line communication (2005) (8)
- 3-Party Adversarial Cryptography (2020) (8)
- A method of digital rights management based on Bitcoin protocol (2014) (7)
- How Intractable Is the Discrete Logarithm for a General Finite Group? (1992) (7)
- Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks (2015) (7)
- On unconditionally binding code-based commitment schemes (2017) (7)
- Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves (2005) (7)
- DSSH: Digital signature based secure handover for network-based mobility management (2012) (7)
- Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness (2018) (7)
- A Finite Equivalence of Verifiable Multi-secret Sharing (2012) (7)
- Traceback Framework against Botmaster by Sharing Network Communication Pattern Information (2011) (7)
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6 (2010) (7)
- Information hiding in subcells of a two-dimensional code (2012) (7)
- An Efficient Key Generation Method in Audio Zero-Watermarking (2011) (7)
- Attacks for Finding Collision in Reduced Versions of 3-PASS and 4-PASS HAVAL (2003) (7)
- Darknet Monitoring on Real-Operated Networks (2010) (7)
- Evaluation of Machine Learning Techniques for C&C Traffic Classification (2015) (7)
- Security Analysis of Offline E-cash Systems with Malicious Insider (2012) (7)
- Cooperatively securing network coding against pollution attacks with incentive mechanism (2012) (7)
- Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM (2013) (7)
- A Survey of Software Clone Detection From Security Perspective (2021) (7)
- Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image (2014) (7)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis (2005) (7)
- Ternary Subset Difference Method and Its Quantitative Analysis (2009) (7)
- Efficient implementation for QUAD stream cipher with GPUs (2013) (7)
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider (2006) (7)
- A Behavior-Based Method for Detecting DNS Amplification Attacks (2016) (7)
- Zero-knowledge proofs of decision power: new protocols and optimal round-complexity (1997) (7)
- A New Attack with Side Channel Leakage During Exponent Recoding Computations (2004) (7)
- A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment (2005) (6)
- RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust (2019) (6)
- A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem (2002) (6)
- Certified e-mail systems using public notice board (2003) (6)
- A Proactive Secret Sharing for Server Assisted Threshold Signatures (2006) (6)
- Trust Similarity Measure in Trust Model for P2P Networks (2008) (6)
- A Comprehensive Security Analysis Checksheet for OpenFlow Networks (2016) (6)
- Implementation and evaluation of bot detection scheme based on data transmission intervals (2010) (6)
- Security Analysis for P2P Routing Protocols (2009) (6)
- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars (2002) (6)
- A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging (2015) (6)
- On the Robustness of Visual Cryptographic Schemes (2016) (6)
- Speeding Up Elliptic Scalar Multiplication Using Multidoubling (2002) (6)
- Password-Authenticated Multi-Party Key Exchange with Different Passwords (2006) (6)
- Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones (2015) (6)
- Study of Log File Dispersion Management Method (2010) (6)
- A generic evaluation method for key management schemes in wireless sensor network (2011) (6)
- Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process (2011) (6)
- Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks (2011) (6)
- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange (2006) (6)
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem (2005) (6)
- An Evenhanded Certified Email System for Contract Signing (2005) (6)
- A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks (2012) (5)
- Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms (2014) (5)
- Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC (2002) (5)
- Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework (2012) (5)
- Efficient Computing over GF(2^16) Using Graphics Processing Unit (2013) (5)
- On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance (2006) (5)
- Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units (2014) (5)
- A Study of Security Management with Cyber Insurance (2016) (5)
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System (2010) (5)
- A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane (2010) (5)
- Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs (2012) (5)
- Adaptive and Composable Non-committing Encryptions (2010) (5)
- A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks (2020) (5)
- A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress) (2010) (5)
- Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic (2012) (5)
- Security Model and Analysis of FHMQV, Revisited (2013) (5)
- Security Issues for Contactless Smart Cards (1998) (5)
- Proceedings of the 9th ACM symposium on Information, computer and communications security (2014) (5)
- Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit (2010) (5)
- An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS (2019) (5)
- Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures (2016) (5)
- Exploiting reference images for image splicing verification (2013) (5)
- Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection (2008) (4)
- Securing Provenance of Distributed Processes in an Untrusted Environment (2012) (4)
- An Enhanced Security Protocol for Fast Mobile IPv6 (2009) (4)
- Guest editorial: Trusted computing and communications (2011) (4)
- A Study on Security Level Features and Level Requirements in Security Level Management Model (2008) (4)
- A security analysis of uniformly-layered rainbow defined over non-commutative rings (2014) (4)
- Plaintext checkable encryption with designated checker (2015) (4)
- Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts (2017) (4)
- An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks (2022) (4)
- A Method for Embedding Secret Key Information in RSA Public Key and Its Application (2012) (4)
- Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation (2018) (4)
- Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data (2017) (4)
- Cross-group Secret Sharing for Secure Cloud Storage Service (2016) (4)
- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption (2007) (4)
- Light Weight Write Mechanism for Cloud Data (2018) (4)
- An Image Splicing Detection Based on Interpolation Analysis (2012) (4)
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6 (2009) (4)
- Spam Mail Blocking in Mailing Lists (2010) (4)
- On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication (2001) (4)
- A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage (2016) (4)
- Secret Sharing on Evolving Multi-level Access Structure (2019) (4)
- Enhancing MISP with Fast Mobile IPv6 Security (2011) (4)
- A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding (2015) (4)
- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings (2020) (4)
- Tracing MIRAI Malware in Networked System (2018) (4)
- A study on Security Level Management Model Description (2008) (4)
- Actual Condition and Issues for Mobile Security System (2007) (4)
- A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability (2005) (4)
- Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks (2006) (4)
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table (2011) (4)
- A multivariate quadratic challenge toward post-quantum generation cryptography (2015) (4)
- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure (2004) (4)
- Identity-Embedding Method for Decentralized Public-Key Infrastructure (2014) (4)
- A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity (2022) (4)
- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System (2007) (4)
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems (2003) (3)
- Evaluation of a Zero-Watermarking-Type Steganography (2014) (3)
- Language membership versus possession of knowledge in constant round ZKIP (1991) (3)
- Collaborative agglomerative document clustering with limited information disclosure (2014) (3)
- Security of Multivariate Signature Scheme Using Non-commutative Rings (2014) (3)
- Securing Sensor Networks by Moderating Frequencies (2014) (3)
- Granularity Considering in a Trust Model for P2P Networks (2008) (3)
- An Efficient Password-Based E-mail Protocol for Encrypted E-mail Transmissions on Mobile Equipment (2007) (3)
- Weakness of provably secure searchable encryption against frequency analysis (2012) (3)
- Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols (1998) (3)
- Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors (2017) (3)
- Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows (2019) (3)
- A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm (2011) (3)
- Simulation of Secure Volunteer Computing by Using Blockchain (2019) (3)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers (2005) (3)
- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems (2006) (3)
- A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks (2016) (3)
- Image Encryption Design Based on Multi-Dimensional Matrix Map and Partitioning Substitution and Diffusion-Integration Substitution Network Structure (2010) (3)
- Detecting Information Leakage via a HTTP Request Based on the Edit Distance (2012) (3)
- Secure identity authentication and logical access control for airport information systems (2003) (3)
- Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard (2007) (3)
- Analysis and Comparison of Cryptographic Techniques in E-voting and E-auction (2005) (3)
- A Proposal of Key Management Scheme and Its Operation Using Anonymous Biometrics on ID-based Infrastructure (2007) (3)
- Fast Implementation of KCipher-2 for Software and Hardware (2014) (3)
- Proxy certificates-based digital fingerprinting scheme for mobile communication (2003) (3)
- 3-Party Adversarial Steganography (2020) (3)
- Upper bound of the length of information embedd in RSA public key efficiently (2013) (3)
