Sakurai, Kouichi
366  results:
Search for persons X
?
1

SoK: Directions and Issues in Formal Verification of Paymen..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Sakurada, Hideki ; Sakurai, Kouichi - p. 111-119 , 2024
 
?
2

A Multi-Head Federated Continual Learning Approach for Impr..:

Chen, Chunlu ; Wang, Kevin I-Kai ; Li, Peng.
International Journal of Networking and Computing.  14 (2024)  2 - p. 123-144 , 2024
 
?
3

Extension of Resource Authorization Method with SSI in Edge..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Watanabe, Ryu ; Kubota, Ayumu ; Kurihara, Jun. - p. 385-394 , 2024
 
?
4

A Design of Internet of Vehicles System Incorporating Light..:

, In: 2024 18th International Conference on Ubiquitous Information Management and Communication (IMCOM),
 
?
5

Design and Performance Evaluation of a Two-Stage Detection ..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Lyu, Yang ; Feng, Yaokai ; Sakurai, Kouichi - p. 133-144 , 2024
 
?
6

Experimental Exploration of the Power of Conditional GAN in..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Zhang, Haibo ; Sakurai, Kouichi - p. 151-162 , 2024
 
?
7

Research Directions in Formal Verification of Network Confi..:

, In: Communications in Computer and Information Science; Mobile Internet Security,
Sakurada, Hideki ; Sakurai, Kouichi - p. 248-259 , 2024
 
?
8

Enhancing Security and Efficiency: A Lightweight Federated ..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Chen, Chunlu ; Wang, Kevin I-Kai ; Li, Peng. - p. 349-359 , 2024
 
?
9

A statistical verification method of random permutations fo..:

Park, Jong-Yeon ; Ju, Jang-Won ; Lee, Wonil...
Journal of Information Security and Applications.  84 (2024)  - p. 103797 , 2024
 
?
10

Towards Evaluating the Security of Human Computable Passwor..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Murata, Issei ; He, Pengju ; Gu, Yujie. - p. 303-312 , 2023
 
?
11

POSTER: Advancing Federated Edge Computing with Continual L..:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
Chen, Chunlu ; Wang, Kevin I-Kai ; Li, Peng. - p. 685-689 , 2023
 
?
12

Application and Limitations of Digital Signature Schemes fo..:

, In: Proceedings of the 2023 4th Asia Service Sciences and Software Engineering Conference,
Ikebe, Kei ; Hata, Yudai ; Nakamura, Toru.. - p. 119-125 , 2023
 
?
13

Explicit Non-malleable Codes from Bipartite Graphs:

, In: Arithmetic of Finite Fields; Lecture Notes in Computer Science,
Satake, Shohei ; Gu, Yujie ; Sakurai, Kouichi - p. 221-236 , 2023
 
?
14

Flexibility and Privacy: A Multi-Head Federated Continual L..:

, In: 2023 Eleventh International Symposium on Computing and Networking (CANDAR),
Chen, Chunlu ; Wang, Kevin I-Kai ; Li, Peng. - p. 1-10 , 2023
 
1-15