Search

Your search keyword '"Sakurai, Kouichi"' showing total 1,412 results

Search Constraints

Start Over You searched for: Author "Sakurai, Kouichi" Remove constraint Author: "Sakurai, Kouichi"
1,412 results on '"Sakurai, Kouichi"'

Search Results

103. A Competitive Three-Level Pruning Technique for Information Security

106. Fine-Grained Conditional Proxy Re-Encryption and Application

107. Security Model and Analysis of FHMQV, Revisited

108. An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency

109. Detection of Android API Call Using Logging Mechanism within Android Framework

112. Image Splicing Verification Based on Pixel-Based Alignment Method

113. Multivariate Signature Scheme Using Quadratic Forms

114. Supporting Secure Provenance Update by Keeping 'Provenance' of the Provenance

118. Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs

119. Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic

120. An Image Splicing Detection Based on Interpolation Analysis

121. Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model

122. Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography

123. Secure Keyword Search Using Bloom Filter with Specified Character Positions

124. Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks

125. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control

126. Differential Fault Analysis of Full LBlock

127. Reducing the Key Size of Rainbow Using Non-commutative Rings

129. General Fault Attacks on Multivariate Public Key Cryptosystems

130. A Security Analysis of Uniformly-Layered Rainbow : Revisiting Sato-Araki’s Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm

131. A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs : (Work-in-Progress)

132. Design and Implementation of Document Access Control Model Based on Role and Security Policy

133. Securing Location-Aware Services Based on Online/Offline Signatures in VANETs

134. A SMS-Based Mobile Botnet Using Flooding Algorithm

135. Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems

136. Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

137. A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

138. Distributed Paillier Cryptosystem without Trusted Dealer

142. Modeling and Containment of Search Worms Targeting Web Applications

143. Adaptive and Composable Non-committing Encryptions

144. Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance

147. K2 Stream Cipher

148. Efficient Intrusion Detection Based on Static Analysis and Stack Walks

149. Importance of Data Standardization in Privacy-Preserving K-Means Clustering

150. Formal Verification for Access Control in Web Information Sharing System

Catalog

Books, media, physical & digital resources