- Receipt-free Sealed-bid Auction Based on Mix-net and Pseudo ID (2004) (3)
- A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem (2000) (3)
- Attribute-Based Two-Tier Signatures: Definition and Construction (2015) (3)
- Universally composable non-committing encryptions in the presence of adaptive adversaries (2010) (3)
- A proposal of event study methodology with Twitter sentimental analysis for risk management (2017) (3)
- Integrity for the In-flight web page based on a fragile watermarking chain scheme (2011) (3)
- An intrusion detection system using alteration of data (2006) (3)
- Design and Analysis of Partial Blind Signature Schemes for the DSS and Message Recovery Based on the Discrete Logarithm Problem (1997) (3)
- Neural Networks-Based Cryptography: A Survey (2021) (3)
- A Framework for the User-Oriented Personal Information Protection (2006) (3)
- EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE (1988) (3)
- SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid (2010) (2)
- A Progress report on lattice based public-key cryptosystems. Theoretical security versus practical cryptanalysis (2000) (2)
- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography (2012) (2)
- A secure digital watermark system for secondary distribution (2003) (2)
- Towards 'Receipt-Freeness' in Remote Biometric Authentication (2014) (2)
- Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System (2009) (2)
- Flow Traffic Classification with Support Vector Machine by Using Payload Length (2009) (2)
- Efficient Intrusion Detection Based on Static Analysis and Stack Walks (2009) (2)
- Certificate Management Scheme for VANETs Using Blockchain Structure (2022) (2)
- Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework (1969) (2)
- A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems (2003) (2)
- Monitoring Unused IP Addresses on Segments Managed by DHCP (2008) (2)
- Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach (2011) (2)
- K2 Stream Cipher (2007) (2)
- On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE (1997) (2)
- Analyzing the Effect of Moving Target Defense for a Web System (2019) (2)
- Improving the accuracy of signature authentication using the eight principles of Yong (2017) (2)
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism (2008) (2)
- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery (2005) (2)
- Mechanized analysis of verifiable multi-secret sharing in the appliedPi-calculus (2010) (2)
- Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage (2014) (2)
- Security countermeasure design by using block model (2006) (2)
- An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning (2021) (2)
- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks (2009) (2)
- Towards optimal revocation and tracing schemes The power of the ternary tree (2011) (2)
- Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions (2021) (2)
- Malware Detection Focusing on Behaviors of Process and its Implementation (2009) (2)
- Evaluation of the Identity and Compatibility of Multi-valued Cells in Two-Dimensional Codes Using Smartphones (2014) (2)
- On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments (2007) (2)
- Secrecy Capacity of Wireless LAN (2009) (2)
- Application and Evaluation of Bayesian Filter for Chinese Spam (2006) (2)
- A New Design for Evaluating Moving Target Defense System (2018) (2)
- Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation (2004) (2)
- Information Hiding of Two-dimensional Code by Multi-layer Optical (2012) (2)
- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment (2004) (2)
- A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100 (2022) (2)
- State of Art on Security Protocols for Fast Mobile IPv6 (2010) (2)
- Protecting the electric power infrastructure with a mobile agent monitoring and analysis system (2004) (2)
- Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes (1992) (2)
- On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies (2015) (2)
- Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units (2014) (2)
- Design and Implementation of Document Access Control Model Based on Role and Security Policy (2010) (2)
- Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology (2012) (2)
- Design and Analysis Cryptographic Hash Function for The Next Generation (2002) (2)
- E-voting System with Ballot-Cancellation Based on Double-Encryption (2005) (2)
- Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter (2011) (2)
- Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking (2017) (2)
- A note on the security of KHL scheme (2015) (2)
- Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet (2005) (2)
- Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse (2015) (2)
- Erratum: Cryptanalysis and improvement of "A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" (PLoS ONE (2015) 10:11 (e0142716) DOI:10.1371/journal.pone.0142716) (2015) (2)
- Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud (2012) (2)
