Kouichi Sakurai
Orcid: 0000-0003-4621-1674
According to our database1,
Kouichi Sakurai
authored at least 497 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning.
Comput., October, 2024
Concurr. Comput. Pract. Exp., July, 2024
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks.
J. Inf. Secur. Appl., 2024
A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments.
Int. J. Netw. Comput., 2024
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2024
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning.
CoRR, 2024
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication.
CoRR, 2024
Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity - A Review.
CoRR, 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
Proceedings of the IJCAI 2024 Workshop on Artificial Intelligence Safety (AISafety 2024) co-located with the 33rd International Joint Conference on Artificial Intelligence (IJCAI 2024), 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds.
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023
Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection.
Biomed. Signal Process. Control., August, 2023
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection.
Inf., 2023
IEEE Secur. Priv., 2023
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023
Eng. Appl. Artif. Intell., 2023
A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme.
Proceedings of the Network and System Security - 17th International Conference, 2023
Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT).
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023
POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
IEEE Trans. Inf. Theory, 2022
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing.
J. Inf. Secur. Appl., 2022
Handling class Imbalance problem in Intrusion Detection System based on deep learning.
Int. J. Netw. Comput., 2022
IEICE Trans. Inf. Syst., 2022
Cryptogr., 2022
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100.
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Arithmetic of Finite Fields - 9th International Workshop, 2022
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
Towards the Design of Locally Differential Private Hardware System for Edge Computing.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions.
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack.
IEEE Access, 2021
Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
2020
Sensors, 2020
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks.
Int. J. Netw. Comput., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the Eighth International Symposium on Computing and Networking, 2020
Proceedings of the Advances in Internet, 2020
Proceedings of the Advances in Internet, 2020
Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract.
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2020
2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019
IPSJ Trans. Comput. Vis. Appl., 2019
Int. J. Netw. Comput., 2019
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited.
IACR Cryptol. ePrint Arch., 2019
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019
Proposal and Evaluation of a Security Incident Response Training Method using Programming.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the IEEE Congress on Evolutionary Computation, 2019
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation.
Proceedings of the Advanced Information Networking and Applications, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
2018
IEEE Trans. Parallel Distributed Syst., 2018
Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden.
Proceedings of the 2018 IEEE SmartWorld, 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors.
Concurr. Comput. Pract. Exp., 2017
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing.
Comput. Electr. Eng., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the International Workshop on Big Data and Information Security, 2017
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
Improving the accuracy of signature authentication using the eight principles of Yong.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Parameter manipulation attack prevention and detection by using web application deception proxy.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
A proposal of event study methodology with Twitter sentimental analysis for risk management.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Host independent and distributed detection system of the network attack by using OpenFlow.
Proceedings of the 2017 International Conference on Information Networking, 2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
2016
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices.
Secur. Commun. Networks, 2016
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
ACM Commun. Comput. Algebra, 2015
Evaluation of gamma ray durability of RF tag and application to the radiation environment.
Proceedings of the IEEE International Conference on RFID Technology and Applications, 2015
Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Secur. Commun. Networks, 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework.
J. Networks, 2014
Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units.
J. Internet Serv. Inf. Secur., 2014
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014
EURASIP J. Inf. Secur., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Evaluation of the Identity and Compatibility of Multi-valued Cells in Two-Dimensional Codes Using Smartphones.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014
Proceedings of the ASIAPKC'14, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
J. Supercomput., 2013
J. Inf. Process., 2013
Int. J. Interact. Multim. Artif. Intell., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Comput. Sci. Inf. Syst., 2013
Comput. Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A proposal for the privacy leakage verification tool for Android application developers.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012
Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Netw. Comput. Appl., 2012
J. Internet Serv. Inf. Secur., 2012
Int. J. Comput. Intell. Syst., 2012
IEICE Trans. Inf. Syst., 2012
DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks.
Comput. Commun., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012
Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Cooperatively securing network coding against pollution attacks with incentive mechanism.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012
On Revenue Driven Server Management in Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Secur. Commun. Networks, 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Int. J. Ad Hoc Ubiquitous Comput., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems.
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Integrity for the <i>In-flight</i> web page based on a fragile watermarking chain scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011
A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
Design and Implementation of Document Access Control Model Based on Role and Security Policy.
Proceedings of the Trusted Systems - Second International Conference, 2010
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
IEICE Trans. Commun., 2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the Database Systems for Advanced Applications, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets.
Proceedings of the The Forth International Conference on Availability, 2009
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide.
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
J. Inf. Process., 2008
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
J. Comput. Sci. Technol., 2008
Int. J. Inf. Sec., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Efficient verifier-based password-authenticated key exchange in the three-party setting.
Comput. Stand. Interfaces, 2007
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network.
Proceedings of the Theory and Applications of Models of Computation, 2007
K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007
Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007
Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Advances in Information and Computer Security, 2007
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Information Security Practice and Experience, 2007
Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider.
Inf. Media Technol., 2006
Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the 3rd international conference on Mobile technology, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
Proceedings of the Computational Science, 2006
Proceedings of the High Performance Computing and Communications, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
A Proposal of One-Time Biometric Authentication.
Proceedings of the 2006 International Conference on Security & Management, 2006
A Framework for the User-Oriented Personal Information Protection.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of the Communications and Multimedia Security, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository.
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Information Networking, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Networking, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Design of Intrusion Detection System at User Level with System-Call Interposing.
Proceedings of the ICETE 2004, 2004
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation.
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.
Proceedings of the Applied Cryptography and Network Security, 2003
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Scalar Multiplication Algorithm with Recovery of the <i>y</i>-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Proceedings of the Information Security, 5th International Conference, 2002
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
Proceedings of the Information Security and Cryptology, 2001
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Public Key Cryptography, 2000
Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes.
Proceedings of the Public Key Cryptography, 2000
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack.
Proceedings of the Progress in Cryptology, 2000
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
J. Cryptol., 1999
Proceedings of the Public Key Cryptography, 1999
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information Security and Cryptology, 1999
1998
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems.
J. Cryptol., 1998
An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy.
Inf. Process. Lett., 1998
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Public Key Cryptography, 1998
Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998
A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem.
Proceedings of the Financial Cryptography, 1998
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F<sub>2</sub>n.
Proceedings of the Advances in Cryptology, 1998
1997
Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages.
Theor. Comput. Sci., 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games.
Inf. Process. Lett., 1996
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract).
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996
Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract).
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996
Proceedings of the Advances in Cryptology, 1996
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995
On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract).
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1992
Proceedings of the Advances in Cryptology, 1992
On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes.
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991