


Остановите войну!
for scientists:


default search action
Kouichi Sakurai
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j111]Surbhi Soni
, Ayan Seal
, Sraban Kumar Mohanty, Kouichi Sakurai:
Electroencephalography signals-based sparse networks integration using a fuzzy ensemble technique for depression detection. Biomed. Signal Process. Control. 85: 104873 (2023) - [j110]Rodrigo Roman, Cristina Alcaraz
, Javier López, Kouichi Sakurai
:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. IEEE Secur. Priv. 21(4): 29-38 (2023) - [j109]Yang Lyu, Yaokai Feng
, Kouichi Sakurai:
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection. Inf. 14(3): 191 (2023) - [j108]Haibo Zhang
, Toru Nakamura, Takamasa Isohara, Kouichi Sakurai:
A Review on Machine Unlearning. SN Comput. Sci. 4(4): 337 (2023) - [c344]Muyuan Niu, Yaokai Feng, Kouichi Sakurai:
A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds. IMCOM 2023: 1-8 - [c343]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. NSS 2023: 155-176 - 2022
- [j107]Jong-Yeon Park
, Yong-Hyuk Moon
, Won-Il Lee, Sung-Hyun Kim, Kouichi Sakurai
:
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100. IEEE Access 10: 2546-2563 (2022) - [j106]Ishak Meraouche
, Sabyasachi Dutta
, Sraban Kumar Mohanty
, Isaac Agudo
, Kouichi Sakurai
:
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing. IEEE Access 10: 121329-121339 (2022) - [j105]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j104]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. Cryptogr. 6(2): 20 (2022) - [j103]Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. IEICE Trans. Inf. Syst. 105-D(2): 195-204 (2022) - [j102]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
Handling class Imbalance problem in Intrusion Detection System based on deep learning. Int. J. Netw. Comput. 12(2): 467-492 (2022) - [j101]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing. J. Inf. Secur. Appl. 66: 103127 (2022) - [j100]Yujie Gu
, Sonata Akao, Navid Nasr Esfahani
, Ying Miao
, Kouichi Sakurai
:
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms. IEEE Trans. Inf. Theory 68(10): 6904-6914 (2022) - [c342]Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. AsiaCCS 2022: 1213-1215 - [c341]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [c340]Kevin I-Kai Wang, Xiaozhou Ye, Kouichi Sakurai:
Federated Learning with Clustering-Based Participant Selection for IoT Applications. IEEE Big Data 2022: 6830-6831 - [c339]Kaito Taguchi, Kouichi Sakurai, Masahiro Iida:
Towards the Design of Locally Differential Private Hardware System for Edge Computing. CANDAR 2022: 186-191 - [c338]Ikebe Kei, Kouichi Sakurai:
Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining. CANDARW 2022: 380-383 - [c337]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Security Properties of Combinatorial All-or-nothing Transforms. ISIT 2022: 1447-1452 - [c336]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities. ISPEC 2022: 554-572 - [c335]Shohei Satake
, Yujie Gu, Kouichi Sakurai:
Explicit Non-malleable Codes from Bipartite Graphs. WAIFI 2022: 221-236 - [c334]Issei Murata, Pengju He, Yujie Gu, Kouichi Sakurai:
Towards Evaluating the Security of Human Computable Passwords Using Neural Networks. WISA 2022: 303-312 - [e9]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - [e8]Chunhua Su
, Kouichi Sakurai, Feng Liu:
Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13580, Springer 2022, ISBN 978-3-031-17550-3 [contents] - [i20]Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai:
On the Information-theoretic Security of Combinatorial All-or-nothing Transforms. CoRR abs/2202.10280 (2022) - 2021
- [j99]Haibo Zhang
, Kouichi Sakurai
:
A Survey of Software Clone Detection From Security Perspective. IEEE Access 9: 48157-48173 (2021) - [j98]Ishak Meraouche
, Sabyasachi Dutta
, Haowen Tan
, Kouichi Sakurai
:
Neural Networks-Based Cryptography: A Survey. IEEE Access 9: 124727-124740 (2021) - [j97]Haibo Zhang
, Kouichi Sakurai
:
Conditional Generative Adversarial Network-Based Image Denoising for Defending Against Adversarial Attack. IEEE Access 9: 169031-169043 (2021) - [j96]Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Kouichi Sakurai:
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. Theor. Comput. Sci. 891: 131-148 (2021) - [j95]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei
:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. ACM Trans. Internet Techn. 21(4): 82:1-82:16 (2021) - [c333]Laltu Sardar, Gaurav Bansal, Sushmita Ruj, Kouichi Sakurai:
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data. COMSNETS 2021: 465-473 - [c332]Xiaojuan Cai, Yaokai Feng, Kouichi Sakurai:
Sequential Detection of Cyber-attacks Using a Classification Filter. DASC/PiCom/CBDCom/CyberSciTech 2021: 659-666 - [c331]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Perpetual Secret Sharing from Dynamic Data Structures. DSC 2021: 1-8 - [c330]Sumit Kumar Debnath, Kouichi Sakurai, Kunal Dey, Nibedita Kundu:
Secure Outsourced Private Set Intersection with Linear Complexity. DSC 2021: 1-8 - [c329]Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. DSC 2021: 1-8 - [c328]Mariama Mbow, Hiroshi Koide, Kouichi Sakurai:
An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. CANDAR 2021: 38-47 - [c327]Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. CANDAR (Workshops) 2021: 473-477 - [c326]Tao Wang, Yaokai Feng, Kouichi Sakurai:
Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding. IMCOM 2021: 1-7 - [i19]Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai:
Evolution of Bulletin Board & its application to E-Voting - A Survey. IACR Cryptol. ePrint Arch. 2021: 47 (2021) - [i18]Shohei Satake, Yujie Gu, Kouichi Sakurai:
Graph-Based Construction for Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2021: 164 (2021) - [i17]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. IACR Cryptol. ePrint Arch. 2021: 276 (2021) - [i16]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. IACR Cryptol. ePrint Arch. 2021: 618 (2021) - 2020
- [j94]Zhao Hao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks. Int. J. Netw. Comput. 10(2): 213-226 (2020) - [j93]Yan Naung Soe
, Yaokai Feng, Paulus Insap Santosa
, Rudy Hartanto, Kouichi Sakurai:
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20(16): 4372 (2020) - [c325]Kosuke Kaneko, Ke Yan, Kouichi Sakurai:
Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract. CISIS 2020: 199-209 - [c324]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - [c323]Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. EIDWT 2020: 334-341 - [c322]Haibo Zhang, Kouichi Sakurai:
Blockchain for IoT-Based Digital Supply Chain: A Survey. EIDWT 2020: 564-573 - [c321]Shilei Cao, Kouichi Sakurai:
Face completion with pyramid semantic attention and latent codes. CANDAR 2020: 1-8 - [c320]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj
, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c319]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. NSS 2020: 292-308 - [c318]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. WISA 2020: 89-100 - [e7]Guojun Wang, Zhong Fan, Md. Zakirul Alam Bhuiyan, Kouichi Sakurai:
8th IEEE International Conference on Smart City and Informatization, iSCI 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0394-8 [contents] - [i15]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2020: 719 (2020)
2010 – 2019
- 2019
- [j92]Mosarrat Jahan
, Suranga Seneviratne, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha
:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j91]Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. Int. J. Netw. Comput. 9(2): 188-200 (2019) - [j90]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11: 1 (2019) - [j89]Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng
, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. J. Inf. Secur. Appl. 45: 10-19 (2019) - [j88]Jiawei Su
, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 23(5): 828-841 (2019) - [c317]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa
, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. AINA 2019: 458-469 - [c316]Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. AINA 2019: 883-894 - [c315]Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. AINA 2019: 1266-1278 - [c314]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CEC 2019: 2221-2228 - [c313]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa
, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. DASC/PiCom/DataCom/CyberSciTech 2019: 238-244 - [c312]Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. DASC/PiCom/DataCom/CyberSciTech 2019: 338-343 - [c311]Rui Qiu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating. CANDAR Workshops 2019: 169-175 - [c310]Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. CANDAR 2019: 239-244 - [c309]Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Reliable Decentralized Oracle with Mechanisms for Verification and Disputation. CANDAR Workshops 2019: 346-352 - [c308]Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - [c307]Sabyasachi Dutta, Kouichi Sakurai:
Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability - Revisited. ICMC 2019: 97-109 - [c306]Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai:
Proposal and Evaluation of a Security Incident Response Training Method using Programming. SIGITE 2019: 165 - [c305]Longjian Ye, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai:
Efficient Shortest Path Routing Algorithms for Distributed XML Processing. WEBIST 2019: 265-272 - [c304]Sabyasachi Dutta, Partha Sarathi Roy
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i14]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CoRR abs/1901.07132 (2019) - [i13]Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. IACR Cryptol. ePrint Arch. 2019: 323 (2019) - 2018
- [j87]Mosarrat Jahan
, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay K. Jha
:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - [c303]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c302]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - [c301]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. COMPSAC (2) 2018: 664-669 - [c300]Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai:
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks. DASC/PiCom/DataCom/CyberSciTech 2018: 173-180 - [c299]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. CANDAR Workshops 2018: 223-227 - [c298]Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai:
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding. CANDAR Workshops 2018: 417-423 - [c297]Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Neural Cryptography Based on the Topology Evolving Neural Networks. CANDAR Workshops 2018: 472-478 - [c296]Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. CANDAR Workshops 2018: 524-528 - [c295]Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. CANDAR Workshops 2018: 534-538 - [c294]Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. CANDAR Workshops 2018: 561-563 - [c293]Jyotirmoy Pramanik
, Partha Sarathi Roy
, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018: 171-188 - [c292]Partha Sarathi Roy
, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [c291]Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai:
Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 257-262 - [e6]Satya V. Lokam, Sushmita Ruj, Kouichi Sakurai:
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June 4, 2018. ACM 2018 [contents] - [e5]Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh:
Mathematics and Computing - 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers. Communications in Computer and Information Science 834, Springer 2018, ISBN 978-981-13-0022-6 [contents] - [i12]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware based on Image Recognition. CoRR abs/1802.03714 (2018) - [i11]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking Convolutional Neural Network using Differential Evolution. CoRR abs/1804.07062 (2018) - 2017
- [j86]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57: 241-256 (2017) - [j85]Pinaki Sarkar, Morshed Uddin Chowdhury
, Kouichi Sakurai:
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j84]Samiran Bag
, Sushmita Ruj
, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans. Inf. Forensics Secur. 12(8): 1967-1978 (2017) - [j83]Hiroaki Anada
, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai:
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions. J. Supercomput. 73(10): 4275-4301 (2017) - [c290]Xiang You, Yaokai Feng, Kouichi Sakurai:
Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow. CANDAR 2017: 522-528 - [c289]Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking. CANDAR 2017: 533-536 - [c288]Mojtaba Alizadeh
, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani
, Akram M. Zeki
, Shehzad Ashraf Chaudhry
, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - [c287]Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai:
Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 - [c286]Tomohisa Ishikawa, Kouichi Sakurai:
A proposal of event study methodology with Twitter sentimental analysis for risk management. IMCOM 2017: 14 - [c285]Taku Nishigori, Junpei Kawamoto, Kouichi Sakurai:
Improving the accuracy of signature authentication using the eight principles of Yong. IMCOM 2017: 32 - [c284]Liang Lu, Yaokai Feng, Kouichi Sakurai:
C&C session detection using random forest. IMCOM 2017: 34 - [c283]Tomohisa Ishikawa, Kouichi Sakurai:
Parameter manipulation attack prevention and detection by using web application deception proxy. IMCOM 2017: 74 - [c282]Kirill Morozov, Partha Sarathi Roy
, Kouichi Sakurai:
On unconditionally binding code-based commitment schemes. IMCOM 2017: 101 - [c281]Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. IML 2017: 35:1-35:8 - [c280]Kouichi Sakurai, Takashi Nishide, Amril Syalim:
Improved proxy re-encryption scheme for symmetric key cryptography. IWBIS 2017: 105-111 - [c279]Amril Syalim, Kouichi Sakurai:
How to sign multiple versions of digital documents. IWBIS 2017: 133-136 - [c278]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Evasion Attacks Against Statistical Code Obfuscation Detectors. IWSEC 2017: 121-137 - [c277]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation. SpaCCS 2017: 461-473 - [c276]Mosarrat Jahan, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay Jha
:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. TrustCom/BigDataSE/ICESS 2017: 201-209 - [i10]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One pixel attack for fooling deep neural networks. CoRR abs/1710.08864 (2017) - 2016
- [j82]