Kouichi Sakurai

Orcid: 0000-0003-4621-1674

According to our database1, Kouichi Sakurai authored at least 497 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning.
Comput., October, 2024

Secured tracing for group signatures from attribute-based encryption.
Concurr. Comput. Pract. Exp., July, 2024

A statistical verification method of random permutations for hiding countermeasure against side-channel attacks.
J. Inf. Secur. Appl., 2024

A Multi-Head Federated Continual Learning Approach for Improved Flexibility and Robustness in Edge Environments.
Int. J. Netw. Comput., 2024

Access Structure Hiding Verifiable Tensor Designs.
IACR Cryptol. ePrint Arch., 2024

A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

Trustworthy Federated Learning: Privacy, Security, and Beyond.
CoRR, 2024

PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning.
CoRR, 2024

FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks.
CoRR, 2024

An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication.
CoRR, 2024

Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity - A Review.
CoRR, 2024

Versatile Defense Against Adversarial Attacks on Image Recognition.
CoRR, 2024

AggreMark: Efficient Watermarking in Federated Learning via Weighted Averaging.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

A Design of Internet of Vehicles System Incorporating Lightweight Roadside Units and Blockchain Strategy.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024

The Framework of General Channel Key Generation Based on Physical Layer.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

Evading IoT Intrusion Detection Systems with GAN.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

The Impact of Prompts on Zero-Shot Detection of AI-Generated Text.
Proceedings of the IJCAI 2024 Workshop on Artificial Intelligence Safety (AISafety 2024) co-located with the 33rd International Joint Conference on Artificial Intelligence (IJCAI 2024), 2024

Extension of Resource Authorization Method with SSI in Edge Computing.
Proceedings of the Advanced Information Networking and Applications, 2024

SoK: Directions and Issues in Formal Verification of Payment Protocols.
Proceedings of the Advanced Information Networking and Applications, 2024

Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds.
Proceedings of the Advanced Information Networking and Applications, 2024

Enhancing Security and Efficiency: A Lightweight Federated Learning Approach.
Proceedings of the Advanced Information Networking and Applications, 2024

Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection.
Biomed. Signal Process. Control., August, 2023

A Review on Machine Unlearning.
SN Comput. Sci., July, 2023

Phoenix: A Live Upgradable Blockchain Client.
IEEE Trans. Sustain. Comput., 2023

A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection.
Inf., 2023

Current Perspectives on Securing Critical Infrastructures' Supply Chains.
IEEE Secur. Priv., 2023

Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023

Learning asymmetric encryption using adversarial neural networks.
Eng. Appl. Artif. Intell., 2023

A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme.
Proceedings of the Network and System Security - 17th International Conference, 2023

Research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

Flexibility and Privacy: A Multi-Head Federated Continual Learning Framework for Dynamic Edge Environments.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

Application and Limitations of Digital Signature Schemes for Implementing Non-Fungible Token (NFT).
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

Eliminating Adversarial Perturbations Using Image-to-Image Translation Method.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms.
IEEE Trans. Inf. Theory, 2022

Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing.
J. Inf. Secur. Appl., 2022

Handling class Imbalance problem in Intrusion Detection System based on deep learning.
Int. J. Netw. Comput., 2022

A Privacy-Preserving Data Feed Scheme for Smart Contracts.
IEICE Trans. Inf. Syst., 2022

Certificate Management Scheme for VANETs Using Blockchain Structure.
Cryptogr., 2022

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity.
Cryptogr., 2022

A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100.
IEEE Access, 2022

Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing.
IEEE Access, 2022

Towards Evaluating the Security of Human Computable Passwords Using Neural Networks.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Explicit Non-malleable Codes from Bipartite Graphs.
Proceedings of the Arithmetic of Finite Fields - 9th International Workshop, 2022

Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities.
Proceedings of the Information Security Practice and Experience, 2022

On the Security Properties of Combinatorial All-or-nothing Transforms.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Towards the Design of Locally Differential Private Hardware System for Edge Computing.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

Federated Learning with Clustering-Based Participant Selection for IoT Applications.
Proceedings of the IEEE International Conference on Big Data, 2022

A Systematic Study of Bulletin Board and Its Application.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Decentralized and Collaborative Tracing for Group Signatures.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021

Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions.
Theor. Comput. Sci., 2021

Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography.
IACR Cryptol. ePrint Arch., 2021

Evolution of Bulletin Board & its application to E-Voting - A Survey.
IACR Cryptol. ePrint Arch., 2021

Graph-Based Construction for Non-Malleable Codes.
IACR Cryptol. ePrint Arch., 2021

Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack.
IEEE Access, 2021

Neural Networks-Based Cryptography: A Survey.
IEEE Access, 2021

A Survey of Software Clone Detection From Security Perspective.
IEEE Access, 2021

Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

A Distributed Ledger Management Mechanism for Storing and Selling Private Data.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Secure Outsourced Private Set Intersection with Linear Complexity.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Perpetual Secret Sharing from Dynamic Data Structures.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Sequential Detection of Cyber-attacks Using a Classification Filter.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.
Sensors, 2020

A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks.
Int. J. Netw. Comput., 2020

Hypercube and Cascading-based Algorithms for Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2020

3-Party Adversarial Steganography.
Proceedings of the Information Security Applications - 21st International Conference, 2020

AC<sup>0</sup> Constructions of Secret Sharing Schemes - Accommodating New Parties.
Proceedings of the Network and System Security - 14th International Conference, 2020

Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Face completion with pyramid semantic attention and latent codes.
Proceedings of the Eighth International Symposium on Computing and Networking, 2020

Blockchain for IoT-Based Digital Supply Chain: A Survey.
Proceedings of the Advances in Internet, 2020

3-Party Adversarial Cryptography.
Proceedings of the Advances in Internet, 2020

Classification of Malicious Domains by Their LIFETIME.
Proceedings of the Advances in Internet, 2020

Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract.
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2020

2019
One Pixel Attack for Fooling Deep Neural Networks.
IEEE Trans. Evol. Comput., 2019

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019

Attacking convolutional neural network using differential evolution.
IPSJ Trans. Comput. Vis. Appl., 2019

Analyzing the Effect of Moving Target Defense for a Web System.
Int. J. Netw. Comput., 2019

Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited.
IACR Cryptol. ePrint Arch., 2019

Light weight and fine-grained access mechanism for secure access to outsourced data.
Concurr. Comput. Pract. Exp., 2019

Secret Sharing on Evolving Multi-level Access Structure.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Efficient Shortest Path Routing Algorithms for Distributed XML Processing.
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019

Proposal and Evaluation of a Security Incident Response Training Method using Programming.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Reliable Decentralized Oracle with Mechanisms for Verification and Disputation.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Security and Trust Issues on Digital Supply Chain.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

A Sequential Scheme for Detecting Cyber Attacks in IoT Environment.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Universal Rules for Fooling Deep Neural Networks based Text Classification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation.
Proceedings of the Advanced Information Networking and Applications, 2019

Simulation of Secure Volunteer Computing by Using Blockchain.
Proceedings of the Advanced Information Networking and Applications, 2019

Deniable Secret Handshake Protocol - Revisited.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Light Weight Write Mechanism for Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2018

Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden.
Proceedings of the 2018 IEEE SmartWorld, 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Neural Cryptography Based on the Topology Evolving Neural Networks.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Tracing MIRAI Malware in Networked System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

A New Design for Evaluating Moving Target Defense System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Lightweight Classification of IoT Malware Based on Image Recognition.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Active Attack Against Oblivious RAM.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017

Bitcoin Block Withholding Attack: Analysis and Mitigation.
IEEE Trans. Inf. Forensics Secur., 2017

Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors.
Concurr. Comput. Pract. Exp., 2017

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing.
Comput. Electr. Eng., 2017

Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Evasion Attacks Against Statistical Code Obfuscation Detectors.
Proceedings of the Advances in Information and Computer Security, 2017

How to sign multiple versions of digital documents.
Proceedings of the International Workshop on Big Data and Information Security, 2017

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Improving the accuracy of signature authentication using the eight principles of Yong.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

On unconditionally binding code-based commitment schemes.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

C&C session detection using random forest.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Parameter manipulation attack prevention and detection by using web application deception proxy.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

A proposal of event study methodology with Twitter sentimental analysis for risk management.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Host independent and distributed detection system of the network attack by using OpenFlow.
Proceedings of the 2017 International Conference on Information Networking, 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices.
Secur. Commun. Networks, 2016

Authentication in mobile cloud computing: A survey.
J. Netw. Comput. Appl., 2016

A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016

Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptol. ePrint Arch., 2016

A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Expressive Rating Scheme by Signatures with Predications on Ratees.
Proceedings of the Network and System Security - 10th International Conference, 2016

On the Robustness of Visual Cryptographic Schemes.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools.
Proceedings of the Information Security - 19th International Conference, 2016

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Behavior-Based Method for Detecting DNS Amplification Attacks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Cyberbullying detection using parent-child relationship between comments.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Cross-group Secret Sharing for Secure Cloud Storage Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

A Study of Security Management with Cyber Insurance.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Retricoin: Bitcoin based on compact proofs of retrievability.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

SQL Injection Attack Detection Method Using Expectation Criterion.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015

Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS.
IACR Cryptol. ePrint Arch., 2015

Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security.
IACR Cryptol. ePrint Arch., 2015

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems.
IACR Cryptol. ePrint Arch., 2015

Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptol. ePrint Arch., 2015

A multivariate quadratic challenge toward post-quantum generation cryptography.
ACM Commun. Comput. Algebra, 2015

Plaintext checkable encryption with designated checker.
Adv. Math. Commun., 2015

Evaluation of gamma ray durability of RF tag and application to the radiation environment.
Proceedings of the IEEE International Conference on RFID Technology and Applications, 2015

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Application of NTRU Using Group Rings to Partial Decryption Technique.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015

Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015

Attribute-Based Two-Tier Signatures: Definition and Construction.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

A Multivariate Encryption Scheme with Rainbow.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015

On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Collaborative agglomerative document clustering with limited information disclosure.
Secur. Commun. Networks, 2014

Efficient variant of Rainbow using sparse secret keys.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework.
J. Networks, 2014

Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units.
J. Internet Serv. Inf. Secur., 2014

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search.
IEICE Trans. Inf. Syst., 2014

Security of Multivariate Signature Scheme Using Non-commutative Rings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Trans. Inf. Syst., 2014

An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014

An enhanced audio ownership protection scheme based on visual cryptography.
EURASIP J. Inf. Secur., 2014

Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Evaluation of the Identity and Compatibility of Multi-valued Cells in Two-Dimensional Codes Using Smartphones.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Securing Sensor Networks by Moderating Frequencies.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Evaluation of a Zero-Watermarking-Type Steganography.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Identity-Embedding Method for Decentralized Public-Key Infrastructure.
Proceedings of the Trusted Systems - 6th International Conference, 2014

A Zero-Watermarking-Like Steganography and Potential Applications.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A method of digital rights management based on Bitcoin protocol.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Efficient Variant of Rainbow without Triangular Matrix Representation.
Proceedings of the Information and Communication Technology, 2014

Implementation of Efficient Operations over GF(232) Using Graphics Processing Units.
Proceedings of the Information and Communication Technology, 2014

Privacy-aware cloud-based input method editor.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Towards 'Receipt-Freeness' in Remote Biometric Authentication.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

Attribute-based signatures without pairings via the fiat-shamir paradigm.
Proceedings of the ASIAPKC'14, 2014

A Parameterless Learning Algorithm for Behavior-Based Detection.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Evolution of cooperation in reputation system by group-based scheme.
J. Supercomput., 2013

Reliable workflow scheduling with less resource redundancy.
Parallel Comput., 2013

A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.
J. Inf. Process., 2013

Confidentiality of 2D Code using Infrared with Cell-level Error Correction.
Int. J. Interact. Multim. Artif. Intell., 2013

General Fault Attacks on Multivariate Public Key Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Exploiting reference images for image splicing verification.
Digit. Investig., 2013

Efficient implementation for QUAD stream cipher with GPUs.
Comput. Sci. Inf. Syst., 2013

Botnet command and control based on Short Message Service and human mobility.
Comput. Networks, 2013

Detection of Android API Call Using Logging Mechanism within Android Framework.
Proceedings of the Security and Privacy in Communication Networks, 2013

Multivariate Signature Scheme Using Quadratic Forms.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A proposal for the privacy leakage verification tool for Android application developers.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A variant of rainbow with shorter secret key and faster signature generation.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Upper bound of the length of information embedd in RSA public key efficiently.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Managing Insider Security Threats (MIST 2012 Volume 1).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Security Analysis of Offline E-cash Systems with Malicious Insider.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012

Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Netw. Comput. Appl., 2012

Detecting Information Leakage via a HTTP Request Based on the Edit Distance.
J. Internet Serv. Inf. Secur., 2012

A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

Securing Provenance of Distributed Processes in an Untrusted Environment.
IEICE Trans. Inf. Syst., 2012

DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks.
Comput. Commun., 2012

Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation.
Proceedings of the ACM Symposium on Applied Computing, 2012

Secure Keyword Search Using Bloom Filter with Specified Character Positions.
Proceedings of the Provable Security - 6th International Conference, 2012

An Image Splicing Detection Based on Interpolation Analysis.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012

Image Splicing Verification Based on Pixel-Based Alignment Method.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Information Hiding of Two-dimensional Code by Multi-layer Optical.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Method for Embedding Secret Key Information in RSA Public Key and Its Application.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Cooperatively securing network coding against pollution attacks with incentive mechanism.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.
Proceedings of the International Conference on IT Convergence and Security, 2012

Reducing the Key Size of Rainbow Using Non-commutative Rings.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Differential Fault Analysis of Full LBlock.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

On Revenue Driven Server Management in Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Guest editorial: Trusted computing and communications.
Secur. Commun. Networks, 2011

FineTrust: a fine-grained trust model for peer-to-peer networks.
Secur. Commun. Networks, 2011

Enhancing MISP with Fast Mobile IPv6 Security.
Mob. Inf. Syst., 2011

Enhancing SVO Logic for Mobile IPv6 Security Protocols.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Addressing Insider Threats and Information Leakage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Towards formal analysis of wireless LAN security with MIS protocol.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A SMS-Based Mobile Botnet Using Flooding Algorithm.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Study of Communication Route Selection Considering Route Security.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems.
Proceedings of the Information Security Practice and Experience, 2011

Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks.
Proceedings of the Trusted Systems - Third International Conference, 2011

Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Towards Countermeasure of Insider Threat in Network Security.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Design and Implementation of a Forced Encryption Kernel Module.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

An Efficient Key Generation Method in Audio Zero-Watermarking.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Integrity for the <i>In-flight</i> web page based on a fragile watermarking chain scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Analysis of Existing Privacy-Preserving Protocols in Domain Name System.
IEICE Trans. Inf. Syst., 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Trans. Inf. Syst., 2010

Foreword.
IEICE Trans. Inf. Syst., 2010

Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol.
IEICE Trans. Inf. Syst., 2010

Improved Subset Difference Method with Ternary Tree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Distributed Paillier Cryptosystem without Trusted Dealer.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Behavior Control Based on Dynamic Code Translation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Model-Based Intrusion Detection by Abstract Interpretation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Study of Log File Dispersion Management Method.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Design and Implementation of Document Access Control Model Based on Role and Security Policy.
Proceedings of the Trusted Systems - Second International Conference, 2010

A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010

Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Adaptive and Composable Non-interactive String-Commitment Protocols.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Fault tolerant scheduling with dynamic number of replicas in heterogeneous system.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Modeling and Containment of Search Worms Targeting Web Applications.
Proceedings of the Detection of Intrusions and Malware, 2010

Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Darknet Monitoring on Real-Operated Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Adaptive and Composable Non-committing Encryptions.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
An Enhanced Security Protocol for Fast Mobile IPv6.
IEICE Trans. Inf. Syst., 2009

A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6.
IEICE Trans. Commun., 2009

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Foreword.
IEICE Trans. Inf. Syst., 2009

Modeling Security Bridge Certificate Authority Architecture.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A New Secret Sharing Scheme Based on the Multi-Dealer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Grouping Provenance Information to Improve Efficiency of Access Control.
Proceedings of the Advances in Information Security and Assurance, 2009

Formal Verification for Access Control in Web Information Sharing System.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Intrusion Detection Based on Static Analysis and Stack Walks.
Proceedings of the Advances in Information and Computer Security, 2009

Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Importance of Data Standardization in Privacy-Preserving K-Means Clustering.
Proceedings of the Database Systems for Advanced Applications, 2009

A Signature Scheme Associated with Universal Re-signcryption.
Proceedings of the The Forth International Conference on Availability, 2009

Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets.
Proceedings of the The Forth International Conference on Availability, 2009

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide.
Proceedings of the The Forth International Conference on Availability, 2009