- On Effectiveness of Clock Control in Stream Ciphers (2007) (2)
- A Framework for User Privacy Protection Using Trusted Programs (2007) (2)
- Toward a Scalable Visualization System for Network Traffic Monitoring (2008) (2)
- A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems (2002) (2)
- A Probabilistic Method for Detecting Anomalous Program Behavior (2004) (2)
- Securing Location-Aware Services Based on Online/Offline Signatures in VANETs (2011) (2)
- Image Splicing Verification Based on Pixel-Based Alignment Method (2012) (2)
- Implementation of Efficient Operations over GF(232) Using Graphics Processing Units (2014) (2)
- Key Distribution Scheme Using Matched Filter Resistant against DoS Attack (2008) (2)
- Guest editorial: Addressing insider threats and information leakage (2011) (2)
- Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6 (2009) (2)
- Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm (2015) (2)
- Achieving evenhandedness in certified email system for contract signing (2008) (2)
- Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods (2003) (2)
- An Approach of Trusted Program Generation for User-Responsible Privacy (2007) (2)
- AC0 Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares (2019) (1)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost (2005) (1)
- Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System (2008) (1)
- On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer (2001) (1)
- A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection (2023) (1)
- Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding (2018) (1)
- Generic Construction for Attribute-Based Identification Schemes Secure against Reset Attacks (2015) (1)
- Practical Consequences of the Discrepancy between Zero-Knowledge Protocols and Their Parallel Execution (Special Section on Cryptography and Information Security) (1993) (1)
- Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code (2012) (1)
- An RFID System Based MCLT System with Improved Privacy (2006) (1)
- AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties (2020) (1)
- Modeling and Containment of Search Worms Targeting Web Applications (2010) (1)
- Model-Based Intrusion Detection by Abstract Interpretation (2010) (1)
- Case Study - SLMM Application (2009) (1)
- Addressing Insider Threats and Information Leakage (2011) (1)
- The Analysis of Current State and Future on the E-voting System (2002) (1)
- Toward fair international key escrow : An attempt by distributed Trusted Third agencies with threshold cryptography (1999) (1)
- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model (2011) (1)
- Hardware Architectures of AES for low power design (2002) (1)
- Reliable Key Distribution Scheme for Lossy Channels (2008) (1)
- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation (2003) (1)
- On weak RSA-keys produced from Pretty Good Privacy (1997) (1)
- A Parameterless Learning Algorithm for Behavior-Based Detection (2014) (1)
- Distributing Security-Mediated PKI Revisited (2006) (1)
- Characterization of languages in constant round perfect zero-knowledge interactive proofs (1993) (1)
- A Learning Algorithm for Behavior-based PortScan Automatic Detection and Its Evaluation (2015) (1)
- Intrusion Detection Using Third-Parties Support (2008) (1)
- PREVENTING SPAM DISGUISED AS ERROR MAIL (2003) (1)
- Conditional Generative Adversarial Network-based Image Denoising for Defending Against Adversarial Attack (2021) (1)
- On Bit Correlations Among Preimages of "Many to One" One-Way Functions (1992) (1)
- A DRM Framework for Secure Distribution of Mobile Contents (2004) (1)
- Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes (2000) (1)
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol (2010) (1)
- Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols (2016) (1)
- Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract (2020) (1)
- Classification of Malicious Domains by Their LIFETIME (2020) (1)
- A Signature Scheme Associated with Universal Re-signcryption (2009) (1)
- On Revenue Driven Server Management in Cloud (2012) (1)
- Classification of Off - line Electronic Money Systems and Evaluation of the Security against Insider Attacks (1999) (1)
- A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games (1996) (1)
- Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets (2009) (1)
- Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited (2019) (1)
- Key Exchange Using Tree Parity Machines: A Survey (2022) (1)
- Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU (2015) (1)
- On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract) (1995) (1)
- Managing Insider Security Threats (MIST 2012 Volume 1) (2012) (1)
- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation (2017) (1)
- Correction: Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" (2015) (1)
- Enhancing Cooperative Behavior for Online Reputation Systems by Group Selection (2009) (1)
- Trusted Database Interoperation Based on Collaborative Role-Based Access Control (2005) (1)
- FPGA-Targeted Hardware Implementations of K2 (2008) (1)
- Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network (2007) (1)
- Ballot-Cancellation Protocol of E-voting Based on Two Independent Authorities (2003) (1)
- Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding (2021) (1)
- Key-Exchange Protocol Using Pre-agreed Session-ID (2004) (1)
- A Systematic Study of Bulletin Board and Its Application (2022) (1)
- On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms (2022) (1)
- A Policy Language for the Extended Reference Monitor in Trusted Operating Systems (2007) (1)
- Character-based symmetric searchable encryption and its implementation and experiment on mobile devices (2016) (1)
- Light weight and fine‐grained access mechanism for secure access to outsourced data* (2018) (1)
- Evaluating Solving Time of Multivariate Quadratic Equation System using XL Algorithm over Small Finite Fields (2014) (1)
- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing (2002) (1)
- Toward Fair International Key Escrow (1999) (1)
- Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme (2011) (1)
- Group key distribution scheme for reducing required rekey message size (2005) (1)
- Ciphertext-Auditable Public Key Encryption (2006) (1)
- Secret Sharing Schemes : A Fine Grained Analysis (2019) (1)
- Workflow Scheduling with Fault Tolerance (2012) (1)
- Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields (2015) (1)
- Confidentiality of 2D Code using Infrared with Cell-level Error Correction (2013) (1)
- The Optimal Choice by Resource Consumers in Grid Market (2009) (1)
- Privacy-preservation techniques in data mining (2007) (1)
- Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network (2012) (1)
- On the Security Properties of Combinatorial All-or-nothing Transforms (2022) (1)
- Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions (2017) (1)
- Detection of Android ad library focusing on HTTP connections and view object redraw behaviors (2015) (1)
- Ballot-cancellation Scheme in E-voting System (2005) (1)
- Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it (1998) (1)
- Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing (2022) (1)
- Security and Privacy in E-voting and RFID System Based on Universal (2005) (1)
- Secure Outsourced Private Set Intersection with Linear Complexity (2021) (1)
- Protection of Data and Delegated Keys in Digital Distribution (1997) (1)
- Evaluation of gamma ray durability of RF tag and application to the radiation environment (2015) (1)
- Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work (2018) (1)
- Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9–11, 2015, Revised Selected Papers (2016) (1)
- Subliminal Channels for Transferring Signatures: Yet Another Cryptographic Primitive (Special Section on Cryptography and Information Security) (1994) (1)
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks (2005) (1)
- Host independent and distributed detection system of the network attack by using OpenFlow (2017) (1)
- Some remarks on security of receipt-free e-auction (2005) (1)
- The Development of Radiation-Resistant RF Tags for Use at Nuclear Power Plants (2013) (1)
- An Integration of PKI and IC cards for IPSec (2004) (1)
- Design and Analysis of 3way Authentication Based on Trusted Device (2007) (0)
- The Current State and Issue on the Implementation of Electronic Voting System in Internet (2002) (0)
- Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment (2007) (0)
- Data Mining: Privacy-Preservation Techniques (2016) (0)
- Graph-Based Construction for Non-Malleable Codes (2021) (0)
- Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties (2006) (0)
- FCST 2011: Welcome message from the program chairs (2011) (0)
- A Model to Partially Outsourcing Access Control for Databases (2005) (0)
- Workflow Scheduling with Fault Tolerance Workflow Scheduling with Fault Tolerance (2015) (0)
- Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation (2014) (0)
- Regular Paper Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (2003) (0)
- Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS (2015) (0)
- E-voting with Receipt-freeness and Universal Verifiability Using E-voting Sheet (2004) (0)
- Hypercube and Cascading-based Algorithms for Secret Sharing Schemes (2020) (0)
- Foreword (2009) (0)
- Pseudorandomness of SPN-Type Transformations (2004) (0)
- EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS (2013) (0)
- On the power of probabilistic counting in linear cryptanalysis of LOKI91 (1996) (0)
- A Practical Proxy Device for Protecting RFID Tag's Identifier (2007) (0)
- Multimedia Copyright Protection Scheme Based on the Direct Feature-Based Method (2013) (0)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption (2005) (0)
- Off-line verification of one-time ID in distributed environment (2006) (0)
- Proposal and Evaluation for Improvement of Corpus Separation in Bayesian Spam Filtering on Multi-lingual Environment (2005) (0)
- Application and evaluation of Bayesian filter for Chinese spam mail (2006) (0)
