ここから本文です
研究室
情報セキュリティ研究室

Publications

 



2011

    1. Takanori Yasuda, Kouichi Sakurai,Tsuyoshi Takagi: Application of non-commutative rings to Multivariate Public Key Cryptosystems, September. 2011.
    1. Takanori Yasuda, Kouichi Sakurai: Revisited: Security of multivariate polynomial signatures over non-commutative rings, ISEC2011 (Information security), pp. 1-8 (ISEC2011-1), May. 2011.
    1. Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi: A note on the reduction of the size of keys of Rainbow, ISEC2011 (Information security), pp. 9-16 (ISEC2011-2), May. 2011.
    1. Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai: A study of communication route selection with consideration of security evaluation, The Second Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2011) in conjunction with SAINT2011 , pp. xxx-xxx, July. 2011.

 

Return to Top

2007

    1. Ken’ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya: An Approach of Trusted Program Generation for User-Responsible Privacy , The 4th International Conference on Ubiquitous Intelligence and Computing , to appear, Jul. 2007.
  1. Ken’ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai: An Approach of Program Analysis Prevention for Information Protection , 2007 International Conference on Multimedia and Ubiquitous Engineering , pp. 35-40, Apr. 2007 .
Return to Top

2006

    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Proposal of Biometric Authentication using One-Time Templates”, Symposium on Cryptography and Information Security 2006 (SCIS2006), Jan. 2006.
    1. Ryuzou Nishi, Kouichi Sakurai : “Efficient and Reliable Group Key Distribution Scheme with a Group Member’s Perspective”, Symposium on Cryptography and Information Security 2006 (SCIS2006), Jan. 2006.
    1. Kenichi Takahashi, Kouichi Sakurai : “A User-Oriented Private Information Protection Framework”, Symposium on Cryptography and Information Security 2006 (SCIS2006), Jan. 2006.
    1. Yong-Sork Her, Kenichi Takahashi, Kouichi Sakurai : “Report on eGOV05 Workshop and the Workshop Frontiers in Electronic Elections”, Symposium on Cryptography and Information Security 2006 (SCIS2006), Jan. 2006.
    1. Ken’ichi Takahashi, Kouichi Sakurai: “A Framework for the User-Oriented Personal Information Protection” , The 2006 International Conference on Security and Management , pp. 12-18, Jun. 2006.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Proposal of One-Time Biometric Authentication”, The 2006 International Conference on Security and Management (SAM’06), pp. pp.78-83, jun. 2006.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Proposal of Secure Storage in Biometoric Template Database”, Computer Security Symposimu 2006, pp. 651-655, Oct. 2006.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Proposal of Secure Storage Scheme in Biometric Template Database”, International Workshop on Universal Framework for Identity Documents 2006, pp. 25-31, Nov. 2006.
    1. E. Le Malecot, M. Kohara, Y. Hori and K. Sakurai. “Interactively Combining 2D and 3D Visualization for Network Traffic Monitoring”. In Proceedings of the 3rd International Workshop on Visualization for Computer Security (VizSEC06), pages 123-127, November 2006, USA.
    1. E. Le Malecot, M. Kohara, Y. Hori and K. Sakurai. “Grid Based Network Address Space Browsing for Network Traffic Visualization”. In Proceedings of the 7th IEEE Information Assurance Workshop (IAW06), pages 261-267, June 2006, USA.
    1. E. Le Malecot, M. Kohara, Y. Hori and K. Sakurai. “Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security”. In Proceedings of IPSJ-CSEC 2006, pages 459-466, July 2006, Japan.

 

Return to Top

2005

    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Survey of Digital Watermarking Techniques -A Report on International Workshop on Information Hiding, International Workshop on Digital Watermarking, Pacific Rim Workshop on Digital Steganography”, Symposium on Cryptography and Information Security 2005 (SCIS2005), pp. 1045-1050, Jan. 2005.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Study on Biometrics Authentication Protocol through the Internet and Security for Leakage of Massage of the Authentication Protocol”, Symposium on Cryptography and Information Security 2005 (SCIS2005), pp. 1165-1170 Jan. 2005.
    1. Kenichi Tanakashi, Satoshi Amamiya, Kouichi Sakurai, Masato Amamiya : “An Agent-based Framework for realizing Flexibible Service Use and Private Information Protection”, Symposium on Cryptography and Information Security 2005 (SCIS2005), pp. 1705-1710 Jan. 2005.
    1. Ryuzou Nishi, Kouichi Sakurai : “Efficient group key distribution scheme to decrease required rekey message length”, Symposium on Cryptography and Information Security 2005 (SCIS2005), pp. 1243-1248 Jan. 2005.
    1. Kenichi Tanakashi, Satoshi Amamiya, Makoto Amamiya : “A Model for Flexible Service Use and Secure Resource Management, Advances in Grid Computing”, EUG 2005, LNCS 3470, pp 1143-1153, Feb. 2005.
    1. Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai : “Trends and Issues for Security of Home-Network Based on Power Line Communication”, The First International Workshop on Ubiquitous Smart Worlds (USW’05), AINA2005 Vol.2, pp.655-660, Mar. 2005.
    1. Ryuzou Nishi, Kouichi Sakurai : “Group key distribution scheme for reducing required rekey message size”, The First International Workshop on Security in Networks and Distributed Systems (SNDS05), ICPAD2005 Vol.2, pp.280-284, Jul. 2005.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository”, IPSJ SIG Technical Reports, 2005-CSEC -30 (44), pp. 315-320, Jul. 2005.
    1. Kenichi Tanakashi, Satoshi Amamiya, Masato Amamiya : “A Resource management Model for Flexible Service Use and Private Resource Protection”, IEICE Trans. D-1 Sep. 2005.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository”, Proceeding: In Jianyung Zhou, Meng-Chou, Feng Bao, and Hwee-Hwa Pang, editor, The 4th Applied Public Key Infrastructure, IOS Press, pp. 115-169, Sep. 2005.
    1. Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya : “A Study of System for Private Information Protection”, Computer Security Symposium 2005, Oct. 2005.
    1. Yoshifumi Ueshige, Kouichi Sakurai : A Research on Attacks against Biometrics Authentication Process on Open Networks Computer Security Symposium 2005, Oct. 2005.
    1. Ryuzou Nishi, Kouichi Sakurai : “Key Revocation Scheme where Rekey Message Size is independent of Group Size”, Computer Security Symposium 2005, Oct. 2005.
    1. Kenichi Takahashi, Kouichi Sakurai, Makoto AmamiyaF”A Framework for Protecting Private Information through User-Trusted-Program and its Realizability”, UISW 2005, Dec. 2005

 

Return to Top

2004

    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Study on Confidentiality of Biometrics Information on Biometrics Authentication Process in BioPKI”, Computer Security Symposium 2004 (CSS2004), pp. 517-522, Oct. 2004.
    1. Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai : “A Consideration on Security of Home-Network Based on Power Line Communication”, Computer Security Symposium (CSS2004), Vol.2, pp.31-36, October 2004.
    1. Yoshifumi Ueshige, Kouichi Sakurai : “A Study on Assurance of Confidentiality for Biometrics Information on Biometrics Authentication Process in PKI”, The First Interdisciplinary Symposium on Information Security, Nov. 2004.
    1. Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai : “The Trend of the Power Line Communication and the Issues on the Security”, The First Interdisciplinary Symposium on Information Security, Nov. 2004.

 

Return to Top