


Остановите войну!
for scientists:
Kouichi Sakurai
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j104]Jong-Yeon Park
, Yong-Hyuk Moon
, Won-Il Lee, Sung-Hyun Kim, Kouichi Sakurai
:
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100. IEEE Access 10: 2546-2563 (2022) - [j103]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j102]Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. IEICE Trans. Inf. Syst. 105(2): 195-204 (2022) - [j101]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing. J. Inf. Secur. Appl. 66: 103127 (2022) - [c333]Misni Harjo Suwito, Bayu Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. AsiaCCS 2022: 1213-1215 - [c332]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [e8]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - [i22]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Information-theoretic Security of Combinatorial All-or-nothing Transforms. CoRR abs/2202.10280 (2022) - 2021
- [j100]Haibo Zhang
, Kouichi Sakurai
:
A Survey of Software Clone Detection From Security Perspective. IEEE Access 9: 48157-48173 (2021) - [j99]Ishak Meraouche
, Sabyasachi Dutta
, Haowen Tan
, Kouichi Sakurai
:
Neural Networks-Based Cryptography: A Survey. IEEE Access 9: 124727-124740 (2021) - [j98]Haibo Zhang
, Kouichi Sakurai
:
Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. IEEE Access 9: 169031-169043 (2021) - [j97]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Kouichi Sakurai:
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. Theor. Comput. Sci. 891: 131-148 (2021) - [j96]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021) - [c331]Laltu Sardar, Gaurav Bansal, Sushmita Ruj, Kouichi Sakurai:
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data. COMSNETS 2021: 465-473 - [c330]Xiaojuan Cai, Yaokai Feng, Kouichi Sakurai:
Sequential Detection of Cyber-attacks Using a Classification Filter. DASC/PiCom/CBDCom/CyberSciTech 2021: 659-666 - [c329]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Perpetual Secret Sharing from Dynamic Data Structures. DSC 2021: 1-8 - [c328]Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. DSC 2021: 1-8 - [c327]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. CANDAR 2021: 38-47 - [c326]Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. CANDAR (Workshops) 2021: 473-477 - [c325]Tao Wang, Yaokai Feng, Kouichi Sakurai:
Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding. IMCOM 2021: 1-7 - [i21]Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai:
Evolution of Bulletin Board & its application to E-Voting - A Survey. IACR Cryptol. ePrint Arch. 2021: 47 (2021) - [i20]Shohei Satake, Yujie Gu, Kouichi Sakurai:
Graph-Based Construction for Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2021: 164 (2021) - [i19]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. IACR Cryptol. ePrint Arch. 2021: 276 (2021) - [i18]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. IACR Cryptol. ePrint Arch. 2021: 618 (2021) - 2020
- [j95]Zhao Hao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks. Int. J. Netw. Comput. 10(2): 213-226 (2020) - [j94]Yan Naung Soe
, Yaokai Feng, Paulus Insap Santosa
, Rudy Hartanto, Kouichi Sakurai:
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20(16): 4372 (2020) - [c324]Kosuke Kaneko, Ke Yan, Kouichi Sakurai:
Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract. CISIS 2020: 199-209 - [c323]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - [c322]Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. EIDWT 2020: 334-341 - [c321]Haibo Zhang, Kouichi Sakurai:
Blockchain for IoT-Based Digital Supply Chain: A Survey. EIDWT 2020: 564-573 - [c320]Shilei Cao, Kouichi Sakurai:
Face completion with pyramid semantic attention and latent codes. CANDAR 2020: 1-8 - [c319]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c318]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. NSS 2020: 292-308 - [c317]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. WISA 2020: 89-100 - [e7]Guojun Wang, Zhong Fan, Md. Zakirul Alam Bhuiyan, Kouichi Sakurai:
8th IEEE International Conference on Smart City and Informatization, iSCI 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0394-8 [contents] - [i17]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2020: 719 (2020)
2010 – 2019
- 2019
- [j93]Mosarrat Jahan
, Suranga Seneviratne, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha
:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j92]Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. Int. J. Netw. Comput. 9(2): 188-200 (2019) - [j91]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11: 1 (2019) - [j90]Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng
, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. J. Inf. Secur. Appl. 45: 10-19 (2019) - [j89]Jiawei Su
, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 23(5): 828-841 (2019) - [c316]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. AINA 2019: 458-469 - [c315]Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. AINA 2019: 883-894 - [c314]Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. AINA 2019: 1266-1278 - [c313]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CEC 2019: 2221-2228 - [c312]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. DASC/PiCom/DataCom/CyberSciTech 2019: 238-244 - [c311]Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. DASC/PiCom/DataCom/CyberSciTech 2019: 338-343 - [c310]Rui Qiu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating. CANDAR Workshops 2019: 169-175 - [c309]Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. CANDAR 2019: 239-244 - [c308]Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Reliable Decentralized Oracle with Mechanisms for Verification and Disputation. CANDAR Workshops 2019: 346-352 - [c307]Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - [c306]Sabyasachi Dutta, Kouichi Sakurai:
Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability - Revisited. ICMC 2019: 97-109 - [c305]Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai:
Proposal and Evaluation of a Security Incident Response Training Method using Programming. SIGITE 2019: 165 - [c304]Longjian Ye, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai:
Efficient Shortest Path Routing Algorithms for Distributed XML Processing. WEBIST 2019: 265-272 - [c303]Sabyasachi Dutta, Partha Sarathi Roy
, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i16]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CoRR abs/1901.07132 (2019) - [i15]Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. IACR Cryptol. ePrint Arch. 2019: 323 (2019) - [i14]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares. IACR Cryptol. ePrint Arch. 2019: 1428 (2019) - [i13]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Secret Sharing Schemes : A Fine Grained Analysis. IACR Cryptol. ePrint Arch. 2019: 1429 (2019) - 2018
- [j88]Mosarrat Jahan
, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay K. Jha
:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - [c302]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c301]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - [c300]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. COMPSAC (2) 2018: 664-669 - [c299]Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai:
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks. DASC/PiCom/DataCom/CyberSciTech 2018: 173-180 - [c298]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. CANDAR Workshops 2018: 223-227 - [c297]Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai:
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding. CANDAR Workshops 2018: 417-423 - [c296]Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Neural Cryptography Based on the Topology Evolving Neural Networks. CANDAR Workshops 2018: 472-478 - [c295]Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. CANDAR Workshops 2018: 524-528 - [c294]Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. CANDAR Workshops 2018: 534-538 - [c293]Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. CANDAR Workshops 2018: 561-563 - [c292]Jyotirmoy Pramanik
, Partha Sarathi Roy
, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018: 171-188 - [c291]Partha Sarathi Roy
, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [c290]Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai:
Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 257-262 - [e6]Satya V. Lokam, Sushmita Ruj, Kouichi Sakurai:
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June 4, 2018. ACM 2018 [contents] - [e5]Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh:
Mathematics and Computing - 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers. Communications in Computer and Information Science 834, Springer 2018, ISBN 978-981-13-0022-6 [contents] - [i12]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware based on Image Recognition. CoRR abs/1802.03714 (2018) - [i11]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking Convolutional Neural Network using Differential Evolution. CoRR abs/1804.07062 (2018) - 2017
- [j87]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57: 241-256 (2017) - [j86]Pinaki Sarkar, Morshed Uddin Chowdhury
, Kouichi Sakurai:
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j85]Samiran Bag