- Correction (2020) (0)
- Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining (2022) (0)
- Analysis of Methods for Detecting Compromised Nodes and its Countermeasures (2012) (0)
- Advances in Information and Computer Security (2007) (0)
- Fast TCP Protscan Detection Method (2005) (0)
- New Multiple Encryption for Making Double Encryption Secure Against Meet-inthe-Middle and Related-Key Attacks (2011) (0)
- Definition of security practices in security management part of security level management model (2008) (0)
- A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes (1996) (0)
- Extension of NTRU using Non-commutative Groups II (2014) (0)
- The Design of Convenient File Protection based on EXT 3 File System (2004) (0)
- A Theory of Demonstrating Program Result-Correctness with Cryptographic Applications (2001) (0)
- A Complexity Theoretic Approach to Breaking Cryptosystems Based on Discrete Logarithms (1994) (0)
- A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds (2023) (0)
- Message from the Blockchain 2020 Steering Chairs (2020) (0)
- Modeling Security Bridge Certificate Authority Architecture (2009) (0)
- A Proposal of a System for Detecting Buffer Overflow with Detecting Alteration of Data (2005) (0)
- Face completion with pyramid semantic attention and latent codes (2020) (0)
- Explicit Non-malleable Codes from Bipartite Graphs (2022) (0)
- A Survey on Cloud Group Data Sharing using Key-Aggregate Searchable Encryption (KASE) Scheme (2016) (0)
- Special Section on Discrete Mathematics and Its Applications (2004) (0)
- An intrusion detection system which can restore altered data (2007) (0)
- BCC'17 chairs' Welcome (2017) (0)
- IMIS 2008 message from the workshop organizers MUE 2008 (2008) (0)
- An Authentication for Ensuring Genuineness of Printed Document based on Digital Watermarking and Image Encryption (2018) (0)
- Detection of Illegal Players in MMORPG by Classification Algorithms (2015) (0)
- On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network (2007) (0)
- Performance Evaluation of Volunteer Computing-based Neural Network on Ethereum Platform (2021) (0)
- A Flexible User-centric Resource Scheduling Algorithm (アルゴリズム(AL) Vol.2010-AL-128) (2010) (0)
- Message from the STPA 2016 Workshop Organizers (2016) (0)
- Design of Intrusion Detection System at User Level with System-Call Interposing (2004) (0)
- Researches on IT Forensics from International Joint Workshop on Computer Forensics (2009) (0)
- Survey and new idea for attribute-based identification scheme secure against reset attacks (2014) (0)
- Special section on trust, security and privacy for pervasive applications (2010) (0)
- Message from CyberSciTech 2019 General Chairs, General Executive Chairs and Program Chairs (2019) (0)
- On Pseudo Randomness from Block Ciphers | MISTY versus DES in cryptographic security| (1996) (0)
- Evasion Attacks Against Statistical Code Obfuscation Detectors (2017) (0)
- Trends and Security Issues for Contactless Smart Cards (2000) (0)
- Reconsidering Data Logging in Light of Digital Forensics (2009) (0)
- Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum (2021) (0)
- A Characterization of Languages in Constant Round Perfect Zero-Knowledge Interactive Proofs (Special Section on Discrete Mathematics and Its Applications) (1993) (0)
- Deniable Secret Handshake Protocol - Revisited (2019) (0)
- A study on worms using search engine to spread (情報通信システムセキュリティ) (2010) (0)
- Analysis and Design for Private Message Board Systems (2004) (0)
- Using game theory to classify wireless Ad Hoc network attacks with analysis on countermeasures (2011) (0)
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party (2009) (0)
- Private Data Clustering based on Secure Approximation (2006) (0)
- Improved Subset Difference Method with Ternary Tree (2010) (0)
- Proposal concerning civil caces dispute solution in online shopping (2009) (0)
- Attribute-Based Signatures without Pairings by the Fiat-Shamir Transform ( Corrected Version ) ? (2015) (0)
- Private Range Query on Encrypted Database Model (2014) (0)
- An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme (2003) (0)
- Vulnerability of Anonymous E-cash Systems to Insider-Attacks from Untrusted Authorities (1998) (0)
- XExt3: The Design and Implementation of a Security Enhanced Ext3 File System (2005) (0)
- Customized program protection for a user customized data protection framework (2011) (0)
- Design and Implementation of an ECM-based Integer Factorization Tool with GMP-ECM on Windows Platforms (2006) (0)
- On the Rank attacks against multivariate signature scheme using non-commutative rings (2012) (0)
- Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data (2021) (0)
- Proposal of Certified E - mail in consideration of Authentication and Scalability (2002) (0)
- Proceedings of the 1st international conference on Security (2006) (0)
- Behavior Control Based on Dynamic Code Translation (2010) (0)
- On the Security of Sealed-bid Auction with Receipt-freeness (2004) (0)
