1,412 results on '"Sakurai, Kouichi"'
Search Results
102. Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions
103. A Competitive Three-Level Pruning Technique for Information Security
104. Implementation of Efficient Operations over GF(232) Using Graphics Processing Units
105. Efficient Variant of Rainbow without Triangular Matrix Representation
106. Fine-Grained Conditional Proxy Re-Encryption and Application
107. Security Model and Analysis of FHMQV, Revisited
108. An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency
109. Detection of Android API Call Using Logging Mechanism within Android Framework
110. Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud
111. Analysis of Methods for Detecting Compromised Nodes and its Countermeasures
112. Image Splicing Verification Based on Pixel-Based Alignment Method
113. Multivariate Signature Scheme Using Quadratic Forms
114. Supporting Secure Provenance Update by Keeping 'Provenance' of the Provenance
115. Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme
116. Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries
117. Adaptive and Composable Non-interactive String-Commitment Protocols
118. Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs
119. Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic
120. An Image Splicing Detection Based on Interpolation Analysis
121. Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model
122. Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography
123. Secure Keyword Search Using Bloom Filter with Specified Character Positions
124. Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks
125. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control
126. Differential Fault Analysis of Full LBlock
127. Reducing the Key Size of Rainbow Using Non-commutative Rings
128. Realizing Proxy Re-encryption in the Symmetric World
129. General Fault Attacks on Multivariate Public Key Cryptosystems
130. A Security Analysis of Uniformly-Layered Rainbow : Revisiting Sato-Araki’s Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm
131. A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs : (Work-in-Progress)
132. Design and Implementation of Document Access Control Model Based on Role and Security Policy
133. Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
134. A SMS-Based Mobile Botnet Using Flooding Algorithm
135. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems
136. Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit
137. A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane
138. Distributed Paillier Cryptosystem without Trusted Dealer
139. A two-stage detection system of DDoS attacks in SDN using a trigger with multiple features and self-adaptive thresholds
140. Current Perspectives on Securing Critical Infrastructures’ Supply Chains
141. Federated Learning with Clustering-Based Participant Selection for IoT Applications
142. Modeling and Containment of Search Worms Targeting Web Applications
143. Adaptive and Composable Non-committing Encryptions
144. Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
145. Reconsidering Data Logging in Light of Digital Forensics
146. Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks
147. K2 Stream Cipher
148. Efficient Intrusion Detection Based on Static Analysis and Stack Walks
149. Importance of Data Standardization in Privacy-Preserving K-Means Clustering
150. Formal Verification for Access Control in Web Information Sharing System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.