• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

SAKURAI Kouichi  櫻井 幸一

ORCIDConnect your ORCID iD *help
… Alternative Names

桜井 幸一  サクライ コウイチ

Less
Researcher Number 60264066
Other IDs
External Links
Affiliation (Current) 2025: 九州大学, システム情報科学研究院, 教授
Affiliation (based on the past Project Information) *help 2016 – 2024: 九州大学, システム情報科学研究院, 教授
2016: 九州大学, 大学院システム情報科学府, 教授
2015: 九州大学, システム情報科学研究科, 教授
2011 – 2015: 九州大学, システム情報科学研究科(研究院, 教授
2014: 九州大学, システム情報科学研究院, 教授 … More
2014: 九州大学, 大学院システム情報科学研究院, 教授
2003 – 2012: 九州大学, システム情報科学研究院, 教授
2011: 九州大学, 大学院・システム情報科学研究院, 教授
2007 – 2009: Kyushu University, 大学院・システム情報科学研究院, 教授
2006: (財)九州システム情報技術研究所, 第2研究室, 研究室長
2005 – 2006: 九州大学, 大学院システム情報科学研究院, 教授
2002 – 2006: 九州大学, システムLSI研究センター, 教授
2002 – 2005: Kyushu University, Graduate School of Information Science and Electrical Engineering, professor, 大学院・システム情報科学研究院, 教授
2001: Kyushu Univ. Dept. Computer Science, Associate Prof., システム情報科学研究院, 助教授
2000 – 2001: 九州大学, 大学院・システム情報科学研究院, 助教授
1999 – 2000: 九州大学, 工学部, 助教授
1999: Kyushu Univ., Dept. of Comp. Sci. & Eng., Associate Professor, 大学院・システム情報科学研究科, 助教授
1998 – 1999: 九州大学, システム情報科学研究科, 助教授
1998: 九州大学, 大学院システム情報科学研究科, 助教授
1996 – 1997: Department of Computer Science and Communication Engineering, Associate Professo, 大学院・システム情報科学研究科, 助教授
1995: 九州大学, 工学部, 助教授 Less
Review Section/Research Field
Principal Investigator
計算機科学 / Fundamental theory of informatics / Science and Engineering / Basic Section 60070:Information security-related / Basic Section 60070:Information security-related / Information security / Theory of informatics / Computer system/Network
Except Principal Investigator
情報通信工学 / Basic Section 60070:Information security-related … More / 計算機科学 / Information security / Computer system/Network / Fundamental theory of informatics / Science and Engineering / General mathematics (including Probability theory/Statistical mathematics) / Basic Section 21020:Communication and network engineering-related / Basic Section 60060:Information network-related / General mathematics (including Probability theory/Statistical mathematics) Less
Keywords
Principal Investigator
暗号 / 情報セキュリティ / 公開鍵暗号 / 認証 / アルゴリズム / 暗号理論 / 暗号プロトコル / 情報システム / 証明可能安全性 / RSA暗号 … More / ブロックチェーン / 分散計算 / プライバシー保護 / 情報基礎 / 数理工学 / 暗号・認証等 / 匿名性 / 電子署名 / 計算量理論 / ゼロ知識証明 / ビットコイン / 仮想通貨 / Cryptography / algorithm / information security / public-key encryption / 分散暗号 / ハッシュ関数 / 楕円暗号 / 安全性評価 / セキュア・ネットワーク / ネットワークセキュリティ / 電力解析 / 実装攻撃 / 楕円曲線暗号 / 暗号認証等 / 電子透かし / 個人情報保護 / プライバシー / セキュリティ / インターネット投票 / メッセージ回復型署名 / 秘密鍵暗号 / RSA / 離散対数問題 / 通信プロトコル / 公開掲示板 / 分散システム / サイバーセキュリティ / 強制耐性 / 領収書なし / 投票ブース / 無証拠性 / 電子投票 / データベース / 仮想通過 / 暗号資産 / 暗号ハッシュ関数 / 耐量子暗号 / デジタル通貨 / 暗号仮想通貨 / 分散データベース / 匿名通信 / グラフクリーク問題 / 一方向性ハッシュ関数 / マイニング / 計算困難性 / デペンダブル・コンピューテング / 著作権・コンテンツ保護 / 暗号通過 / ネットワーク / FinTech / 公開台帳 / 暗号通貨 / 認証基盤 / グラフ問題 / IDベース暗号 / Information System / Mathematical Engineering / Basic Information / Algorithms / 高速実装 / 実装解析 / サイドチャネル攻撃 / XTR / 離散対数 / Public-Key Cryptography / Anonymity / Distributed Cryptography / Privacy Protection / Electronic Auction / Electronic Money / Information Security / 公開鍵暗号技術 / 電子入札 / 電子マネー / fast computation / elliptic curve / cryptanalysis / hyperelliptic curve / cryptography / 梗塞演算 / モンゴメリー型 / 高速演算 / 暗号解読 / 超楕円曲線 / lattice-based cryptosystems / elliptic-curve / computational complexity / number theory / digital signature / 素因数分解 / LCCアルゴリズム / NP困難性 / 格子問題 / 公開カギ暗号 / ユークリッド法 / 秘密分散 / 閾値暗号 / 格子 / 格子暗号 / 数論 / RSA暗号 / 確率検証証明 / Fiat-Shamir変換技法 / 属性情報ベース電子署名 / 確率検査証明 / Diffie-Hellmann問題 / 擬似乱数生成 / Deffie-Hellmann問題 / 堅固性 / Diffie-Hellmann 問題 / 計算理論 / 疑似乱数生成 / 一方向性関数 / コンピュータセキュリティ / 内部攻撃 / ゲーム理論 / サイバー攻撃 / ネットワークセキュティ / 電子現金 / システムセキュリティ / 暗号・認証 / 情報漏洩対策 / 内部脅威 / プライバシ / 普遍安全性 / 安全性検証 / データマイニング / 高信頼性ネットワーク / フィッシング対策 / コンピュータ犯罪 / 情報セキュリティワーク / ウエブセキュリティ / プロトコル / ID情報管理 / インターネット詐欺 / 剰余算 / unifiod code / メルセンヌ素数 / 暗号、認証等 / パスワード / 様相論理 / 公開鍵認証基盤 / 鍵交換 / ソフトウエア工学 / 著作権保護 / 静的解析 / 乱数 / クラスファイル / オブジェクト指向言語 / JAVA / プログラム / 難読化 / 認証方式 / 双対性原理 / 署名 / 電子選挙 / PGP / 楕円曲線 / 計算複雑性 / 因数分解問題 / 有限体演算 / ヤコビアン群 / だ円暗号 / 数論アルゴリズム / 証拠隠とく性 / 非転用性 / 知識表現 / 認証技術 / グラフ同型問題 / 対話型証明 / プログラム検証 … More
Except Principal Investigator
情報セキュリティ / 連合学習 / サイバー攻撃 / 機械学習 / セキュリティ / 認証 / Secure Network / セキュアネットワーク / ストリーム暗号システム / CAD / 計算複雑さ / 耐強制性 / 無証拠性 / プロトコル / 暗号・認証等 / アルゴリズム / 計算量理論 / 近似アルゴリズム / 離散アルゴリズム / 物理層 / データの信頼性 / 暗号鍵生成と管理 / IoT機器 / ドップラー周波数 / レーダー / スペクトル拡散 / レーダ / 遅延・ドップラー推定 / 通信とセンシング / 二重選択性フェージング / 連合アンラーニング / 巨大AIモデル / プライバシ保護 / 失効 / 否認可能 / 暗号 / 認証プロトコル / 否認可能性 / 閾値の自動抽出 / 多次元挙動パターン / 通常時挙動パターン / サイバー攻撃検知 / Distributed attacks / Automatic Thresholding / 多分類器の異常検知 / Feature Selection / Extraction of Threshold / Sequential Detection / Two-stage detection / Multidimensional Pattern / 特徴選択 / 2段階検知 / シーケンシャル検知 / アンサンブル検知 / 検知時の閾値自動調整 / パターンの自動抽出 / 攻撃パターン / マルウエア / 教師なし学習 / K-Means / 教師あり学習 / Random Forest / 攻撃検知 / 広告ライブラリ / プライバシ / フォレンジクス / Android / モバイル / Advanced Network / Cryptography and Authentication / Algorithms / データベース / テンプレート / バイオメトリクス / インターネット高度化 / Social Infrastructure System / Low Power Technique / Computer System / System on a Chip / ディジタルネーミング / 無線通信ネットワーク / 低消費エネルギー / 暗号回路 / システムLSI / 個人認証 / RFID / ディジタルメーミング / 社会基盤システム / 低消費電力技術 / 計算機システム / システムオンチップ / morphological signal processing / wavelet transform / copyright protection / text document / digital video / digital contents / information security / digital watermark / 映像情報 / 画像情報 / 著作権保護 / 電子メディア / マルチメディア信号 / ディジタルウォーターマーク / 電子透かし / elliptic function map / stream cipher / correlation / i.i.d. sequence / chaotic sequence / Jacobi-Chebyshev有理写像 / i.i.d.カオス2値系列 / 独立同分布(i.i.d) / デシタルカオス暗号システム / 楕円関数写像 / ストリーム暗号 / 無相関 / 独立同分布系列 / カオス系列 / Proof of security / Threshold update / Secret sharing / 電子現金 / 委任署名 / 多重署名 / 検証可秘密分散法 / 閾値変更可能性 / 能動的攻撃 / 受動的攻撃 / IDによる鍵共有 / 安全性の証明 / 閾値変更 / 秘密分散法 / Wiener-Hopf equation / central limit theorem / histogram / sequence of symbols / correlated property / characteristic equation / transition matrix / Markov Chain / スペクトルの推定 / 遷移確率の推定 / マルコフ推移行列 / スペクトル推定 / マルコフ情報源 / 期待値・分散 / 中心極限定理 / パタンのヒストグラム / 無相関・相関性 / 遷移行列 / マルコフ連鎖 / I.I.D. / Stream Cipher System / Chaotic Binary Sequence / i.i.d. / 独立同分布(I.I.D.) / 独立同分布(i.i.d.) / カオス2値系列 / random generation / benchmarks / optimization / logic design / 回路理論的複雑さ / オンセットサイズ / 等価変換 / 入出力次数制限 / NANDゲート回路 / 論理回路最適化システム / ベンチマーク生成システム / ランダム論理回路 / ランダム生成 / ベンチマーク / 最適化 / 論理設計 / computational complexity / Resolution / theorem proving / SAT / NP完全性 / 定理の自動証明 / 導出原理 / 定理証明 / Security of instance generation / Computational complexity / Read-once resolution / Propositional proof system / Weighting strategy / Local search / Control of the number of solutions / Satisfiability problem / 例題生成系の安全性 / 単読導出原理 / 定理自動証明 / 重みつけ法 / 局所探索法 / 充足解数の制御 / 充足可能性問題 / アンチフォレンジック / 生体認証 / 多変数多項式公開鍵暗号 / ポスト量子暗号 / 公開鍵暗号 / 情報通信工学 / 高信頼性ネットワーク / セキュア・ネットワーク / トラフィック観測 / 異常検知 / 異常発見 / 構造発見 / ネットワーク管理運用 / ネットワークセキュリティ / トラヒック観測 / プロダクトライン開発方法論 / ユビキタス / ユーザセントリック / ユニバーサルデザイン / ユビキタスコンピューティング / 情報ネットワーク / 研究者の協調 / 啓発活動 / 理論と応用の協調 / 研究の活性化 / 若手の育成 / 国際交流 / 多国籍 / 国際研究者交流 / 品質保証・性能保証 / 計算限界 / ランダマイズド・アルゴリズム / 社会的評価基準 / 理論的性能保証 / 数理モデル化 / 離散システム / 計算困難問題 / 量子アルゴリズム / 確率アルゴリズム / オンラインアルゴリズム / 品質保証 / 離散最適化 / セルラオートマトン / 詰め込み問題 / 発見的アルゴリズム / エネルギー障壁問題 / 分子形態変化 / タイリング / 配列設計 / ランダムウォーク / 分散計算 / 分子計算 / 数値積分 / モンテカルロ法 / 無理数回転 / Weyl変換 / 擬似乱数 / 計算量 / 直交検定系 / メルセヌ・ツイスター / 検定法 / 疑似乱数 Less
  • Research Projects