Secrecy Capacity of Wireless LAN.
Proceedings of the The Forth International Conference on Availability, 2009

Security Analysis for P2P Routing Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism.
J. Inf. Process., 2008

Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
J. Comput. Sci. Technol., 2008

Achieving evenhandedness in certified email system for contract signing.
Int. J. Inf. Sec., 2008

Reliable Key Distribution Scheme for Lossy Channels.
IEICE Trans. Inf. Syst., 2008

Toward a Scalable Visualization System for Network Traffic Monitoring.
IEICE Trans. Inf. Syst., 2008

Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Ternary Subset Difference Method and Its Quantitative Analysis.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008

Monitoring Unused IP Addresses on Segments Managed by DHCP.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Intrusion Detection Using Third-Parties Support.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Invalidation of Mailing List Address to Block Spam Mails.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Key Distribution Scheme Using Matched Filter Resistant against DoS Attack.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Actual Condition and Issues for Mobile Security System.
J. Inf. Process. Syst., 2007

On Effectiveness of Clock Control in Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Efficient verifier-based password-authenticated key exchange in the three-party setting.
Comput. Stand. Interfaces, 2007

On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

An Approach of Trusted Program Generation for User-Responsible Privacy.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network.
Proceedings of the Theory and Applications of Models of Computation, 2007

K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007

Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Analysis of Privacy Disclosure in DNS Query.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Approach of Program Analysis Prevention for Information Protection.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Induction and Implementation of Security Requirements in Each System Block.
Proceedings of the Advances in Multimedia Modeling, 2007

Enforcement of Integrated Security Policy in Trusted Operating Systems.
Proceedings of the Advances in Information and Computer Security, 2007

A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2007

Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Bot Detection Based on Traffic Analysis.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

K2 Stream Cipher.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

A Practical Proxy Device for Protecting RFID Tag's Identifier.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider.
Inf. Media Technol., 2006

Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Password-Authenticated Multi-Party Key Exchange with Different Passwords.
IACR Cryptol. ePrint Arch., 2006

Interactively combining 2D and 3D visualization for network traffic monitoring.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Enhanced Privacy in Key-Exchange Protocols by One-time ID.
Proceedings of the Second International Workshop on Security, 2006

Off-line verification of one-time ID in distributed environment.
Proceedings of the 2006 International Conference on Privacy, 2006

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i.
Proceedings of the 3rd international conference on Mobile technology, 2006

Actively Modifying Control Flow of Program for Efficient Anormaly Detection.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Ciphertext-Auditable Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2006

Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006

Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
Proceedings of the Computational Science, 2006

A Proactive Secret Sharing for Server Assisted Threshold Signatures.
Proceedings of the High Performance Computing and Communications, 2006

Distributing Security-Mediated PKI Revisited.
Proceedings of the Public Key Infrastructure, 2006

An RFID System Based MCLT System with Improved Privacy.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Proposal of One-Time Biometric Authentication.
Proceedings of the 2006 International Conference on Security & Management, 2006

A Framework for the User-Oriented Personal Information Protection.
Proceedings of the 2006 International Conference on Security & Management, 2006

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.
Proceedings of the Communications and Multimedia Security, 2006

Application and Evaluation of Bayesian Filter for Chinese Spam.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

An Intrusion Detection System using Alteration of Data.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Side Channel Cryptanalysis on XTR Public Key Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005

A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository.
Proceedings of the Applied Public Key Infrastructure, 2005

Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Group key distribution scheme for reducing required rekey message size.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

The Improved Risk Analysis Mechanism in the Practical Risk Analysis System.
Proceedings of the Information Networking, 2005

Some Remarks on Security of Receipt-Free E-auction.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An Evenhanded Certified Email System for Contract Signing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Reassignment Scheme of an RFID Tag's Key for Owner Transfer.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Grouping Proof for RFID Tags.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Trends and Issues for Security of Home-Network Based on Power Line Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Analysis and Design for Private Message Board Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.
IACR Cryptol. ePrint Arch., 2004

On security of XTR public key cryptosystems against Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2004

A Probabilistic Method for Detecting Anomalous Program Behavior.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Key-Exchange Protocol Using Pre-agreed Session-ID.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Distributed Online Certificate Status Protocol with a Single Public Key.
Proceedings of the Public Key Cryptography, 2004

A DRM Framework for Secure Distribution of Mobile Contents.
Proceedings of the Information Networking, 2004

On the Pseudorandomness of a Modification of KASUMI Type Permutations.
Proceedings of the Information Security and Cryptology, 2004

Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Design of Intrusion Detection System at User Level with System-Call Interposing.
Proceedings of the ICETE 2004, 2004

Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation.
Proceedings of the Public Key Infrastructure, 2004

Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags.
Proceedings of the Embedded and Ubiquitous Computing, 2004

A New Attack with Side Channel Leakage During Exponent Recoding Computations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

A Merging Method of Certification Authorities Without Using Cross-Certifications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Pseudorandomness of SPN-Type Transformations.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Certified E-mail Systems Using Public Notice Board.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.
Proceedings of the Applied Cryptography and Network Security, 2003

Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Speeding Up Elliptic Scalar Multiplication Using Multidoubling.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Scalar Multiplication Algorithm with Recovery of the <i>y</i>-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.
Proceedings of the Selected Areas in Cryptography, 2002

New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.
Proceedings of the Public Key Cryptography, 2002

Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Proceedings of the Information Security, 5th International Conference, 2002

A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.
Proceedings of the Information Security, 5th International Conference, 2002

A Certified E-mail System with Receiver's Selective Usage of Delivery Authority.
Proceedings of the Progress in Cryptology, 2002

A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem.
Proceedings of the Information Security and Cryptology, 2002

Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

On the Security of a Modified Paillier Public-Key Primitive.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
English vs. Sealed Bid in Anonymous Electronic Auction Protocols.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
Proceedings of the Information Security and Cryptology, 2001

Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.
Proceedings of the Information Security and Cryptology, 2001

An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Proceedings of the Information Security and Cryptology, 2001

Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
On zero-knowledge proofs (extended abstract): "from membership to decision".
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.
Proceedings of the Public Key Cryptography, 2000

Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes.
Proceedings of the Public Key Cryptography, 2000

Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack.
Proceedings of the Progress in Cryptology, 2000

An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
J. Cryptol., 1999

Toward Fair International Key Escrow.
Proceedings of the Public Key Cryptography, 1999

A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Cryptology, 1999

On Threshold RSA-Signing with no Dealer.
Proceedings of the Information Security and Cryptology, 1999

1998
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems.
J. Cryptol., 1998

An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy.
Inf. Process. Lett., 1998

Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998

Secure Hyperelliptic Cryptosystems and Their Performances.
Proceedings of the Public Key Cryptography, 1998

Security Issues for Contactless Smart Cards.
Proceedings of the Public Key Cryptography, 1998

Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998

A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem.
Proceedings of the Financial Cryptography, 1998

Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F<sub>2</sub>n.
Proceedings of the Advances in Cryptology, 1998

1997
Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages.
Theor. Comput. Sci., 1997

A Key Escrow System with Protecting User's Privacy by Blind Decoding.
Proceedings of the Information Security, First International Workshop, 1997

On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

On weak RSA-keys produced from Pretty Good Privacy.
Proceedings of the Information and Communication Security, First International Conference, 1997

Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
Proceedings of the Information and Communication Security, First International Conference, 1997

Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Protection of Data and Delegated Keys in Digital Distribution.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games.
Inf. Process. Lett., 1996

Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract).
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

A Progress Report on Subliminal-Free Channels.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract).
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes.
Proceedings of the Advances in Cryptology, 1996

How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
Proceedings of the Advances in Cryptology, 1996

1995
Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems.
Proceedings of the Advances in Cryptology, 1995

On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract).
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1992
How Intractable Is the Discrete Logarithm for a General Finite Group?
Proceedings of the Advances in Cryptology, 1992

On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

On Bit Correlations Among Preimages of "Many to One" One-Way Functions.
Proceedings of the Advances in Cryptology, 1992

Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes.
Proceedings of the Advances in Cryptology, 1992

1991
On the Complexity of Hyperelliptic Discrete Logarithm Problem.
Proceedings of the Advances in Cryptology, 1991

Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.
Proceedings of the Advances in Cryptology, 1991

4 Move Perfect ZKIP of Knowledge with No Assumption.
Proceedings of the Advances in Cryptology, 1991

Any Language in IP Has a Divertable ZKIP.
Proceedings of the Advances in Cryptology, 1991

On the Complexity of Constant Round ZKIP of Possession of Knowledge.
Proceedings of the Advances in Cryptology, 1991


  Loading...