, Sushmita Ruj, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans. Inf. Forensics Secur. 12(8): 1967-1978 (2017) - [j84]Hiroaki Anada
, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai:
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions. J. Supercomput. 73(10): 4275-4301 (2017) - [c289]Xiang You, Yaokai Feng, Kouichi Sakurai:
Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow. CANDAR 2017: 522-528 - [c288]Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking. CANDAR 2017: 533-536 - [c287]Mojtaba Alizadeh
, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani
, Akram M. Zeki
, Shehzad Ashraf Chaudhry
, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - [c286]Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai:
Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 - [c285]Tomohisa Ishikawa, Kouichi Sakurai:
A proposal of event study methodology with Twitter sentimental analysis for risk management. IMCOM 2017: 14 - [c284]Taku Nishigori, Junpei Kawamoto, Kouichi Sakurai:
Improving the accuracy of signature authentication using the eight principles of Yong. IMCOM 2017: 32 - [c283]Liang Lu, Yaokai Feng, Kouichi Sakurai:
C&C session detection using random forest. IMCOM 2017: 34 - [c282]Tomohisa Ishikawa, Kouichi Sakurai:
Parameter manipulation attack prevention and detection by using web application deception proxy. IMCOM 2017: 74 - [c281]Kirill Morozov, Partha Sarathi Roy
, Kouichi Sakurai:
On unconditionally binding code-based commitment schemes. IMCOM 2017: 101 - [c280]Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. IML 2017: 35:1-35:8 - [c279]Kouichi Sakurai, Takashi Nishide, Amril Syalim:
Improved proxy re-encryption scheme for symmetric key cryptography. IWBIS 2017: 105-111 - [c278]Amril Syalim, Kouichi Sakurai:
How to sign multiple versions of digital documents. IWBIS 2017: 133-136 - [c277]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Evasion Attacks Against Statistical Code Obfuscation Detectors. IWSEC 2017: 121-137 - [c276]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation. SpaCCS 2017: 461-473 - [c275]Mosarrat Jahan, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay Jha
:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. TrustCom/BigDataSE/ICESS 2017: 201-209 - [i10]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One pixel attack for fooling deep neural networks. CoRR abs/1710.08864 (2017) - 2016
- [j83]Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints. J. Internet Serv. Inf. Secur. 6(2): 23-36 (2016) - [j82]Mojtaba Alizadeh
, Saeid Abolfazli
, Mazdak Zamani
, Sabariah Baharun, Kouichi Sakurai:
Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 61: 59-80 (2016) - [j81]Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. Secur. Commun. Networks 9(12): 1717-1725 (2016) - [c274]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage. CIT 2016: 524-531 - [c273]Yoshifumi Ueshige, Kouichi Sakurai:
Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols. AINA 2016: 769-775 - [c272]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing. AsiaJCIS 2016: 39-47 - [c271]Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation. AsiaJCIS 2016: 80-86 - [c270]Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. BWCCA 2016: 231-242 - [c269]Linghuan Xiao, Shinichi Matsumoto, Tomohisa Ishikawa, Kouichi Sakurai:
SQL Injection Attack Detection Method Using Expectation Criterion. CANDAR 2016: 649-654 - [c268]Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. ICDCN 2016: 14:1-14:10 - [c267]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy
, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. ICITS 2016: 3-23 - [c266]Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai:
Cross-group Secret Sharing for Secure Cloud Storage Service. IMCOM 2016: 63:1-63:8 - [c265]Tomohisa Ishikawa, Kouichi Sakurai:
A Study of Security Management with Cyber Insurance. IMCOM 2016: 68:1-68:6 - [c264]Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai:
Cyberbullying detection using parent-child relationship between comments. iiWAS 2016: 325-334 - [c263]Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. IMIS 2016: 603-607 - [c262]Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Behavior-Based Method for Detecting DNS Amplification Attacks. IMIS 2016: 608-613 - [c261]Samiran Bag, Kouichi Sakurai:
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. ISC 2016: 167-180 - [c260]Sabyasachi Dutta, Partha Sarathi Roy
, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. IWDW 2016: 251-262 - [c259]Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai:
Expressive Rating Scheme by Signatures with Predications on Ratees. NSS 2016: 363-379 - [c258]Junzuo Lai, Robert H. Deng
, Changshe Ma