    (49 results)
  • Research Products

    (250 results)
  • Co-Researchers

    (95 People)
  •  偏在計算資源の活用による巨大モデルに対する連合学習・連合アンラーニング技術の確立

    • Principal Investigator
      李 鵬 (李鵬)
    • Project Period (FY)
      2024 – 2026
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60060:Information network-related
    • Research Institution
      The University of Aizu
  •  Enhancing efficiency and privacy of federated learning systems for IoT applicationsPrincipal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2024 – 2025
    • Research Category
      Grant-in-Aid for JSPS Fellows
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Kyushu University
  •  Development of Fundamental Theory for Communication and Sensing over a doubly selective channel in highly mobile environment

    • Principal Investigator
      實松 豊
    • Project Period (FY)
      2023 – 2026
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 21020:Communication and network engineering-related
    • Research Institution
      Kyushu University
      Tokyo Institute of Technology
  •  Physical Layer-based Cryptographic Key Management and Data Reliability Assurance for Smart IoT Environments

    • Principal Investigator
      SU Chunhua
    • Project Period (FY)
      2023 – 2025
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      The University of Aizu
  •  Designing an electronic voting system on a decentralized democratic cryptographic infrastructure and exploring its ideal securityPrincipal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2022 – 2024
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Kyushu University
  •  Study on Cyber-attack Detection based on Automatic Extraction of Multi-dimensional Behavior Modes

    • Principal Investigator
      Feng Yaokai
    • Project Period (FY)
      2018 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Kyushu University
  •  Authentication protocol with privacy protection ensuring receipt-freeness, coersion-resistance and deniability

    • Principal Investigator
      Ueshige Yoshifumi
    • Project Period (FY)
      2018 – 2022
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Nagasaki University
  •  Systematic Evaluation on Security and Privacy of Crypto-Virtual CurrencyPrincipal Investigator

    • Principal Investigator
      SAKURAI KOUICHI
    • Project Period (FY)
      2018 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Kyushu University
  •  A Study of Unkwon Cyber Attack Detection Method with Artificial Intelligence

    • Principal Investigator
      高原 尚志
    • Project Period (FY)
      2017 – 2019
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      University of Niigata Prefecture
  •  Decentralized cryptographic infrastructure: Design and Analysis of Applied SystemsPrincipal Investigator

    • Principal Investigator
      SAKURAI KOUICHI
    • Project Period (FY)
      2015 – 2017
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      Kyushu University
  •  Analyze the security of Android applications

    • Principal Investigator
      Matsumoto Shinichi
    • Project Period (FY)
      2014 – 2016
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Institute of Systems, Information Technologies and Nanotechnologies
  •  Categorization of biometric authentication based on digital receipt-freeness and evaluation of coercion-resistance

    • Principal Investigator
      UESHIGE Yoshifumi
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Nagasaki University
  •  Building non-interactive zero-knowledge proof from probabilistically checkable proof and its application to practical cryptosystemsPrincipal Investigator

    • Principal Investigator
      SAKURAI KOUICHI
    • Project Period (FY)
      2013 – 2014
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Theory of informatics
    • Research Institution
      Kyushu University
  •  Multipath integration for providing secure communication with multi-level

    • Principal Investigator
      HORI Yoshiaki
    • Project Period (FY)
      2012 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Computer system/Network
    • Research Institution
      Saga University
      Kyushu University
  •  Design and analysis of multivariate public key cryptosystems using non-commutative structure

    • Principal Investigator
      YASUDA Takanori
    • Project Period (FY)
      2012 – 2014
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      General mathematics (including Probability theory/Statistical mathematics)
    • Research Institution
      Institute of Systems, Information Technologies and Nanotechnologies
  •  A study on evaluating Insider Threats and fighting against Insider attacks in Cyber SystemsPrincipal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Computer system/Network
    • Research Institution
      Kyushu University
  •  A study on construction of computationally independent one-way functions and their application to cryptographic protocolPrincipal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      2011 – 2012
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kyushu University
  •  Structure discovery of Network Services by Using Network Traffic

    • Principal Investigator
      HORI Yoshiaki
    • Project Period (FY)
      2009 – 2011
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Computer system/Network
    • Research Institution
      Kyushu University
  •  Design and Security Analysis of Cryptographic Protocol for Privacy-Preserving Data MiningPrincipal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      2008 – 2010
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kyushu University
  •  A Study on Ubiquitous Computing Platform for User-centric Environment

    • Principal Investigator
      FUKUDA Akira
    • Project Period (FY)
      2006 – 2009
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Computer system/Network
    • Research Institution
      Kyushu University
  •  インターネットフィッシング詐欺に対する情報セキュリティ対策技術の研究Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2006 – 2007
    • Research Category
      Grant-in-Aid for Exploratory Research
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kyushu University
  •  A Research on On-line Biometric Authentication System with Privacy Protection on the Internet

    • Principal Investigator
      UESHIGE Yoshifumi
    • Project Period (FY)
      2006 – 2007
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Nagasaki University
      Institute of Systems & Information Technologies KYUSHU
  •  暗号認証システムにおける双対性原理の確立と応用Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Kyushu University
  •  新世代の計算限界-その解明と打破-

    • Principal Investigator
      岩間 一雄
    • Project Period (FY)
      2004 – 2008
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Kyoto University
  •  暗号システムに対する実装攻撃の適用と限界に関する計算論的研究Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2004 – 2007
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Kyushu University
  •  公開鍵暗号と電子署名の証明可能安全性における双対性原理・変換不変量の解析と応用Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2003
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Kyushu University
  •  離散アルゴリズムの品質保証技術に関する調査と新しい展開

    • Principal Investigator
      IWAMA Kazuo
    • Project Period (FY)
      2003
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kyoto University
  •  ソフトウエア難読化技術の安全性に関する理論的解析と統一的性能指標の確立Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2003 – 2004
    • Research Category
      Grant-in-Aid for Exploratory Research
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kyushu University
  •  An unified approach on security evaluation against sidechannel attacks on cryptographic algorithmsPrincipal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      2003 – 2005
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      KYUSHU UNIVERSITY
  •  公開鍵暗号と電子署名の証明可能安全性における双対性原理・変換不変量の解析と応用Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2002
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Kyushu University
  •  自律的分散型計算としての分子計算

    • Principal Investigator
      YAMASHITA Masafumi
    • Project Period (FY)
      2002 – 2006
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Kyushu University
  •  Research on System LSI Design Methodology for Social Infrastructure

    • Principal Investigator
      HIROTO Yasuura
    • Project Period (FY)
      2002 – 2006
    • Research Category
      Grant-in-Aid for Creative Scientific Research
    • Research Institution
      Kyushu University
  •  公開鍵暗号と電子署名との証明可能安全性理論における双対性原理の確立と応用Principal Investigator

    • Principal Investigator
      桜井 幸一
    • Project Period (FY)
      2001
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas (C)
    • Review Section
      Science and Engineering
    • Research Institution
      Kyushu University
  •  無証拠性を満たす暗号プロトコルの設計とインターネット投票システムへの応用Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      2001 – 2002
    • Research Category
      Grant-in-Aid for Exploratory Research
    • Research Field
      計算機科学
    • Research Institution
      Kyushu University
  •  Digital chaos cipher system

    • Principal Investigator
      KOHDA Tohru
    • Project Period (FY)
      2000 – 2002
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      情報通信工学
    • Research Institution
      Kyushu University
  •  Theory of Distributed Cryptography and its application to Electronic Commerce SystemsPrincipal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      2000 – 2002
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      計算機科学
    • Research Institution
      KYUSHU UNIVERSITY
  •  Development of Image Protection and Management Systems using Digital Watermarking Techniques

    • Principal Investigator
      MIYAZAKI Akio
    • Project Period (FY)
      2000 – 2001
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      情報通信工学
    • Research Institution
      KYUSHU UNIVERSITY
  •  On an identification algorithm of transition probabilities and eigenvalues of transition matrix

    • Principal Investigator
      KOHDA Tohru
    • Project Period (FY)
      1999 – 2001
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      General mathematics (including Probability theory/Statistical mathematics)
    • Research Institution
      Kyushu University
  •  Research on public-key cryptosystems from hyperelliptic-curvesPrincipal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      1999 – 2001
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      計算機科学
    • Research Institution
      Kyushu University
  •  Research on flexible cryptosystem

    • Principal Investigator
      TADA Mitsuru
    • Project Period (FY)
      1999 – 2000
    • Research Category
      Grant-in-Aid for Scientific Research (B).
    • Research Field
      情報通信工学
    • Research Institution
      Japan Advanced Institution of Science and Technology
  •  確率論および計算量理論による擬似乱数の研究

    • Principal Investigator
      SUGITA Hiroshi
    • Project Period (FY)
      1998 – 1999
    • Research Category
      Grant-in-Aid for Exploratory Research
    • Research Field
      General mathematics (including Probability theory/Statistical mathematics)
    • Research Institution
      Kyushu University
  •  Design and analysis of public-key encryption algorithms from computationally intractable problems.Principal Investigator

    • Principal Investigator
      SAKURAI Kouichi
    • Project Period (FY)
      1998 – 2000
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas (B)
    • Research Institution
      Kyushu University
  •  数論アルゴリズムの構造論的研究とその公開鍵暗号安全性評価への応用Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      1997 – 1998
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      計算機科学
    • Research Institution
      Kyushu University
  •  Stream Cipher System Based on Chaotic Binary Sequences

    • Principal Investigator
      KOHDA Tohru
    • Project Period (FY)
      1997 – 1999
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      情報通信工学
    • Research Institution
      KYUSHU UNIVERSITY
  •  知識の対話型証明に関する研究と暗号認証システム効率改善への応用Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      1996
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      計算機科学
    • Research Institution
      Kyushu University
  •  Computational Complexity of Automated Theorem Proving

    • Principal Investigator
      IWAMA Kazuo
    • Project Period (FY)
      1996 – 1997
    • Research Category
      Grant-in-Aid for international Scientific Research
    • Research Field
      計算機科学
    • Research Institution
      KYOTO UNIVERSITY
      Kyushu University
  •  Fast and Mass Generation of Random Benchmark Circuits That Are Not Too Artificial

    • Principal Investigator
      IWAMA Kazuo
    • Project Period (FY)
      1996 – 1997
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      計算機科学
    • Research Institution
      KYOTO UNIVERSITY
      Kyushu University
  •  プログラム論証システムの信頼性と安全性に関する研究Principal Investigator

    • Principal Investigator
      櫻井 幸一
    • Project Period (FY)
      1995
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      計算機科学
    • Research Institution
      Kyushu University
  •  Research on Random Generation of Test Instances with Controlled Attributes.

    • Principal Investigator
      IWAMA Kazuo
    • Project Period (FY)
      1995 – 1996
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      計算機科学
    • Research Institution
      KYUSHU UNIVERSITY

All 2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2000 Other

All Journal Article Presentation Book Patent

  • [Book] BCC '19: Proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies and Contracts2019

    • Author(s)
      Satyanarayana V Lokam , Sushmita Ruj, Kouichi Sakurai
    • Total Pages
      25
    • Publisher
      ACM Special Interest Group on Security, Audit and Control
    • ISBN
      9781450367851
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Book] Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts2018

    • Author(s)
      Satya LOKAM, Sushmita RUJ, Kouichi SAKURAI
    • Total Pages
      63
    • Publisher
      ACM
    • ISBN
      9781450357586
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum2021

    • Author(s)
      Zeng Siqi、Kaneko Kosuke、Ke Yan、Tan Haowen、Sakurai Kouichi
    • Journal Title

      Proc. Ninth International Symposium on Computing and Networking, CANDAR 2021 - Workshops,

      Volume: 1 Pages: 473-477

    • DOI

      10.1109/candarw53999.2021.00088

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] A Distributed Ledger Management Mechanism for Storing and Selling Private Data2021

    • Author(s)
      Dutta Sabyasachi、Paul Arinjita、Ozaki Rocki H.、Ranzan C. Pandu、Sakurai Kouichi
    • Journal Title

      Proc. IEEE Conference on Dependable and Secure Computing, DSC 2021

      Volume: 1 Pages: 1-8

    • DOI

      10.1109/dsc49826.2021.9346258

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture2020

    • Author(s)
      Soe Yan Naung、Feng Yaokai、Santosa Paulus Insap、Hartanto Rudy、Sakurai Kouichi
    • Journal Title

      Sensors

      Volume: 20 Issue: 16 Pages: 1-15

    • DOI

      10.3390/s20164372

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Journal Article] A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks2020

    • Author(s)
      Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai
    • Journal Title

      Int. J. Netw. Comput.

      Volume: 10(2) Pages: 213-226

    • NAID

      130007878718

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Journal Article] Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features2020

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa 2, Rudy Hartanto and Kouichi Sakurai
    • Journal Title

      Electronics

      Volume: 9(1) Issue: 1 Pages: 1-19

    • DOI

      10.3390/electronics9010144

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Journal Article] RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust2019

    • Author(s)
      Anada Hiroaki、Yasuda Takanori、Kawamoto Junpei、Weng Jian、Sakurai Kouichi
    • Journal Title

      Journal of Information Security and Applications

      Volume: 45 Pages: 10-19

    • DOI

      10.1016/j.jisa.2018.12.006

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS2019

    • Author(s)
      Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai
    • Journal Title

      Proc the 7th International Symposium on Computing and Networking

      Volume: 2019 Pages: 239-244

    • DOI

      10.1109/candar.2019.00039

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Journal Article] Reliable Decentralized Oracle with Mechanisms for Verification and Disputation2019

    • Author(s)
      Ma Limao、Kaneko Kosuke、Sharma Subodh、Sakurai Kouichi
    • Journal Title

      CANDAR Workshops 2019

      Volume: xxx Pages: 346-352

    • DOI

      10.1109/candarw.2019.00067

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Simulation of Secure Volunteer Computing by Using Blockchain2019

    • Author(s)
      Shota Johjima、Kosuke Kaneko、Sharma Subodh、Kouichi Sakurai
    • Journal Title

      AINA 2019, Advances in Intelligent Systems and Computing

      Volume: 926 Pages: 883-894

    • DOI

      10.1007/978-3-030-15032-7_74

    • ISBN
      9783030150310, 9783030150327
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work2019

    • Author(s)
      Anada Hiroaki、Matsushima Tomohiro、Su Chunhua、Meng Weizhi、Kawamoto Junpei、Bag Samiran、Sakurai Kouichi
    • Journal Title

      Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Lecture Notes in Computer Science

      Volume: 11449 Pages: 101-114

    • DOI

      10.1007/978-3-030-14234-6_6

    • ISBN
      9783030142339, 9783030142346
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] A Sequential Scheme for Detecting Cyber Attacks in IoT Environment2019

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai
    • Journal Title

      Proc. the 4th IEEE Cyber Science and Technology Congress

      Volume: 2019 Pages: 238-244

    • DOI

      10.1109/dasc/picom/cbdcom/cyberscitech.2019.00051

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Journal Article] Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden2018

    • Author(s)
      Talukder Asoke K、Chaitanya Manish、Arnold David、Sakurai Kouichi
    • Journal Title

      IEEE SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018,

      Volume: 1 Pages: 257-262

    • DOI

      10.1109/smartworld.2018.00079

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems2018

    • Author(s)
      Nishida Yuki、Kaneko Kosuke、Sharma Subodh、Sakurai Kouichi
    • Journal Title

      Sixth International Symposium on Computing and Networking, CANDAR Workshops 2018,

      Volume: 1 Pages: 524-528

    • DOI

      10.1109/candarw.2018.00102

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Journal Article] Bitcoin Block Withholding Attack: Analysis and Mitigation2017

    • Author(s)
      Samiran Bag, Sushmita Ruj, and Kouichi Sakurai
    • Journal Title

      IEEE TRANS. ON INFORMATION FORENSICS AND SECURITY (Accepted/印刷中)

      Volume: -

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Journal Article] A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation2017

    • Author(s)
      Y.Feng, Y.Hori, K.Sakurai
    • Journal Title

      Proc. of SpaCCS 2017, Springer LNCS

      Volume: 10656 Pages: 461-473

    • DOI

      10.1007/978-3-319-72389-1_37

    • ISBN
      9783319723884, 9783319723891
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16K00132, KAKENHI-PROJECT-17K00187
  • [Journal Article] Bitcoin Block Withholding Attack: Analysis and Mitigation2017

    • Author(s)
      Samiran BAG, Sushmita RUJ and Kouichi SAKURAI
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 12 Issue: 8 Pages: 1967-1978

    • DOI

      10.1109/tifs.2016.2623588

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Journal Article] Cross-group Secret Sharing for Secure Cloud Storage Service2016

    • Author(s)
      Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016

      Volume: - Pages: 1-8

    • DOI

      10.1145/2857546.2857610

    • NAID

      120006654575

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00029, KAKENHI-PROJECT-15K00186, KAKENHI-PROJECT-15H02711
  • [Journal Article] On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies2016

    • Author(s)
      Samiran BAG, Sushmita RUJ and Kouichi SAKURAI
    • Journal Title

      Proc. of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015), November 1-3, 2015, Beijing, China. Lecture Notes in Computer Sciences, Springer

      Volume: 11th

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Journal Article] Retricoin: Bitcoin based on compact proofs of retrievability2016

    • Author(s)
      Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai
    • Journal Title

      Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN2016), Singapore, January 4-7, 2016.

      Volume: 17th Pages: 1-10

    • DOI

      10.1145/2833312.2833317

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Journal Article] Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage2015

    • Author(s)
      Shinichi Matsumoto, Kouichi Sakurai
    • Journal Title

      Information Security Applications

      Volume: 8909 Pages: 83-94

    • DOI

      10.1007/978-3-319-15087-1_7

    • NAID

      120005574940

    • ISBN
      9783319150864, 9783319150871
    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Journal Article] Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse2015

    • Author(s)
      Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai
    • Journal Title

      Lecture Notes in Computer Sciences, Springer

      Volume: 9357 Pages: 255-264

    • DOI

      10.1007/978-3-319-24315-3_26

    • NAID

      120006654534

    • ISBN
      9783319243146, 9783319243153
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00029, KAKENHI-PROJECT-15H02711
  • [Journal Article] Efficient variant of Rainbow using sparse secret keys2014

    • Author(s)
      Takanori Yasuda, Tsuyoshi Takagi, and Kouichi Sakurai
    • Journal Title

      Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

      Volume: 5 (3) Pages: 3-13

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units2014

    • Author(s)
      Satoshi Tanaka, Takanori Yasuda, and Kouichi Sakurai
    • Journal Title

      Journal of Internet Services and Information Security

      Volume: 4 (3) Pages: 1-20

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Efficient Variant of Rainbow without Triangular Matrix Representation2014

    • Author(s)
      Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai
    • Journal Title

      Springer Lecture Notes in Computer Sciences

      Volume: 8407 Pages: 532-541

    • DOI

      10.1007/978-3-642-55032-4_55

    • NAID

      110009625808

    • ISBN
      9783642550317, 9783642550324
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework2014

    • Author(s)
      Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimotoa,Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Journal of Network

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Security of Multivariate Signature Scheme Using Non-commutative Rings2014

    • Author(s)
      Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E97.A Issue: 1 Pages: 245-252

    • DOI

      10.1587/transfun.E97.A.245

    • NAID

      130003385350

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units2014

    • Author(s)
      Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda, and Kouichi Sakurai
    • Journal Title

      The Second IEEE International Symposium on Computing and Networking

      Volume: 1 Pages: 543-548

    • DOI

      10.1109/candar.2014.85

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Multivariate Signature Scheme Using Quadratic Forms2013

    • Author(s)
      Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai
    • Journal Title

      Springer Lecture Notes in Computer Sciences

      Volume: 7932 Pages: 243-258

    • DOI

      10.1007/978-3-642-38616-9_17

    • ISBN
      9783642386152, 9783642386169
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network2013

    • Author(s)
      Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proc. of the 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2013)

      Volume: 1 Pages: 570-574

    • DOI

      10.1109/bwcca.2013.99

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500084
  • [Journal Article] HTTPリクエストの情報量の異常値検出を用いた漏洩検知2013

    • Author(s)
      千葉 一輝 , 堀 良彰 , 櫻井 幸一
    • Journal Title

      情報処理学会論文誌

      Volume: 54巻 Pages: 1071-1076

    • NAID

      110009552593

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] HTTPリクエストの情報量の異常値検出を用いた漏洩検知2013

    • Author(s)
      千葉一輝, 堀良彰, 櫻井幸一
    • Journal Title

      情報処理学会論文誌

      Volume: Vol. 54, No. 3 Pages: 1071-1076

    • NAID

      110009552593

    • URL

      http://ci.nii.ac.jp/naid/110009552593

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Analysis of Methods for Detecting Compromised Nodes and Its Countermeasures2013

    • Author(s)
      Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proc. of the International Conference on IT Convergence and Security

      Pages: 53-60

    • DOI

      10.1007/978-94-007-5860-5_7

    • ISBN
      9789400758599, 9789400758605
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Upper bound of the length of information embeded in RSA public key efficiently2013

    • Author(s)
      Motoki Kitahara, Takanori Yasuda, Takashi Nishide, and Kouichi Sakurai
    • Journal Title

      Proceedings of the first ACM workshop on Asia public-key cryptography

      Volume: ACM Digital Library Pages: 33-38

    • DOI

      10.1145/2484389.2484396

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] A variant of rainbow with shorter secret key and faster signature generation2013

    • Author(s)
      Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai
    • Journal Title

      Proceedings of the first ACM workshop on Asia public-key cryptography

      Volume: ACM Digital Library Pages: 57-62

    • DOI

      10.1145/2484389.2484401

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Detection of Android API Call Using Logging Mechanism within Android Framework2013

    • Author(s)
      Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proc. of the 4th International Workshop on Applications and Techniques in Information Security

      Pages: 393-404

    • DOI

      10.1007/978-3-319-04283-1_25

    • ISBN
      9783319042824, 9783319042831
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] GPUによる並列化を用いた多変数二次多項式の高速代入計算2012

    • Author(s)
      田中哲士, 西出隆志, 櫻井幸一
    • Journal Title

      電子情報通信学会 総合大会

      Volume: CD ROM Pages: 1-1

    • Data Source
      KAKENHI-PROJECT-23650008
  • [Journal Article] 非可換環を用いた多変数多項式署名方式に対するランク攻撃に関する考察2012

    • Author(s)
      安田貴徳,高木剛,櫻井幸一
    • Journal Title

      コンピュータセキュリティシンポジウム2012論文集

      Volume: 2012(3) Pages: 477-484

    • NAID

      170000072724

    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Security Analysis of Offline E-Cash Systems with Malicious Insider2012

    • Author(s)
      Takashi Nishide, Shingo Miyazaki, and Kouichi Sakurai
    • Journal Title

      Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications(JoWUA)

      Volume: Vol. 3, No. 1/2 Pages: 55-71

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks2012

    • Author(s)
      D.Hao, K.Sakurai
    • Journal Title

      IEEE Advanced Information Networking and Applications

      Volume: (掲載予定)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems2012

    • Author(s)
      Dong Hao, Kouichi Sakurai
    • Journal Title

      Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications

      Pages: 495-502

    • DOI

      10.1109/aina.2011.87

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Security Analysis of Offline E-Cash Systems with Malicious Insider, Journal of Wireless Mobile Networks2012

    • Author(s)
      Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai
    • Journal Title

      Ubiquitous Computing and Dependable Applications

      Volume: Vol. 3, No. 1/2 Pages: 55-71

    • URL

      http://www.techrepublic.com/resourcelibrary/whitepapers/security-analysis-of-offline-e-cash-systems-with-malicious-insider/

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Achieving Cooperative Detection against Sybil Attack in Wireless Ad Hoc Networks : A Game Theoretic Approach2012

    • Author(s)
      Y.Xu, K.Sakurai
    • Journal Title

      ACM ICUIMC

      Volume: (掲載予定)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] 三角行列表示を用いない効率的なRainbow型電子署名方式2012

    • Author(s)
      安田貴徳,高木剛,櫻井幸一
    • Journal Title

      信学技報

      Volume: 112巻126号 Pages: 143-150

    • NAID

      110009625808

    • Data Source
      KAKENHI-PROJECT-24740078
  • [Journal Article] Detecting Information Leakage via a HTTP Request Based on the Edit Distance2012

    • Author(s)
      Kazuki Chiba,Yosiaki Hori and Kouichi Sakurai
    • Journal Title

      Journal of Internet Services and Information Security (JISIS)

      Volume: 2巻 3/4号 Pages: 18-28

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] 署名データを組み込んだRSA公開鍵生成法の提案2012

    • Author(s)
      北原基貴,西出隆志,櫻井幸一
    • Journal Title

      情報処理学会,九州支部,火の国情報シンポジウム

      Volume: CD ROM Pages: 8-8

    • Data Source
      KAKENHI-PROJECT-23650008
  • [Journal Article] Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks2012

    • Author(s)
      Dong Hao, Avishek Adhikari, Kouichi Sakurai
    • Journal Title

      Proc. of Third International Conference on Trusted Systems

      Pages: 239-257

    • DOI

      10.1007/978-3-642-32298-3_16

    • ISBN
      9783642322976, 9783642322983
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Detecting Information Leakage via a HTTP Request Based on the Edit Distance2012

    • Author(s)
      Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Journal of Internet Services and Information Security

      Volume: Vol. 2, Issue 3/4 Pages: 18-28

    • URL

      http://isyou.info/jisis/vol2/no34/jisis-2012-vol2-no34-02.pdf

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] 認証機能を埋め込んだ公開鍵暗号の提案2012

    • Author(s)
      北原基貴,西出隆志,櫻井幸一
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS)

      Volume: CD ROM Pages: 8-8

    • Data Source
      KAKENHI-PROJECT-23650008
  • [Journal Article] Classification on Attacks in Wireless Ad Hoc Networks : A Game Theoretic View2011

    • Author(s)
      X.Liao, D.Hao, K.Sakurai
    • Journal Title

      Networked Computing and Advanced Information Management (NCM)

      Pages: 144-149

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited2011

    • Author(s)
      Takashi Nishide, Kouichi Sakurai
    • Journal Title

      Proc. of 3rd International Conference on Intelligent Networking and Collaborative Systems

      Pages: 656-661

    • DOI

      10.1109/incos.2011.146

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] "Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration,"2011

    • Author(s)
      Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(IEEE TrustCom-11)

      Pages: 352-361

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Journal Article] Distributed Paillier Cryptosystem without Trusted Dealer2011

    • Author(s)
      T.Nishide, K.Sakurai
    • Journal Title

      International Workshop on Information Security Applications

      Volume: Springer LNCS6513 Pages: 44-60

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] Towards Countermeasure of Insider Threat in Network Security2011

    • Author(s)
      Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai
    • Journal Title

      Proc. of the Third International Conference on Intelligent Networking and Collaborative Systems

      Pages: 634-636

    • DOI

      10.1109/incos.2011.156

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Using Game Theory to Classify Wireless Ad Hoc Network Attacks with Analysis on Countermeasures2011

    • Author(s)
      X.Liao, D.Hao, K.Sakurai
    • Journal Title

      International Journal of Advancements in Computer Technology

      Volume: 3 Issue: 8 Pages: 296-303

    • DOI

      10.4156/ijact.vol3.issue8.35

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] Distributed Paillier Cryptosystem without Trusted Dealer2011

    • Author(s)
      Takashi Nishide, Kouichi Sakurai
    • Journal Title

      11th International Workshop on Information Security Applications (WISA2010) LNCS6513

      Pages: 44-60

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems2011

    • Author(s)
      Fangming Zhao, Takashi Nishide, Kouichi Sakurai
    • Journal Title

      7th Information Security Practice and Experience Conference (ISPEC) LNCS6672 Springer-Verlag

      Pages: 83-97

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] Achieving Cooperative Detection against Sybil Attack in Wireless Ad Hoc Networks : A Game Theoretic Approach2011

    • Author(s)
      X.Liao, D.Hao, K.Sakurai
    • Journal Title

      Asia-Pacific Conference on Communications

      Pages: 806-811

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23300027
  • [Journal Article] "Implementation and Evaluation of Bot Detection Scheme based on Data Transmission Interval,"2010

    • Author(s)
      Seiichiro Mizoguchi, Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proceedings of the 6th Workshop on Secure Network Protocols(NPsec2010)

      Pages: 73-78

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Journal Article] Darknet Monitoring on Real-Operated Networks2010

    • Author(s)
      S.Mizoguchi, Y.Fukushima, Y.Kasahara, Y.Hori, K.Sakurai
    • Journal Title

      Prof.of The 5th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)

      Pages: 287-285

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Journal Article] "Darknet Monitoring on Real-Operated Networks,"2010

    • Author(s)
      Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proceedings of the 5th International Conference on Broadband, Wireless Computing, Communication and Applications(BWCCA2010)

      Pages: 278-285

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Journal Article] Implementation and Evaluation of Bot Detection Scheme based on Data Transmission Intervals2010

    • Author(s)
      S.Mizoguchi, Y.Kugisaki, Y.Kasahara, Y.Hori, K.Sakurai
    • Journal Title

      Prof.of the 6th Workshop on Secure Network Protocols (NPsec2010)

      Pages: 73-78

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Journal Article] Analysis of Existing Privacy-Preserving Protocols in Domain Name System2010

    • Author(s)
      F.Zhao, Y.Hori, K.Sakurai
    • Journal Title

      IEICE TRANSACTIONS on Information and Systems

      Volume: Vol.E93-D No.5 Pages: 1031-1043

    • NAID

      10026815407

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] "Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Scheme,2009

    • Author(s)
      C.Su, F.Bao, J.Zhou, T.Takagi, K.Sakurai,
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer, Vol. E92-A No. 4,

      Pages: 1246-1250

    • NAID

      10026857427

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] Importance of Data Standardization in Privacy-Preserving K-means Clustering,2009

    • Author(s)
      Chunhua Su, Justin Zhan, Kouichi Sakurai
    • Journal Title

      International Workshop on Privacy-Preserving Data Analysis in conjunction with Database Systems for Advanced Applications(DASFAA 2009), Springer LNCS5667

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] "Flow Traffic Classification with Support Vector Machine by Using Payload Length,"2009

    • Author(s)
      Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, Heejo Lee, Jae-Cheol Ryou
    • Journal Title

      Proceedings of the 2nd International Conference on Computer Science and its Applications(CSA2009)

      Volume: 2 Pages: 703-707

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Journal Article] Distributed Noise Generation for Density Estimation Based Clustering Without Trusted Third Party2009

    • Author(s)
      C.Su, F.Bao, J.Zhou, T.Takagi, K.Sakurai,
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer, Vol. E92-A,

    • NAID

      10026858826

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Journal Article] A Design and Evaluation of Image-based Spam Filtering in SpamAssassin2008

    • Author(s)
      Zhan Wang, Yoshiaki Hori, Kouichi Sakurai
    • Journal Title

      Proc.3rd International Joint Workshop on In formation Security and Its Applications (単巻予稿集)

      Pages: 17-29

    • Data Source
      KAKENHI-PROJECT-18650002
  • [Journal Article] Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment2008

    • Author(s)
      Y. Wang, Y. Hori, K. Sakurai
    • Journal Title

      J. Comput. Sci. Technol. 23(1)

      Pages: 129140-129140

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16092101
  • [Journal Article] Characterizing Economic and Social Porperties of Trust and Reputation Systems in P2P Environment2008

    • Author(s)
      Yufeng, Wang・Yoshiaki, Hori・Kouichi, Sakurai
    • Journal Title

      Journal of Computer Science and Technolgy Vol. 23, No. 1

      Pages: 129-140

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] A Framework for User Privacy Protection Using Trusted Program2007

    • Author(s)
      Ken'ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya
    • Journal Title

      Int.J.of Security and Its Applications Vol.1, No.2

      Pages: 59-70

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18650002
  • [Journal Article] Privacy-Preserving Two-Party K-Means Clustering Via Secure Approximation2007

    • Author(s)
      Chunhua, Su・Feng, Bao・Jian ying, Zhou・Tsuyoshi, Takahi・Kouichi, Sakurai
    • Journal Title

      2007 IEEE International Symposium on Data Mining and Information Retrieval Proc単巻

      Pages: 385-391

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] A Proposal of Key Management Scheme and Its Operation Using Anonymous Biometrics on ID-based Infrastructure2007

    • Author(s)
      Akitoshi Izumi, Yoshifumi Ueshige, Kouichi Sakurai,
    • Journal Title

      International Journal of Security and Its Applications Vol.1No1

      Pages: 83-94

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18650002
  • [Journal Article] Economic-inspired truthful reputation feedback mechanism in P2P network2007

    • Author(s)
      Y.Wang, Y.Hori, K.Sakurai
    • Journal Title

      The IEEE 11th International Workshop on Future Trends of Distributed Computing Systems (to apper)

    • NAID

      110006163294

    • Data Source
      KAKENHI-PROJECT-16092101
  • [Journal Article] A Proposal of One-Time Biometric Authentication2006

    • Author(s)
      Yoshifumi Ueshige, Kouichi Sakurai
    • Journal Title

      The 2006 International Conference on Security & Management

      Pages: 78-83

    • Data Source
      KAKENHI-PROJECT-18500016
  • [Journal Article] A Proposal of Secure Storage Scheme in Biometric Template Database2006

    • Author(s)
      Yoshifumi Ueshige, Kouichi Sakurai
    • Journal Title

      International Workshop on Universal Framework for Identity Documents

      Pages: 25-31

    • Data Source
      KAKENHI-PROJECT-18500016
  • [Journal Article] 分散環境に適したワンタイムIDのオフライン検証法の検討2006

    • Author(s)
      今本健二, 櫻井幸一
    • Journal Title

      2006年暗号と情報セキュリティシンポジウム(SCIS2006)

      Pages: 172-172

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] PGV Style Block-Cipher-Based Hash Families and Black Box Analysis2005

    • Author(s)
      W.Lee, P.Sarkar, S.Lee, M.Nandi, D.Chang, K.Sakurai
    • Journal Title

      IEICE Transactions E88-A,1

      Pages: 39-46

    • NAID

      110003213208

    • Data Source
      KAKENHI-PROJECT-14085204
  • [Journal Article] Reassignment Scheme of an RFID Tag's Key for Owner Transfer2005

    • Author(s)
      Junlchiro SAITO, Kenji IMAMOTO, Kouichi SAKURAI
    • Journal Title

      EUC Workshops 2005

      Pages: 1303-1312

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] 乱数を用いたプログラム制御構造の難読化手法の提案2005

    • Author(s)
      豊福達也, 田端利宏, 櫻井幸一
    • Journal Title

      火の国情報シンポジウム (印刷中)

    • Data Source
      KAKENHI-PROJECT-15650002
  • [Journal Article] A Survey on Cryptographic Techniques for RFID privacy2005

    • Author(s)
      Junichiro SAITO, Kouichi SAKURAI
    • Journal Title

      Korea Information Processing Society Review Vol.12, No.5

      Pages: 11-17

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Ballot-cancellation Scheme in E-voting System2005

    • Author(s)
      Yong-Sork Her, Kenji Imamoto, and Kouichi Sakurai
    • Journal Title

      Proc.of eGovernment workshop 2005 (CD-ROM)

    • NAID

      120006655337

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] DDoS攻撃に耐性のある共通鍵認証に基づいたプロトコルの設計2005

    • Author(s)
      今本健二, 堀良彰, 櫻井幸一
    • Journal Title

      コンピュータセキュリティシンポジウム2005(CSS2005) Vol.2005, No.13

      Pages: 19-24

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] Grouping Proof for RFID Tags2005

    • Author(s)
      Junichiro Saito, Kouichi Sakurai
    • Journal Title

      Proc. of the 19th International Conference on Advanced Information Networking and Applications AINA 2005

      Pages: 621-624

    • NAID

      120006655324

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] I-out-of L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption2005

    • Author(s)
      Yong-Sork Her, Kenji Inamoto, Kouichi Sakurai
    • Journal Title

      IEICE Technical Report, ISEC2005-59 Vol.105, No.194

      Pages: 117-122

    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] 1-out-of L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption2005

    • Author(s)
      Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
    • Journal Title

      IEICE Technical Report, ISEC2005-59 Vol.105, No.194

      Pages: 117-122

    • NAID

      110003298629

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Design of DDoS-Resilient Protocol Based on Symmetric key Authentication2005

    • Author(s)
      Kenji Imamoto, Kouichi Sakurai
    • Journal Title

      2005 Korea-Japan Joint Workshop on Algorithms and Computation(WAAC'05)

      Pages: 113-119

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] Grouping Proof for RFID Tags2005

    • Author(s)
      Junichiro Saito, Kouichi Sakurai
    • Journal Title

      Proc.of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005)

      Pages: 621-624

    • NAID

      120006655324

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] 1-out-of LE-voting System with Efficient Computational Complexity Based on r-th Residue Encryption2005

    • Author(s)
      Yong-Sork Her, Kenji Imamoto, and Kouichi Sakurai
    • Journal Title

      IEICE Technical Report, ISEC2005-59 Vol.105,No.194

      Pages: 117-122

    • NAID

      110003298629

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] E-voting System with Ballot-Cancellation Based on Double-Encryption2005

    • Author(s)
      Yong-Sork Her, Kenji Inamoto, Kouichi Sakurai
    • Journal Title

      Proc. of International Workshop on Information Security Applications 2005 Vol.I

      Pages: 525-532

    • NAID

      120006655335

    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Some Remarks on Security of Receipt-Free E-auction2005

    • Author(s)
      Yong-Sork HER, Kenji INAMOTO, Kouichi SAKURAI
    • Journal Title

      Proc. of International Conference on Information Technology and Applications 2005 Vol.II

      Pages: 500-563

    • NAID

      120006655333

    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Reassignment Scheme of an RFID Tag's Key for Owner Transfer2005

    • Author(s)
      Junichiro SAITO, Kenji IMAMOTO, Kouichi SAKURAI
    • Journal Title

      EUC Workshops 2005

      Pages: 1303-1312

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Some Remarks on Security of Receipt-Free E-auction2005

    • Author(s)
      Yong-Sork HER, Kenji IMAMOTO, Kouichi SAKURAI
    • Journal Title

      Proc. of International Conference on Information Technology and Applications 2005 Vol.II

      Pages: 500-563

    • NAID

      120006655333

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic2005

    • Author(s)
      Kenji Imamoto, Kouichi Sakurai
    • Journal Title

      Proceedings of The Second Workshop on Automated Reasoning for Security Protocol Analysis, Electronic Notes in Theoretical Computer Science Vol.135, No.1

      Pages: 79-94

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow2005

    • Author(s)
      Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai
    • Journal Title

      Proc. Embedded and Ubiquitous Computing - EUC 2005 Workshops LNCS No.2823

      Pages: 916-925

    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] Some Remarks on Security of Receipt-Free E-auction2005

    • Author(s)
      Yong-Sork HER, Kenji IMAMOTO, and Kouichi SAKURAI
    • Journal Title

      Proc.of International Conference on Information Technology and Applications 2005 Vol.II

      Pages: 500-563

    • NAID

      120006655333

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] E-voting System with Ballot-Cancellation Based on Double-Encryption2005

    • Author(s)
      Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
    • Journal Title

      Preproc. of International Workshop on Information Security Applications 2005 Vol.I

      Pages: 525-532

    • NAID

      120006655335

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Reassignment Scheme of an RFID Tag's Key for Owner Transfer2005

    • Author(s)
      Junichiro SAITO, Kenji IMANOTO, Kouichi SAKURAI
    • Journal Title

      EUC Workshops 2005

      Pages: 1303-1312

    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Side Channel Cryptanalysis on XTR Public Key Cryptosystem2005

    • Author(s)
      Dong-Guk Han, Tetsuya Izu, Jongin Lim, and Kouichi Sakurai
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E88-A,No.5

      Pages: 1214-1223

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Grouping Proof for RFID Tags.2005

    • Author(s)
      Junichiro Saito, Kouichi Sakurai
    • Journal Title

      19th International Conference on Advanced Information Networking and Applications

      Pages: 621-624

    • NAID

      120006655324

    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] RFIDタグにおけるプライバシ保護可能な所有者変更方式の提案2005

    • Author(s)
      齊藤 純一郎, 桜井 幸一
    • Journal Title

      Proc. of Computer Security Symposium 2005 (CSS2005)

      Pages: 283-288

    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Ballot-cancellation Scheme in E-voting System2005

    • Author(s)
      Yong-Sork Her, Kenji Inamoto, Kouichi Sakurai
    • Journal Title

      Proc. of eGovernment workshop 2005 (CD-ROM)

    • NAID

      120006655337

    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] ワンタイムID鍵交換プロトコルの設計、および様相理論による安全性検証2005

    • Author(s)
      今本健二, 櫻井幸一
    • Journal Title

      人工知能と知識処理研究会(AI) Vol.105, No.361

      Pages: 19-24

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] A Survey on Cryptographic Techniques for RFID privacy2005

    • Author(s)
      Junichiro SAITO and Kouichi SAKURAI
    • Journal Title

      Korea Information Processing Society Review Vol.12,No.5

      Pages: 11-17

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] 乱数を用いたプログラム制御構造の難読化手法の提案2005

    • Author(s)
      豊福達也, 田端利宏, 櫻井幸一
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS)予稿集

      Pages: 1921-1926

    • Data Source
      KAKENHI-PROJECT-15650002
  • [Journal Article] RFIDタグにおけるプライバシ保護可能な所有者変更方式の提案2005

    • Author(s)
      齊藤 純一郎 and 櫻井 幸一
    • Journal Title

      Proc.of Computer Security Symposium 2005 (CSS2005)

      Pages: 283-288

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Side Channel Cryptanalysis on XTR Public Key Cryptosystem2005

    • Author(s)
      Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E88-A, No.5

      Pages: 1214-1223

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Ballot-cancellation Scheme in E-voting System2005

    • Author(s)
      Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
    • Journal Title

      Proc. of eGovernment workshop 2005

    • NAID

      120006655337

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Fast Modular Reduction with NIST Recommended Elliptic Curves2005

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      Proc. Information and Communications Security, 7th International Conference, ICICS 2005 LNCS. Vol 3783

      Pages: 169-180

    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] 楕円曲線暗号のための剰余算に対するサイドチャネル解析2005

    • Author(s)
      酒井康行, 櫻井幸一
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS2005)

    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] E-vating System with Ballot-0t-Cancellation Based on Double-Encryption2005

    • Author(s)
      Yong-Sork Her, Kenji Imamoto, and Kouichi Sakurai
    • Journal Title

      Preproc.of International Workshop on Information Security Annlications 2005 Vol.1

      Pages: 525-532

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model2004

    • Author(s)
      Kenji IMAMOTO, Kouichi SAKURAI
    • Journal Title

      Proc.The 18th International Conference on Advanced Information Networking and Applications Vol.1

      Pages: 327-333

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] A Siftware Fingerprinting Scheme for Java Using Classfiles Obfuscation.2004

    • Author(s)
      Kazuhide Fukushima, Kouichi Sakurai
    • Journal Title

      Information Security Applications, 4th International Workshop, WISA 2003, Revised Papers. Lecture Notes in Computer Science LNCS 2908

      Pages: 303-316

    • Data Source
      KAKENHI-PROJECT-15650002
  • [Journal Article] Side Channel Attacks on XTR and An Efficient Countermeasure2004

    • Author(s)
      Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
    • Journal Title

      Technical Report of IEICE, ISEC2004-56 Vol.104 No.200

      Pages: 103-110

    • NAID

      110003296514

    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] べき指数展開アルゴリズムとサイドチャネル情報漏洩の関係に関する考察2004

    • Author(s)
      酒井 康行, 櫻井 幸一
    • Journal Title

      暗号と情報セキュリティシンポジウム SCIS 2004

      Pages: 665-660

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] Key-Exchange Protocol Using Pre-Agreed Session-ID2004

    • Author(s)
      Kenji IMAMOTO, Kouichi SAKURAI
    • Journal Title

      Proc.Information Security Applications, 5th International Workshop Springer LNCS 3325

      Pages: 375-387

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] 仲介サーバを用いたPKIにおけるワンタイムID認証の適用について2004

    • Author(s)
      古賀 聡, 今本 健二, 櫻井 幸一
    • Journal Title

      コンピュータセキュリティシンポジウム2004

      Pages: 451-456

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] Pseudorandomness of SPN-Type Transformations2004

    • Author(s)
      W.Lee, M.Nandi, P.Sarkar, D.Chang, S.Lee, K.Sakurai
    • Journal Title

      Proc.ACISP 2004

      Pages: 212-223

    • Data Source
      KAKENHI-PROJECT-14085204
  • [Journal Article] On the Side Channel Leakage during Exponent Recoding Computations2004

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      The 2004 Symposium on Cryptography and Information Security (SCIS 2004)

      Pages: 665-660

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] 様相論理による坪性の定義および認証プロトコルの安全性検証2004

    • Author(s)
      今本 健二, 櫻井 幸一
    • Journal Title

      コンピュータセキュリティ研究会(CSEC) Vol.54

      Pages: 55-60

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] A New Attack with Side Channel Leakage During Exponent Recoding Computations2004

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      Proc.Cryptographic Hardware and Embedded Systems - CHES 2004 : 6th International Workshop LNCS 3156

      Pages: 298-311

    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] 計算量の少ない3者モデルワンタイムID鍵交換方式の設計2004

    • Author(s)
      今本 健二, 櫻井 幸一
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS2004)

      Pages: 423-428

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Journal Article] Timing Attacks against a Parallelized RSA Implementation2004

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      情報処理学会論文誌 Vol.45,No.8

    • Data Source
      KAKENHI-PROJECT-16092221
  • [Journal Article] サイドチャネル攻撃へのウィンドウ法を用いた防御法に対する2階電力差分攻撃2003

    • Author(s)
      桶屋 勝幸, 櫻井 幸一
    • Journal Title

      情報処理学会論文誌 Vol.44・No.8

      Pages: 1938-1946

    • NAID

      110002711789

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-subtraction Chains Countermeasure against Side Channel Attacks2003

    • Author(s)
      Katsuyuki Okeya, Kouichi Sakurai
    • Journal Title

      Journal of Information Processing Society of Japan Vol.44・No.8

      Pages: 1924-1937

    • NAID

      110002711788

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] A Second-order Differential Power Analysis Breaks a Window-method Based Countermeasure against Side Channel Attacks2003

    • Author(s)
      Katsuyuki Okeya, Kouichi Sakurai
    • Journal Title

      Journal of Information Processing Society of Japan Vol.44・No.8

      Pages: 1938-1946

    • NAID

      110002711789

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] 高度版ランダム化加算減算鎖法に対する多重電力解析2003

    • Author(s)
      桶屋 勝幸, 櫻井 幸一
    • Journal Title

      情報処理学会論文誌 Vol.44・No.8

      Pages: 1924-1937

    • NAID

      110002711788

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-15300004
  • [Journal Article] Multi-Candidate E-Voting System for Absentee2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      Proc. of the 2002 Korea-Japan Joint Symposium on Advanced Engineering & Science 1

      Pages: 111-117

    • NAID

      120006655131

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] A Design of Cryptographic Hash function Group with Variable Output-Length Based on SHA-12002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      2002CSEC-18-31 1

      Pages: 213-220

    • NAID

      110003298501

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Design of the Secure E-voting System Including Absentee Voters Which Enables Ballot-Cancellation Based on Double Encryption2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI, Shin-Hwan KIM
    • Journal Title

      Proc.of 2003 International Conference on Computers, Communications, Systems 1

      Pages: 69-74

    • NAID

      120006655257

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Attacks for Finding Collision in Reduced Versions of 3-PASS,4-PASS HAVAL2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI, Shin-Hwan KIM
    • Journal Title

      Proc.of 2003 International Conference on Computers, Communications, Systems 1

      Pages: 75-78

    • NAID

      120006655258

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] AESにおける低消蝿力アーキテクチャにつしいて2002

    • Author(s)
      池 兼次郎, 萩原 大輔, 櫻井 幸一, 安浦 寛人
    • Journal Title

      コンピュータセキュリティシンポジウム2002(CSS2002)論文集

      Pages: 407-412

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] 票-取消と無証拠性が可能な不在者投票を含んだ電子投票の設計2002

    • Author(s)
      許 容碩, 櫻井 幸一
    • Journal Title

      Proc.of the 2003 Symposium on Cryptography, Information Security 1

      Pages: 185-190

    • NAID

      120006655253

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Design of the Secure E-voting System Including Absentee Voters Which Enables Ballot-Cancellation Based on Double Encryption.2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI, Shin-Hwan KIM
    • Journal Title

      Proc. of 2003 International Conference on Computers, Communications, Systems 1

      Pages: 69-74

    • NAID

      120006655257

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] A Design of Cryptographic Hash function Group with Variable Output-Length Based on SHA-12002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      2002 CSEC-18-31 1

      Pages: 213-220

    • NAID

      110003298501

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] 不在者投票を考慮した電子選挙システム2002

    • Author(s)
      許 容碩, 櫻井 幸一
    • Journal Title

      コンピュータセキュリティシンポジウム2002 1

      Pages: 461-466

    • NAID

      120006655249

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Analysis Cryptographic Hash Function for The Next Generation2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI, Design
    • Journal Title

      Proc. of International Workshop on Information & Electrical Engineering 1

      Pages: 168-173

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Block Cipher with Variable Output Word-Size Based on SHA-V ; SHACAL-V2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      Proc. of Korea Institute of Information Security & Cryptology, Yeong Nam Branch 1

      Pages: 94-103

    • NAID

      120006655259

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] HAVAL 簡約版の衝突を通した安全性の分析2002

    • Author(s)
      許 容碩, 櫻井 幸一
    • Journal Title

      Proc.of the 2003 Symposium on Cryptography, Information Security 1

      Pages: 551-556

    • NAID

      120006655254

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Block Cipher with Variable Output Word-Size Based on SHA-V;SHACAL-V2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      Proc.of Korea Institute of Information Security & CryAtology, Yeong Nam Branch 1

      Pages: 94-103

    • NAID

      120006655259

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Design,Analysis Cryptographic Hash Function for The NextGeneration2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      Proc.of International Workshop on Information & Electrical Engineering 1

      Pages: 168-173

    • NAID

      120006655098

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Attacks for Finding Collision in Reduced Versions of 3-PASS, 4-PASS HAVAL2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI, Shin-Hwan KIM
    • Journal Title

      Proc. of 2003 International Conference on Computers, Communications, Systems 1

      Pages: 75-78

    • NAID

      120006655258

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Multi-Candidate E-Voting System for Absentee2002

    • Author(s)
      Yong-Sork HER, Kouichi SAKURAI
    • Journal Title

      Proc.of the 2002 Korea-Japan Joint Symposium on Advanced Engineering & Science 1

      Pages: 111-117

    • NAID

      120006655131

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14GS0218
  • [Journal Article] Analysis and Design for Private Message Board Systems2000

    • Author(s)
      Kenji IMAMOTO, Kouichi SAKURAI
    • Journal Title

      IEICE TRANS.FUNDAMENTALS E87-A,No.1

      Pages: 204-211

    • NAID

      10011815735

    • Data Source
      KAKENHI-PROJECT-16016270
  • [Patent] 理想機能実現装置、方法、プログラム2010

    • Inventor(s)
      櫻井幸一
    • Industrial Property Rights Holder
      櫻井幸一
    • Industrial Property Number
      2010-221865
    • Filing Date
      2010-09-30
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Patent] 格納方法、その格納方法をコンピュータに実行させることが可能なプログラム、データ管理システム、及び管理装置2006

    • Inventor(s)
      上繁 義史, 桜井 幸一
    • Industrial Property Rights Holder
      財団法人九州システム情報技術研究所
    • Filing Date
      2006-10-20
    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Patent] 格納方法、その格納方法をコンピュータに実行させることが可能なプログラム、データ管理システム、及び管理装置2006

    • Inventor(s)
      上繁義史, 櫻井幸一
    • Industrial Property Rights Holder
      財団法人九州システム情報技術研究所
    • Industrial Property Number
      2006-286978
    • Filing Date
      2006-10-20
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] 乱数ビーコンサービスの現状と課題(集中管理 対 分散型)2024

    • Author(s)
      櫻井 幸一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2024)
    • Data Source
      KAKENHI-PROJECT-22K12029
  • [Presentation] 強制耐性電子投票方式に対する1つの反証:物理的投票ブースの効果2023

    • Author(s)
      櫻井 幸一
    • Organizer
      コンピュータセキュリティシンポジウム2023(CSS2023)
    • Data Source
      KAKENHI-PROJECT-22K12029
  • [Presentation] 電子投票の研究動向:欧米編 --ブロックチェーン基盤の安全性とその限界--2023

    • Author(s)
      櫻井幸一
    • Organizer
      暗号と情報セキュリティシンポジウム2023
    • Data Source
      KAKENHI-PROJECT-22K12029
  • [Presentation] 分散型ID(DID)/検証可能属性証明(VC)技術を利用した自己主権型アイデンティティ情報利活用基盤(SSIUF)に関する考察2022

    • Author(s)
      才所敏明, 辻井重男, 櫻井幸一
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding2021

    • Author(s)
      Tao Wang, Yaokai Feng, Kouichi Sakurai
    • Organizer
      The 15th International Conference on Ubiquitous Information Management and Communication
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] 自己主権型アイデンティティ情報利活用基盤に関する考察2021

    • Author(s)
      所敏明, 辻井重男, 櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] Detecting DDoS Attack in SDN Environment Using Automatic Thresholding Method2021

    • Author(s)
      Fupei Lyu, Yaokai Feng, Kouichi Sakurai
    • Organizer
      The 38th Symposium on Cryptography and Information Security.
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] 異なる機械学習アルゴリズムと4つの特徴選択法によるDDoS攻撃検出のパフォーマンス比較2020

    • Author(s)
      秋山仁志、Yaokai Feng、櫻井幸一
    • Organizer
      火の国シンポジウム2020
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] ハッシュマイニングにおけるブロック到着時間の小分散化2020

    • Author(s)
      ○穴田 啓晃, 櫻井 幸一
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] DAG技術ベースの暗号資産の匿名性に関する考察2020

    • Author(s)
      ○才所敏明, 辻井重男, 櫻井幸一
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] ブロックチェーンを利用した電子投票システムの安全性2020

    • Author(s)
      Misni Harjo Suwito, Sabyasachi Dutta, Kouchi SAKURAI
    • Organizer
      2020年暗号と情報セキュリティシンポジウム(SCIS2020),2E1-3
    • Data Source
      KAKENHI-PROJECT-18K11297
  • [Presentation] 暗号仮想通貨における匿名化技術の現状と展望2019

    • Author(s)
      才所敏明 辻井重男,櫻井幸一
    • Organizer
      IPSJ 全国大会(福岡大学)
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] Security of Electronic Voting Schemes after Blockchain2019

    • Author(s)
      Kouichi SAKURAI
    • Organizer
      13th International Conference on Network and System Security (NSS2019) 札幌
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] Security of Anonymous E-voting Scheme after Blockchain: A challenge of achieving Receipt-freeness2019

    • Author(s)
      Kouchi SAKURAI
    • Organizer
      13th International Conference on Network and System Security(NSS2019)
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11297
  • [Presentation] Rule Generation for Signature Based Detection Systems of Cyber Attacks for IoT Environments2019

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai
    • Organizer
      The 9th International Workshop on Networking, Computing, Systems, and Software (NCSS-9)
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] 分散XML処理をための複数経路を用いたルーティングアルゴリズムの提案と評価2019

    • Author(s)
      Longjian Ye、小出 洋、Yaokai Feng、櫻井 幸一
    • Organizer
      火の国情報シンポジウム2019
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] U2RおよびR2L攻撃の効率的な検出に向けて2019

    • Author(s)
      Hao Zhao、小出 洋、Yaokai Feng、櫻井 幸一
    • Organizer
      火の国情報シンポジウム2019
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] スマートコントラクトにおける信頼性ある分散型オラクル手法の提案2019

    • Author(s)
      馬 立茂 , 金子 晃介 , 櫻井幸一
    • Organizer
      火の国シンポジウム2019
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] 匿名暗号資産(Monero/Zcash/Grin)ブロックチェーンの匿名性に関する考察2019

    • Author(s)
      ○才所 敏明, 辻井 重男, 櫻井 幸一
    • Organizer
      コンピュータセキュリティシンポジウム 2019
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] 仮想通貨の匿名性の現状と課題2019

    • Author(s)
      才所敏明 辻井重男,櫻井幸一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS)
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] E-voting scheme after Blockchain: A challenge of achieving "Receipt-freeness"2019

    • Author(s)
      Kouichi SAKURAI
    • Organizer
      The 2nd International Workshop on Blockchain and its Applications (Blockchain 2019) 広州
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03240
  • [Presentation] How to make undeniable evidence on Secret handshakes2019

    • Author(s)
      櫻井幸一,Somnath PANJA,Sabyasachi DUTTA
    • Organizer
      情報処理学会 第81回全国大会
    • Data Source
      KAKENHI-PROJECT-18K11297
  • [Presentation] Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation2018

    • Author(s)
      Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai
    • Organizer
      The 33rd International Conference on. Advanced Information Networking and Applications
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding2018

    • Author(s)
      Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai
    • Organizer
      The Sixth International Symposium on Computing and Networking
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks2018

    • Author(s)
      Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai
    • Organizer
      The 4th IEEE Cyber Science and Technology Congress
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11295
  • [Presentation] CRYPTOGRAPHY with BlockChain2017

    • Author(s)
      Kouichi SAKURAI
    • Organizer
      BLOCKCHAIN 2017 Workshop on Blockchain Technologies, Indian Statistical Institute, Kolkata
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] スケーラブルなプルーフ・オブ・ワークのためのグラーフクリーク・マイニングの分散の解析2017

    • Author(s)
      穴田 啓晃, 松島 智洋, 川本 淳平, バグ・サミラン, 櫻井幸一
    • Organizer
      2017年暗号と情報セキュリティシンポジウム予稿論文集, 1F2-5,
    • Place of Presentation
      沖縄
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] Bitcoin, BlockChain, FinTech, IoT, AI and you Future2017

    • Author(s)
      Kouichi SAKURAI
    • Organizer
      BLOCKCHAIN 2017 Workshop on Blockchain Technologies, Indian Statistical Institute, Kolkata
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] ブラウザのHTML5 ウェブストレージに対するメモリフォレンジクス2016

    • Author(s)
      松本晋一, 櫻井幸一
    • Organizer
      電子情報通信学会総合大会
    • Place of Presentation
      九州大学
    • Year and Date
      2016-03-15
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Presentation] 暗号通貨に関するIACR サマースクール及びECRYPT ワークショップ参加報告2016

    • Author(s)
      松本 晋一, 穴田 啓晃, フォン ヤオカイ, 櫻井 幸一:
    • Organizer
      コンピュータセキュリティシンポジウム2016予稿論文集 2C4-4
    • Place of Presentation
      秋田
    • Year and Date
      2016-10-11
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] ビットコイン・マイニングにおける追加報酬を用いたブロック保留攻撃2016

    • Author(s)
      バグ サミラン(*), ルジ スシミタ, 櫻井 幸一
    • Organizer
      第33回暗号と情報セキュリティシンポジウム(SCIS2016)予稿集, 1A2-5, 熊本, 2016年1月.
    • Place of Presentation
      熊本(日本)
    • Year and Date
      2016-01-19
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] 複数プロバイダに亘る分散ストレージのためのグループ横断秘密分散法2016

    • Author(s)
      柯 陳毓たお0* 穴田 啓晃† 川本 淳平† モロゾフ キリル‡ 櫻井幸一†
    • Organizer
      第33回暗号と情報セキュリティシンポジウム(SCIS2016)予稿集, 3A1-3, 熊本, 2016年1月.
    • Place of Presentation
      熊本(日本)
    • Year and Date
      2016-01-19
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] グラフクリーク探索問題に対するビットコイン・マイニングの評価2016

    • Author(s)
      松島智洋(*),穴田啓晃,川本淳平,バグ・サミラン,櫻井幸一
    • Organizer
      火の国情報シンポジウム2016予稿集. 4B-2
    • Place of Presentation
      宮崎(日本)
    • Year and Date
      2016-03-02
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] Analysis of “Receipt-freeness” and “Coercion-resistance” in Biometric Authentication Protocols2016

    • Author(s)
      Yoshifumi Ueshige, Kouichi Sakurai
    • Organizer
      2016 IEEE 30th International Conference on Advanced Information Networking and Applications
    • Place of Presentation
      Le Regent Congress Centre, Crans-Montana, Switzerland
    • Year and Date
      2016-03-23
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] 生体認証プロトコルにおける無証拠性に基づく否認可能性2016

    • Author(s)
      上繁義史,櫻井幸一
    • Organizer
      2016年電子情報通信学会総合大会
    • Place of Presentation
      九州大学伊都キャンパス,福岡市
    • Year and Date
      2016-03-15
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools2016

    • Author(s)
      Samiran BAG, Kouichi SAKURAI
    • Organizer
      Information Security - 19th International Conference,
    • Place of Presentation
      Honolulu, HI, USA
    • Year and Date
      2016-09-03
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] AndroidマルウェアのAPI処理ロ ギングによる個人情報漏えい検知及び分類2016

    • Author(s)
      韓燦洙, 松本晋一, 川本淳平, 櫻井幸一
    • Organizer
      火の国情報シンポジウム2016
    • Place of Presentation
      宮崎大学
    • Year and Date
      2016-03-02
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Presentation] Forensics Investigation from Residual Memory Image of WebStorage in HTML5 Web Browser2016

    • Author(s)
      Shinichi Matsumoto, Kouichi Sakurai
    • Organizer
      AsiaJCIS 2016 poster sesion
    • Place of Presentation
      Fukuoka, Japan
    • Year and Date
      2016-08-04
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Presentation] MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems2015

    • Author(s)
      Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, and Kouichi Sakurai
    • Organizer
      第32回情報とセキュリティシンポジウム
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-22
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Presentation] 端末フィンガープリント情報を用いた鍵乱用を防止可能な ハイブリッド暗号化方式2015

    • Author(s)
      陳 春路(*), 穴田 啓晃, 川本 淳平, 櫻井 幸一
    • Organizer
      Computer Security Symposium 2015 2 1 - 2 3 October 2015
    • Place of Presentation
      長崎(日本)
    • Year and Date
      2015-10-21
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] Forensic vs. Anti-forensic in Biometrics: Towards Receipt-freeness and Coercion-Resistance in biometric authentication protocols2015

    • Author(s)
      Kouichi Sakurai
    • Organizer
      The 3rd International Conference on Information and Communication Technology
    • Place of Presentation
      Bali Nusa Dua Convention Center, Bali, Indonesia
    • Year and Date
      2015-05-27
    • Invited
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] Revisiting Block Withholding Attack in Bitcoin Cryptocurrency2015

    • Author(s)
      Samiran BAG(*), Sushmita RUJ and Kouichi SAKURAI
    • Organizer
      Computer Security Symposium 2015 (CSS2015), 3C3-3, October 21-23, 2015, Nagasaki, Japan.
    • Place of Presentation
      Nagasaki, JAPAN
    • Year and Date
      2015-10-21
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] 次世代暗号通貨プラットフォーム Ethereum の実験的評価,2015

    • Author(s)
      フォン ヤオカイ(*), 松本 晋一, 穴田 啓晃, 川本 淳平, 櫻井 幸一,
    • Organizer
      コンピュータセキュリティシンポジウム2015 (CSS2015), 2015.10.23
    • Place of Presentation
      長崎(日本)
    • Year and Date
      2015-10-21
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] Application of Graph Problem for Bitcoin Mining2015

    • Author(s)
      Samiran BAG(*), Sushmita RUJ and Kouichi SAKURAI
    • Organizer
      Computer Security Symposium 2015 (CSS2015), 3C3-2, October 21-23, 2015, Nagasaki, Japan.
    • Place of Presentation
      Nagasaki, JAPAN
    • Year and Date
      2015-10-21
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] 生体認証プロトコルにおける無証拠性と耐強制性に関する考察2015

    • Author(s)
      上繁義史,櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム2015
    • Place of Presentation
      ブリックホール,長崎市
    • Year and Date
      2015-10-21
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] Bitcoin Based on Compact Proofs of Retrievability2015

    • Author(s)
      Binanda SENGUPTA, Samiran BAG(ポスター説明者), Sushmita RUJ, and Kouichi SAKURAI
    • Organizer
      he 10th International Workshop on Security (IWSEC2015), Todaiji Cultural Center, 日本,2015年8月26日-28日.
    • Place of Presentation
      Nara, JAPAN
    • Year and Date
      2015-08-26
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02711
  • [Presentation] MQチャレンジ ~多変数多項式暗号の安全性評価~2015

    • Author(s)
      Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, and Kouichi Sakurai
    • Organizer
      応用数理学会2015年研究部会連合発表会
    • Place of Presentation
      中央大学
    • Year and Date
      2015-03-06
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Presentation] Implementation of Efficient Operations over GF(232) using Graphics Processing Units2014

    • Author(s)
      櫻井 幸一
    • Organizer
      The 2014 Asian Conference on Availability, Reliability and Security
    • Place of Presentation
      インドネシア
    • Data Source
      KAKENHI-PROJECT-25540004
  • [Presentation] 生体認証プロトコルにおける無証拠性確保に関する考察2014

    • Author(s)
      上繁 義史,櫻井 幸一
    • Organizer
      電子情報通信学会2014年総合大会
    • Place of Presentation
      新潟大学(新潟県新潟市)
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] 疎な秘密鍵を用いた多変数多項式署名方式2014

    • Author(s)
      安田貴徳, 高木剛, 櫻井幸一
    • Organizer
      日本応用数理学会2014年度年会JANT オーガナイズド・セッション「数論アルゴリズムとその応用」
    • Place of Presentation
      政策研究大学院大学
    • Year and Date
      2014-09-04
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Presentation] Multivariate Quadratic Challenge2014

    • Author(s)
      Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, and Kouichi Sakurai
    • Organizer
      ETSI 2nd Quantum Safe Workshop
    • Place of Presentation
      Ottawa, Canada
    • Year and Date
      2014-10-06
    • Data Source
      KAKENHI-PROJECT-24740078
  • [Presentation] Receipt-freeness of remote biometric authentication protocols2014

    • Author(s)
      Kouichi Sakurai, Yoshifumi Ueshige
    • Organizer
      The First Collaboration under MoU between the Centre for Information Security, MMU and ISIT Security Laboratory: Attribute-Based Identification and Remote Biometric Authentication
    • Place of Presentation
      Multimedia University, Malaysia
    • Year and Date
      2014-06-23
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] 生体認証プロトコルにおける証拠性・無証拠性に関する一検討2014

    • Author(s)
      上繁 義史,櫻井 幸一
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      城山観光ホテル(鹿児島県鹿児島市)
    • Data Source
      KAKENHI-PROJECT-25330155
  • [Presentation] 計算量的に独立な関数族のいくつかの性質に関する考察2013

    • Author(s)
      櫻井 幸一
    • Organizer
      2013年暗号と情報セキュリティシンポジウム(SCIS2013)
    • Place of Presentation
      京都
    • Data Source
      KAKENHI-PROJECT-23650008
  • [Presentation] Revisiting HMQV and Its Variants2013

    • Author(s)
      Shengli Liu, Kouichi Sakurai, Moti Yung, Fangguo Zhang and Yunlei Zhao
    • Organizer
      2013 年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      京都
    • Data Source
      KAKENHI-PROJECT-23650008
  • [Presentation] 計算量的に独立な関数族のいくつかの性質に関する考察2013

    • Author(s)
      櫻井 幸一
    • Organizer
      2013 年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      京都
    • Data Source
      KAKENHI-PROJECT-23650008
  • [Presentation] 情報理論的安全性に基づく通信方式の設計と評価2013

    • Author(s)
      津田航、堀良彰、櫻井幸一
    • Organizer
      火の国情報シンポジウム 2013
    • Place of Presentation
      熊本市
    • Data Source
      KAKENHI-PROJECT-24500084
  • [Presentation] "ウェブサーバのログ解析による異常検知"2012

    • Author(s)
      落水壱歩, 堀良彰, 櫻井幸一
    • Organizer
      火の国情報シンポジウム2012
    • Place of Presentation
      福岡県飯塚市
    • Year and Date
      2012-03-15
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] "Reviewing the Way to Quantifying Information Leaks on HTTP Requests and Proposing the Detection System,"2012

    • Author(s)
      Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai
    • Organizer
      5th Workshop among Asian Information Security Labs(WAIS 2012)
    • Place of Presentation
      Pohang, South Korea
    • Year and Date
      2012-01-13
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] データ送信間隔のエントロピーに着目した挙動の数値化手法,"2012

    • Author(s)
      溝口誠一郎, 堀良彰, 櫻井幸一
    • Organizer
      2012年暗号と情報セキュリティシンポジウム(SCIS2012)
    • Place of Presentation
      金沢市
    • Year and Date
      2012-01-31
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] HTTPリクエストにおける情報量の外れ値検出を用いた漏洩検知"2012

    • Author(s)
      千葉一輝, 堀良彰, 櫻井幸一
    • Organizer
      2012年電子情報通信学会総合大会
    • Place of Presentation
      岡山市
    • Year and Date
      2012-03-23
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] 2重DESに対する中間一致攻撃への耐性強化手法2011

    • Author(s)
      西出隆志, 吉永真一, Rishiraj Bhattacharyya, Bimal Roy, 櫻井幸一
    • Organizer
      2011暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2011-01-26
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] 情報量を用いたHTTPリクエストにおける情報漏洩検知システム"2011

    • Author(s)
      千葉一輝,西出隆志,堀良彰,櫻井幸一
    • Organizer
      2011年火の国情報シンポジウム
    • Place of Presentation
      福岡市
    • Year and Date
      2011-03-09
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] "エントロピーを用いた機械的特徴のスコアリングとボット検知への応用"2011

    • Author(s)
      溝口誠一郎, 堀良彰, 櫻井幸一
    • Organizer
      2011年電気関係学会九州支部連合大会(第64回連合大会)
    • Place of Presentation
      佐賀市
    • Year and Date
      2011-09-27
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] "Entropy based Network Behavior Characterization and Bot Detection,"2011

    • Author(s)
      Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai
    • Organizer
      The 6th International Workshop on Security(IWSEC 2011)
    • Place of Presentation
      東京都
    • Year and Date
      2011-11-09
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] 多変数暗号に対する故障利用攻撃について2011

    • Author(s)
      橋本康史, 高木剛, 櫻井幸一
    • Organizer
      2011暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2011-01-27
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] 悪性Webサイト間の関連性に着目した信頼性評価によるブラックリスト方式の検討2011

    • Author(s)
      福島祥郎, 堀良彰, 櫻井幸一
    • Organizer
      第146回 マルチメディア通信と分散処理・第52回コンピュータセキュリティ合同研究発表会
    • Place of Presentation
      大阪府吹田市
    • Year and Date
      2011-03-11
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] 履歴情報に基づくHTTPリクエストにおける情報量の数値化手法の検討と検知システムの考案"2011

    • Author(s)
      千葉一輝, 堀良彰, 櫻井幸一
    • Organizer
      2011年コンピュータセキュリティシンポジウム(CSS2011)
    • Place of Presentation
      新潟市
    • Year and Date
      2011-10-19
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] "履歴情報に基づくHTTPリクエストにおける情報漏洩量の数値化手法の検討,"2011

    • Author(s)
      千葉一輝, 堀良彰, 櫻井幸一
    • Organizer
      2011年電気関係学会九州支部連合大会(第64回連合大会)
    • Place of Presentation
      佐賀市
    • Year and Date
      2011-09-27
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] 情報量を用いたHTTPリクエストにおける情報漏洩検知システム2011

    • Author(s)
      千葉一輝, 西出隆志, 堀良彰, 櫻井幸一
    • Organizer
      火の国情報シンポジウム
    • Place of Presentation
      福岡市(福岡大学)
    • Year and Date
      2011-03-09
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] "悪性Webサイト間の関連性に着目した信頼性評価によるブラックリスト方式の検討"2011

    • Author(s)
      福島祥郎,堀良彰,櫻井幸一
    • Organizer
      情報処理学会第146回マルチメディア通信と分散処理・第52回コンピュータセキュリティ合同研究発表会
    • Place of Presentation
      大阪府吹田市
    • Year and Date
      2011-03-11
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance2010

    • Author(s)
      Amril Syalim, Takashi Nishide, Kouichi Sakurai
    • Organizer
      情報科学技術フォーラム(FIT),2pages
    • Place of Presentation
      福岡
    • Year and Date
      2010-09-09
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] 低レート攻撃トラフィック検出に関する検討2010

    • Author(s)
      福島祥郎, 堀良彰, 櫻井幸一
    • Organizer
      マルチメディア、分散、協調とモバイル(DICOMO2010)シンポジウム
    • Place of Presentation
      岐阜県下呂市
    • Year and Date
      2010-07-07
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] IFIP WG 11.3 Working Conference on Data and ApPlications Security and Privacy 2010会議参加報告2010

    • Author(s)
      西出隆志, Amril Syalim, 櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム(CSS),6pages
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-21
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] Efficient Adaptively Secure Oblivious Polynomial Evaluation with Universal Composability : If Homomorphic and Non-committing Encryption Exists2010

    • Author(s)
      Chunhua Su, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai
    • Organizer
      暗号と情報セキユリテイシンポジウム(SCIS),6pages
    • Place of Presentation
      香川
    • Year and Date
      2010-01-19
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] Distributed Key Generation for Paillier Cryptosystem2010

    • Author(s)
      西出隆志, 櫻井幸一
    • Organizer
      暗号と情報セキユリテイシンポジウム(SCIS),6pages
    • Place of Presentation
      香川
    • Year and Date
      2010-01-19
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] An Augmented Accountable Computing Framework for Transactional Databases,2010

    • Author(s)
      Chunhua Su_Guilin Wang, Kouichi Sakurai
    • Organizer
      2010年暗号と情報セキュリティシンポジウム,
    • Place of Presentation
      高松
    • Year and Date
      2010-01-20
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] ルールレポジトリを用いたユーザがカスタマイズ可能なデータ保護方法の提案2010

    • Author(s)
      高橋健一, 松崎隆啓, 峯恒憲, 櫻井幸一
    • Organizer
      2010Computer Security Symposium
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-19
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] "データ送信間隔に基づくボット検知手法の実装ならびに評価,"マルチメディア,分散2010

    • Author(s)
      溝口誠一郎,釘崎裕司,笠原義晃,堀良彰,櫻井幸一
    • Organizer
      協調とモバイルシンポジウム(DICOMO2010)
    • Place of Presentation
      岐阜県下呂市
    • Year and Date
      2010-07-07
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] "低レート攻撃トラフィック検出に関する検討",マルチメディア,分散2010

    • Author(s)
      福島祥郎,堀良彰,櫻井幸一
    • Organizer
      協調とモバイルシンポジウム(DICOMO2010)
    • Place of Presentation
      岐阜県下呂市
    • Year and Date
      2010-07-07
    • Data Source
      KAKENHI-PROJECT-21500078
  • [Presentation] 線形変換したテータ行列の固有値分布と安全性評価2009

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      CDROM 3F4-4, 5ページ
    • Place of Presentation
      滋賀
    • Year and Date
      2009-01-22
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] プライバシー保護したK平均クラスタリングにおけるデータ標準化問題2009

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      CDROM 3F4-5,5ページ
    • Place of Presentation
      滋賀
    • Year and Date
      2009-01-22
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] Security Problems in Existing Privacy-preserving K-means Clustering Schemes2008

    • Author(s)
      Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
    • Organizer
      電子情報通信学会全国総合大会
    • Place of Presentation
      北九州学研都市
    • Year and Date
      2008-03-19
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] Universally Composable Oblivious Polynomial Evaluation2008

    • Author(s)
      蘇春華, 櫟粛之, 櫻井幸一
    • Organizer
      電子情報通信学会全国総合大会
    • Place of Presentation
      北九州学研都市
    • Year and Date
      2008-03-18
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] 分散環境におけるテキストマイニングのプライバシー保護手法と実験分析2008

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム2008(CSS 2008), CDROM C5-1,6ページ
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-09
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] 汎用的結合可能なK平均クラスタリングプロトコル2008

    • Author(s)
      蘇春華, 櫟粛之, 櫻井幸一
    • Organizer
      2008年暗号と情報セキュリティシンポジウム(SCIS 2007),3E-3
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] 頻出パターンを利用した安全な相関ルール発見手法2008

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      信学技報,vo1.108,no.162,ISEC2008-59,177-182
    • Year and Date
      2008-07-25
    • Data Source
      KAKENHI-PROJECT-20300005
  • [Presentation] A Proposal on Biometric Template Database by using Mutual Correlation of Enrolled Templates2007

    • Author(s)
      Yoshifumi Ueshige, Sei-ichiro Kamata, Kouichi Sakurai
    • Organizer
      国際会議The 2nd Joint Workshop on International Security
    • Place of Presentation
      東京都
    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] 公開鍵暗号基盤における匿名バイオメトリクスを用いた秘密鍵管理の提案2007

    • Author(s)
      泉 昭年、上繁 義史、桜井 幸一
    • Organizer
      情報処理学会研究報告, CSEC
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2007-07-19
    • Data Source
      KAKENHI-PROJECT-18650002
  • [Presentation] A Proposal on Biometric Template Database by using Mutual Correlation of Enrolled Templates2007

    • Author(s)
      Ybshifumi Ueshige, Sei-ichiro Kamata, and Kouichi Sakurai
    • Organizer
      The 2nd Joint Workshop on International Security
    • Place of Presentation
      Waseda University
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] A Proposal on Biometric Template Database by using Mutual Correlation of Enrolled Templates(with review)2007

    • Author(s)
      Yoshifumi, Ueshige, Sei-ichiro, Kamata, Kouichi, Sakurai
    • Organizer
      The 2nd Joint Workshop on International Security
    • Place of Presentation
      Tokyo, Japan
    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] A Study on Biometric Template Storage Scheme by using Correlation of Enrolled Templates(in Japanese, without review)2007

    • Author(s)
      Yoshifumi, Ueshige, Kouichi, Sakurai
    • Organizer
      The 2007 Symposium on Cryptography and Information Security
    • Place of Presentation
      Sasebo, Japan
    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] 登録テンプレート間の相関性を利用したバイオメトリックテンプレート格納に関する-検討2007

    • Author(s)
      上繁 義史, 桜井 幸一
    • Organizer
      2007年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      長崎県佐世保市
    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] A Proposal of Secure Storage Scheme in Biometric Template Database2006

    • Author(s)
      Yoshifumi Ueshige, Kouichi Sakurai
    • Organizer
      国際会議International Workshop on Universal Framework for Identity Documents
    • Place of Presentation
      大連・中国
    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] A Proposal of One-Time Biometric Authentication2006

    • Author(s)
      Yoshifumi Ueshige, Kouichi Sakurai
    • Organizer
      国際会議The 2006 Intemational Conference on Security&Management
    • Place of Presentation
      ラスベガス・アメリカ
    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] A Proposal of Secure Storage Scheme in Biometric Template Database(with review)2006

    • Author(s)
      Yoshifumi, Ueshige, Kouichi, Sakurai
    • Organizer
      International Workshop on Universal Framework for Identity Documents
    • Place of Presentation
      Dalian, China
    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] A Proposal of One-Time Biometric Authentication(with review)2006

    • Author(s)
      Yoshifumi, Ueshige, Kouichi, Sakurai
    • Organizer
      The 2006 International Conference on Security & Management
    • Place of Presentation
      Las Vegas, USA
    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-18500016
  • [Presentation] HTML5 WebStorage生成物の メインメモリイメージからの取得

    • Author(s)
      松本晋一, 櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム2014
    • Place of Presentation
      北海道 札幌市
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Presentation] Detection of Android Ad Library Focusing on HTTP Connections and View Object Redraw Behaviors

    • Author(s)
      Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai
    • Organizer
      ICOIN 2015
    • Place of Presentation
      Siem Reap, Cambodia
    • Year and Date
      2015-01-12 – 2015-01-14
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Presentation] SDNセキュリティ研究動向 ―現状と課題―

    • Author(s)
      堀良彰, 松本晋一, 山内一将, 梶原直也, 川本淳平, 櫻井幸一
    • Organizer
      2015年 暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      北九州市
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PROJECT-24500084
  • [Presentation] Acquisition of Evidence of WebStorage in HTML5 Web Browsers from Memory Image

    • Author(s)
      Shinichi Matsumoto, Kouichi Sakurai
    • Organizer
      AsiaJCIS 2014
    • Place of Presentation
      Wuhan, China
    • Year and Date
      2014-09-03 – 2014-09-05
    • Data Source
      KAKENHI-PROJECT-26330169
  • [Presentation] Towards "Receipt-freeness" in Remote Biometric Authentication

    • Author(s)
      Yoshifumi Ueshige, Kouichi Sakurai
    • Organizer
      International Conference on Emerging Security Technologies (EST2014)
    • Place of Presentation
      Alcala de Henares, Spain
    • Year and Date
      2014-09-10 – 2014-09-12
    • Data Source
      KAKENHI-PROJECT-25330155
  • 1.  IWAMA Kazuo (50131272)
    # of Collaborated Projects: 5 results
    # of Collaborated Products: 0 results
  • 2.  UESHIGE Yoshifumi (00300666)
    # of Collaborated Projects: 5 results
    # of Collaborated Products: 20 results
  • 3.  TAKAGI Tsuyoshi (60404802)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 11 results
  • 4.  HORI Yoshiaki (90264126)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 34 results
  • 5.  NISHIDE Takashi (70570985)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 13 results
  • 6.  OOHAMA Yasutada (20243892)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 0 results
  • 7.  SUGITA Hiroshi (50192125)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 8.  ASAHIRO Yuichi (40304761)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 9.  TABATA Toshihiro (80359942)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 3 results
  • 10.  TAKAHASHI Kenichi (30399670)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 2 results
  • 11.  KOHDA Tohru (20038102)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 12.  FUJISAKI Hiroshi (80304757)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 13.  JITSUMATSU Yutaka (60336063)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 14.  Feng Yaokai (60363389)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 16 results
  • 15.  穴田 啓晃 (40727202)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 11 results
  • 16.  SU Chunhua (40716966)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 20 results
  • 17.  YAMASHITA Masafumi (00135419)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 18.  NAKANISHI Tsuneo (70311785)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 19.  MIYANO Eiji (10284548)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 20.  IWAMOTO Chuzo (60274495)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 21.  SAWADA Sunao (70235464)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 22.  MIYAZAKI Akio (70192763)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 23.  KAMATA Sei-ichiro (00204602)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 3 results
  • 24.  浅野 孝夫 (90124544)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 25.  徳山 豪 (40312631)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 26.  平田 富夫 (10144205)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 27.  酒井 康行 (80426585)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 2 results
  • 28.  川本 淳平 (10628473)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 7 results
  • 29.  FUKUDA Akira (80165282)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 30.  ARAKI Keiojiro (40117057)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 31.  OKAMURA Koji (70252830)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 32.  KITASUKA Teruaki (70343332)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 33.  HISAZUMI Keinji (10380685)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 34.  HASHIMOTO Yasufumi (30452733)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 35.  ARARAGI Tadashi (00396136)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 36.  TAKEUCHI Jun-ichi (80432871)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 37.  YASUDA Takanori (00464602)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 13 results
  • 38.  OGINO Hiroyuki (40144323)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 39.  YASUOKA Koichi (20230211)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 40.  OKABE Yasuo (20204018)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 41.  NISHI Testuo (40037908)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 42.  SUZUKI Masakazu (20112302)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 43.  SHIZUYA Hiroki (50196383)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 44.  TADA Mitsuru (20303331)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 45.  ITO Toshiya (20184674)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 46.  SHINODA Yoichi (50206108)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 47.  SATOH Takashi (30262281)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 48.  HIROTO Yasuura (80135540)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 49.  MURAKAMI Kazuaki (10200263)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 50.  KUROKI Yukinori (40234596)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 51.  SATO Toshinori (00322298)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 52.  SHINOZAKI Akihiko (00315045)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 53.  Matsumoto Shinichi (80624775)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 7 results
  • 54.  安田 公美 (40284484)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 55.  横尾 真 (20380678)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 56.  定兼 邦彦 (20323090)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 57.  溝口 佳寛 (80209783)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 58.  貞廣 泰造 (00280454)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 59.  藤田 聡 (40228995)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 60.  渡辺 治 (80158617)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 61.  伊藤 大雄 (50283487)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 62.  加藤 直樹 (40145826)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 63.  田中 圭介 (20334518)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 64.  浅野 哲夫 (90113133)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 65.  荒川 豊 (30424203)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 66.  柏木 雅英 (00257247)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 67.  VASILY Moshnyaga (40243050)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 68.  金谷 晴一 (40271077)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 69.  松永 裕介 (00336059)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 70.  井上 創造 (90346825)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 71.  井上 弘士 (80341410)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 72.  高原 尚志 (90340132)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 73.  李 鵬 (30735915)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 74.  Ben.A Abderazek (40468137)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 75.  策力 木格 (90596230)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 76.  大橋 正良 (50500154)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 77.  牟田 修 (80336065)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 78.  篠原 克寿 (50740429)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 79.  森 慎太郎 (90734913)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 80.  PAUL Purdom
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 81.  RUSSELL Impagliazzo
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 82.  TONIANN Pitassi
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 83.  OKAMOTO Tatsuaki
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 84.  OKEYA Katsuyuki
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 10 results
  • 85.  KAJIWARA Naoya
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 86.  HAN Chansu
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 87.  ONITSUKA Yuya
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 88.  IMPAGLIAZZO ラッセル
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 89.  PITASSI Toni
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 90.  岡本 達明
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 91.  酒井 康之
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 92.  Yung Moti
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 93.  Gollmann Dieter
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 94.  SAUER Kurt
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 95.  LIAN ZHUOTAO
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi