The SCEAS System
Navigation Menu

Journals in DBLP

IEICE Transactions
2005, volume: 88, number: 1

  1. Akira Hayashi
    Foreword. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:1- [Journal]
  2. Shinji Watanabe, Yasuhiro Minami, Atsushi Nakamura, Naonori Ueda
    Selection of Shared-State Hidden Markov Model Structure Using Bayesian Criterion. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:1-9 [Journal]
  3. Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee
    Linear Attack Using Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:2-8 [Journal]
  4. Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong
    How to Improve Interpolation Attack. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:9-15 [Journal]
  5. Tetsuro Nishino, Yasuhiko Takenaga
    Foreword. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:10-11 [Journal]
  6. Hiroshi Nagamochi
    On 2-Approximation to the Vertex-Connectivity in Graphs. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:12-16 [Journal]
  7. Hiroki Sekine, Tetsuro Nosaka, Yasuo Hatano, Masaki Takeda, Toshinobu Kaneko
    A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:16-24 [Journal]
  8. Kazuhiko Ushio, Hideaki Fujimoto
    Balanced Quatrefoil Decomposition of Complete Multigraphs. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:17-22 [Journal]
  9. Md. Saidur Rahman, Noritsugu Egi, Takao Nishizeki
    No-Bend Orthogonal Drawings of Subdivisions of Planar Triconnected Cubic Graphs. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:23-30 [Journal]
  10. Tetsu Iwata, Kaoru Kurosawa
    On the Security of a MAC by Mitchell. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:25-32 [Journal]
  11. Hisao Hirakawa, Katsushi Inoue, Akira Ito
    Three-Way Two-Dimensional Deterministic Finite Automata with Rotated Inputs. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:31-38 [Journal]
  12. Shoichi Hirose
    Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:33-38 [Journal]
  13. Kazuo Iwama, Akinori Kawachi, Shigeru Yamashita
    Quantum Sampling for Balanced Allocations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:39-46 [Journal]
  14. Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
    PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:39-48 [Journal]
  15. Kazuo Iwama, Akinori Kawachi
    Compact Routing with Stretch Factor of Less Than Three. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:47-52 [Journal]
  16. Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi
    Construction of UOWHF: Two New Parallel Methods. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:49-58 [Journal]
  17. Yuki Kato, Hiroyuki Seki, Tadao Kasami
    On the Generative Power of Grammars for RNA Secondary Structure. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:53-64 [Journal]
  18. Xiangyong Zeng, Lei Hu
    Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:59-66 [Journal]
  19. Katsuhiko Nakamura
    Real-Time Recognition of Cyclic Strings by One-Way and Two-Way Cellular Automata. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:65-71 [Journal]
  20. Kenji Hamano
    The Distribution of the Spectrum for the Discrete Fourier Transform Test Included in SP800-22. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:67-73 [Journal]
  21. Taisuke Izumi, Toshimitsu Masuzawa
    Timed Uniform Atomic Broadcast in Presence of Crash and Timing Faults. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:72-81 [Journal]
  22. Masao Kasahara, Ryuichi Sakai
    A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:74-80 [Journal]
  23. Chisato Konoma, Masahiro Mambo, Hiroki Shizuya
    The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:81-88 [Journal]
  24. Susumu Matsumae
    An Efficient Scaling-Simulation Algorithm of Reconfigurable Meshes by Meshes with Statically Partitioned Buses. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:82-88 [Journal]
  25. Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii
    Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:89-96 [Journal]
  26. Shingo Omura, Hua Zheng, Koichi Wada
    Neighborhood Broadcasting in Undirected de Bruijn and Kautz Networks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:89-95 [Journal]
  27. Satoshi Inoue, Katsushi Inoue, Akira Ito, Yue Wang
    Path-Bounded One-Way Multihead Finite Automata. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:96-99 [Journal]
  28. Tsutomu Iijima, Mahoro Shimura, Jinhui Chao, Shigeo Tsujii
    An Extension of GHS Weil Descent Attack. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:97-104 [Journal]
  29. Akihiro Matsuura
    A Note on Approximating Inclusion-Exclusion for k-CNF Formulas. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:100-102 [Journal]
  30. Marcel Crâsmaru
    On the Degree of Multivariate Polynomials over Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:103-108 [Journal]
  31. Noboru Kunihiro
    Exact Analyses of Computational Time for Factoring in Quantum Computers. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:105-111 [Journal]
  32. Michihiro Koibuchi, Akiya Jouraku, Hideharu Amano
    MMLRU Selection Function: A Simple and Efficient Output Selection Function in Adaptive Routing. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:109-118 [Journal]
  33. Akito Monden, Antoine Monsifrot, Clark D. Thomborson
    Tamper-Resistant Software System Based on a Finite State Machine. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:112-122 [Journal]
  34. Ruey-Shun Chen, Duen-Kai Chen, Szu-Yin Lin
    ACTAM: Cooperative Multi-Agent System Architecture for Urban Traffic Signal Control. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:119-126 [Journal]
  35. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Importance of Protecting in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:123-131 [Journal]
  36. Gang Chen, Zhonghua Yang, Hao He, Kiah Mok Goh
    Maintaining System State Information in a Multiagent Environment for Effective Learning. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:127-134 [Journal]
  37. Toru Akishita, Tsuyoshi Takagi
    Zero-Value Register Attack on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:132-139 [Journal]
  38. Kazunori Iwata, Kazushi Ikeda, Hideaki Sakai
    On the Effects of Domain Size and Complexity in Empirical Distribution of Reinforcement Learning. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:135-142 [Journal]
  39. Toru Akishita, Tsuyoshi Takagi
    On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:140-146 [Journal]
  40. Jin-Woo Bae, Seung-Hyun Lee, Ji-Sang Yoo
    An Efficient Wavelet-Based Motion Estimation Algorithm. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:143-149 [Journal]
  41. Yuuki Tomoeda, Hideyuki Miyake, Atsushi Shimbo, Shin-ichi Kawamura
    An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:147-153 [Journal]
  42. Won Seug Choi, Harksoo Kim, Jungyun Seo
    An Integrated Dialogue Analysis Model for Determining Speech Acts and Discourse Structures. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:150-157 [Journal]
  43. Yasuyuki Sakai, Kouichi Sakurai
    On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:154-160 [Journal]
  44. Hideyuki Ichihara, Michihiro Shintani, Tomoo Inoue
    Huffman-Based Test Response Coding. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:158-161 [Journal]
  45. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:161-171 [Journal]
  46. Hu Xiaofeng, Ye Qingtai
    Adaptive Thresholding for Degraded Call Number Images. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:162-163 [Journal]
  47. Chul-Gyu Song, Deok Won Kim
    The Application of Bioelectrical Impedance to Monitor Leg Movement. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:164-168 [Journal]
  48. Jun Furukawa
    Efficient and Verifiable Shuffling and Shuffle-Decryption. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:172-188 [Journal]
  49. Ryo Nojima, Yuichi Kaji
    Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:189-194 [Journal]
  50. Norio Adachi, Satoshi Aoki, Yuichi Komano, Kazuo Ohta
    Solutions to Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:195-202 [Journal]
  51. Tomoyuki Asano
    Reducing Receiver's Storage in CS, SD and LSD Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:203-210 [Journal]
  52. Koji Chida, Masayuki Abe
    Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:211-221 [Journal]
  53. Yasuhiro Ohtaki, Masaru Kamada, Kaoru Kurosawa
    A Scheme for Partial Disclosure of Transaction Log. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:222-229 [Journal]
  54. Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
    Efficient Divisible Voting Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:230-238 [Journal]
  55. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
    Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
  56. Satoshi Koga, Kouichi Sakurai
    Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:247-254 [Journal]
  57. Makoto Yokoo, