Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AI |
2006-11-10 10:00 |
Kyoto |
|
On securing open networks through trust and reputation - architecture, challenges and solutions Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
[more] |
AI2006-12 pp.1-6 |
AI |
2006-11-10 14:45 |
Kyoto |
|
On the combination of functionalities for key exchange protocol Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.) |
[more] |
AI2006-17 pp.29-33 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:15 |
Okayama |
Okayama Univ. |
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.) |
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more] |
ISEC2006-55 pp.115-122 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:40 |
Okayama |
Okayama Univ. |
Distributed Privacy-preserving Document Clustering Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-56 pp.123-130 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 15:20 |
Okayama |
Okayama Univ. |
Key-Management Scheme for Secure Multicast based on Network Topology Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-57 pp.131-135 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 15:45 |
Okayama |
Okayama Univ. |
Comparison of revocation problem between ID based encryption and biometric authentication schemes Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ) |
[more] |
ISEC2006-68 pp.211-215 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 16:10 |
Okayama |
Okayama Univ. |
A Design of DRM systems with hardware-based authentication Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-69 pp.217-222 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 16:35 |
Okayama |
Okayama Univ. |
A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-70 pp.223-228 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 17:00 |
Okayama |
Okayama Univ. |
Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
We introduce an original visualization design based on an interactive 3D
representation of the traffic between selected... [more] |
ISEC2006-71 pp.229-236 |
WBS, IT, ISEC |
2006-03-17 15:50 |
Aichi |
Nagoya Univ. |
Design of a Stream Cipher using Efficient Clock Control Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.) |
Various clock-controlled stream ciphers and attacks have been described in papers. However, few word-oriented algorithms... [more] |
IT2005-109 ISEC2005-166 WBS2005-123 pp.85-90 |
WBS, IT, ISEC |
2006-03-17 10:20 |
Aichi |
Nagoya Univ. |
Realization of the ID-based encryption scheme based on symmetric-key technique with Device characteristic value Hiromi Fukaya (Pastel), Kouichi Sakurai (CSCE) |
[more] |
IT2005-111 ISEC2005-168 WBS2005-125 pp.97-102 |
ISEC |
2005-12-16 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Effectiveness of Clock Control in a Clock-Controlled Stream Cipher Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs), Kouichi Sakurai (Kyushu Univ.) |
In this paper, we examine effectiveness for clock control in stream ciphers with the aim of protecting against distingui... [more] |
ISEC2005-112 pp.11-16 |
ISEC |
2005-12-16 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Report on the 4th International Workshop on Digital Watermarking (IWDW 2005) Tatsuya Toyofuku, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-120 pp.61-68 |
AI |
2005-10-21 14:10 |
Kyoto |
|
Design and Security Verification of One-time ID Key-Exchange Protocol by Modal Logic Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
In order to conceal user's identity from eavesdroppers and construct a system
with high scalability, we propose a thre... [more] |
AI2005-18 pp.19-24 |
ISEC |
2005-09-16 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Interactive Protocol for Privacy-preserving K-mean Clustering Chunhua Su, Kouichi Sakurai (Kyushu Univ.) |
Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with gre... [more] |
ISEC2005-83 pp.53-60 |
ISEC |
2005-09-16 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005) Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-88 pp.87-92 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:35 |
Iwate |
Iwate Prefectural University |
A Note of Intrusion Detection using Alteration of Data Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.) |
These days, Attacks which alter data in memory illegally are one of the most serious security threats.Although a lot of ... [more] |
ISEC2005-14 SITE2005-12 pp.37-44 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:10 |
Iwate |
Iwate Prefectural University |
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-38 SITE2005-36 pp.213-220 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT) |
[more] |
ISEC2005-52 pp.67-72 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:20 |
Iwate |
Iwate Prefectural University |
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-59 pp.117-122 |