- Multi-user Access Control to the Divided Area on Multi-value Cell Two-dimensional Code (2016) (0)
- Design and Object-oriented Implementation of an Intelligence Entity Sharing Pool (2009) (0)
- A Note on Signature Schemes Associated with Universal Re-signcryption (2005) (0)
- An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication (2003) (0)
- Trusted Connection between Mobile Nodes and Mobility Anchor Points in Hierarchical Mobile IPv6 (2008) (0)
- Application of Graph Problem for Bitcoin Mining Samiran Bag (2015) (0)
- Message from the trustcom 2009 symposium chairs (2009) (0)
- Message from the Blockchain 2020 General Chairs (2020) (0)
- Definition of Fairness and Verification of Authentication Protocol By Modal Logic (2004) (0)
- DASC 2013: Message from the general chairs (2013) (0)
- Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing (2022) (0)
- Security and Privacy in E-voting and RFID System Based on Universal Re-encryption Mix-net (2005) (0)
- On the Pseudorandomness of a Modification of KASUMI Type Permutations (2004) (0)
- Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating (2019) (0)
- An Approach of Program Analysis Prevention for Information Protection (2007) (0)
- Design and Implementation of Design and Implementation of Design and Implementation of Design and Implementation of a Live a Live--CA CA CA CD CD /DVD on an on an on an (2006) (0)
- A New Secret Sharing Scheme Based on the Multi-Dealer (2009) (0)
- Current Perspectives on Securing Critical Infrastructures’ Supply Chains (2023) (0)
- An enhanced audio ownership protection scheme based on visual cryptography (2014) (0)
- BCC'18 chairs' welcome (2018) (0)
- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems (1999) (0)
- A Survey of Difficulty Control Methods on Computationally Hard Problems in Blockchain (2017) (0)
- Formal Verification for Access Control in Web Information Sharing System (2009) (0)
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis (2008) (0)
- Design and Implementation of a Live-CA CD/DVD on an Open Source Environment (2006) (0)
- Investigation and Countermeasure for Packet Filter Policy Security (2009) (0)
- A Competitive Three-Level Pruning Technique for Information Security (2014) (0)
- Risks for Raw - key Masking the Security of 2 - key XCBC MAC - generation scheme (2002) (0)
- Design of E-voting with an Absentee Voter Which Enables Ballot-Cancellation and Receipt-Free (2003) (0)
- Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions (2022) (0)
- Improvements of Certified E-mail Delivery Authority (2003) (0)
- 1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption * (2006) (0)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds (2006) (0)
- Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection (Theoretical Computer Science and Its Applications) (2009) (0)
- A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository (2005) (0)
- Adaptive and composable non-interactive string-commitment protocols (2010) (0)
- Title: Proving Identity in Three Moves Non-member Tsutomu Matsumoto (2007) (0)
- Towards Evaluating the Security of Human Computable Passwords Using Neural Networks (2022) (0)
- A Second-order Differential Power Analysis Breaks a Window-method Based Countermeasure against Side Channel Attacks (2003) (0)
- Induction and Implementation of Security Requirements in Each System Block (2007) (0)
- Decentralized and Collaborative Tracing for Group Signatures (2022) (0)
- On the fairness in the case of opening attributes (2000) (0)
- How to sign multiple versions of digital documents (2017) (0)
- Privacy-aware cloud-based input method editor (2014) (0)
- Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities (2022) (0)
- Security Evaluation of Memory Access Pattern Protection against Active Adversaries (2018) (0)
- Constant round perfect ZKIP of computational ability (1993) (0)
- Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages (1997) (0)
- The Improved Risk Analysis Mechanism in the Practical Risk Analysis System (2005) (0)
- Information Security Applications (2012) (0)
- Actively Modifying Control Flow of Program for Efficient Anormaly Detection (2006) (0)
- A report on 2nd annual PKI research workshop (2003) (0)
- E-voting vs. RFID in Security and Privacy : - The case of universal re-encryption public technique (2004) (0)
- Integrity Watermarking and QR-Code Techniques for ensuring Printed Document Authenticity Real Time Distribution (2017) (0)
- XExt 3 : The Design and Implementation of a Security Enhanced Ext 3 File System (2004) (0)
- Expressive Rating Scheme by Signatures with Predications on Ratees (2016) (0)
- Design of the Secure E-voting System Including Absentee Voters Which Enables Ballot-Cancellation Based on Double Encryption (2003) (0)
- L-032 Integrity for the In-flight Web Page Using Fragile Watermarking (2010) (0)
- Electronic Voting Protocol for the Receipt-freeness Based on Internet (2004) (0)
- The Secure Electronic Voting System for Absentee (2002) (0)
- Towards a Lightweight Detection System for Cyber Security in IoT Environments using Feature Selection (2019) (0)
- Demonstrating Programs against Adversaries (1995) (0)
- Enhanced privacy in key-exchange protocols by one-time ID (2006) (0)
- Welcome to ASIACCS 2014 (2014) (0)
- Multi-Candidate E-Voting System for Absentee (2002) (0)
- Learning asymmetric encryption using adversarial neural networks (2023) (0)
- On the zero-run length of a signed binary representation (2009) (0)
- Current Status and Challenges of Enhancing Security Management on IT-Enabled Supply Chain (2019) (0)
- A Concrete Procedure of the Σ-protocol on Monotone Predicates ? (2018) (0)
- Block Cipher with Variable Output Word-Size Based on SHA-V ;SHACAL-V (2003) (0)
- A Game Theoretical Approach of Differential Pricinng for the Internet (1999) (0)
- A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing (2021) (0)
- Handling class Imbalance problem in Intrusion Detection System based on deep learning (2022) (0)
- Application of NTRU Using Group Rings to Partial Decryption Technique (2015) (0)
- An Anonymous Fingerprinting Scheme with a Robust Asymmetry (2003) (0)
- ELECTRONIC SEALED-BID AUCTION WITH THE EFFICIENT COMMUNICATION COMPLEXITY USING TOURNAMENT OPENING-METHOD (2004) (0)
- Proposal of Multivariate Encryption Scheme Using Cubic Map (2016) (0)
- Security Protocol for IMT-2000-Based Contents Service (2006) (0)
- Invalidation of Mailing List Address to Block Spam Mails (2008) (0)
- Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions (2017) (0)
- Sequential Detection of Cyber-attacks Using a Classification Filter (2021) (0)
- A Distributed Ledger Management Mechanism for Storing and Selling Private Data (2021) (0)
- Active Attack Against Oblivious RAM (2018) (0)
- Analysis of lattice attack against a matrix variant in lattice-based cryptography (2014) (0)
- Let's go to IEICE Workshops!: Information Security (ISEC)@@@情報セキュリティ研究会(ISEC) (2014) (0)
- Enforcement of Integrated Security Policy in Trusted Operating Systems (2007) (0)
- Welcome Messages from IEEE iSCI 2020 Program Chairs (2020) (0)
- Research and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device (2007) (0)
- Message from ISSR Workshop Chairs (2012) (0)
- Approach to Materialize Digital Fingerprinting Scheme using Proxy Certificates (2004) (0)
- A Study of Communication Route Selection Considering Route Security (2011) (0)
- ICONE23-1793 EVALUATION OF GAMMA RAY DURABILITY AND ITS APPLICATION OF SHIELDED RF TAGS (2015) (0)
- The Design and Evaluation of Anomaly Detection System Based on System Call (2005) (0)
- Towards the Design of Locally Differential Private Hardware System for Edge Computing (2022) (0)
- Revisiting Block Withholding Attack in Bitcoin Cryptocurrency Samiran Bag (2015) (0)
- Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract) (1996) (0)
- An Electronic Voting Scheme including Absentee - A practical tallying that can the ballot - cancellation - (2002) (0)
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation (2009) (0)
- Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network (2013) (0)
- Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control (2012) (0)
- Comments and improvements of “HOTA: Handover optimized ticket-based authentication in network-based mobility management” (2017) (0)
- MAC Algorithm with Variable Output-Size: VMAC (2004) (0)
- Evolution of Bulletin Board & its application to E-Voting - A Survey (2021) (0)
- On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract) (1996) (0)
- A Privacy-Preserving Data Feed Scheme for Smart Contracts (2022) (0)
- The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009) Welcome Message from IMIS 2009 Organizers (2009) (0)
- Proposal and Evaluation of a Security Incident Response Training Method using Programming (2019) (0)
- Design and Implementation of a Forced Encryption Kernel Module (2011) (0)
- Perpetual Secret Sharing from Dynamic Data Structures (2021) (0)
- A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant (2006) (0)
- Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance (2013) (0)
- Real-time Tampering Detection System Using the Verification Agent for Mobile Agents (2004) (0)
- Efficient Shortest Path Routing Algorithms for Distributed XML Processing (2019) (0)
- A Concrete Procedure of Σ-protocol on Monotone Predicate ? (2018) (0)
- Message from the workshop/symposium chairs: TrustCom 2014 (2015) (0)
- Examination of the compatible barcode for product code with confidentiality and large capacity (2012) (0)
- A Visual Tool for Simulating Turing Machines with Subroutine Mechanisms (1995) (0)
- Collaborative Attribute-Based Group Signatures from Lattices (2022) (0)
- Revisiting Block Withholding Attack in Bitcoin Cryptocurrency (2015) (0)
- Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation (2014) (0)
- Hardware trojan cyber-physical threats to supply chains (2018) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Kouichi Sakurai?
Kouichi Sakurai is affiliated with the following schools: