Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

13 results
Image document

A SMS-Based Mobile Botnet Using Flooding Algorithm

Jingyu Hua , Kouichi Sakurai
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.264-279, ⟨10.1007/978-3-642-21040-2_19⟩
Conference papers hal-01573306v1
Image document

Strength of Relationship Between Multi-labeled Data and Labels

Masahiro Kuzunishi , Tetsuya Furukawa
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.99-108, ⟨10.1007/978-3-319-24315-3_10⟩
Conference papers hal-01466209v1
Image document

Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse

Chunlu Chen , Hiroaki Anada , Junpei Kawamoto , Kouichi Sakurai
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.255-264, ⟨10.1007/978-3-319-24315-3_26⟩
Conference papers hal-01466227v1
Image document

Implementation of Efficient Operations over GF(232) Using Graphics Processing Units

Satoshi Tanaka , Takanori Yasuda , Kouichi Sakurai
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.602-611, ⟨10.1007/978-3-642-55032-4_62⟩
Conference papers hal-01397276v1
Image document

A Tabletop System Using Infrared Image Recognition for Multi-user Identification

Shota Suto , Susumu Shibusawa
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.55-62, ⟨10.1007/978-3-642-40480-1_4⟩
Conference papers hal-01501783v1
Image document

Efficient Variant of Rainbow without Triangular Matrix Representation

Takanori Yasuda , Tsuyoshi Takagi , Kouichi Sakurai
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.532-541, ⟨10.1007/978-3-642-55032-4_55⟩
Conference papers hal-01397267v1
Image document

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs

Chul Sur , Youngho Park , Takashi Nishide , Kouichi Sakurai , Kyung Hyune Rhee
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.271-285, ⟨10.1007/978-3-642-23300-5_21⟩
Conference papers hal-01590395v1
Image document

A Data Structure for Efficient Biometric Identification

Kensuke Baba , Serina Egawa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers hal-01480259v1
Image document

Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance

Amril Syalim , Takashi Nishide , Kouichi Sakurai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.363-372, ⟨10.1007/978-3-642-36818-9_40⟩
Conference papers hal-01480195v1
Image document

Analyzing Brain Waves for Activity Recognition of Learners

Hiromichi Abe , Kazuya Kinoshita , Kensuke Baba , Shigeru Takano , Kazuaki Murakami
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.64-73, ⟨10.1007/978-3-319-24315-3_7⟩
Conference papers hal-01466252v1
Image document

Predictive Input Interface of Mathematical Formulas

Yoshinori Hijikata , Keisuke Horie , Shogo Nishida
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.383-400, ⟨10.1007/978-3-642-40483-2_27⟩
Conference papers hal-01497449v1
Image document

Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance

Amril Syalim , Takashi Nishide , Kouichi Sakurai
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.311-318, ⟨10.1007/978-3-642-13739-6_22⟩
Conference papers hal-01056678v1
Image document

Similarity of Transactions for Customer Segmentation

Ke Lu , Tetsuya Furukawa
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.347-359, ⟨10.1007/978-3-642-32498-7_26⟩
Conference papers hal-01542433v1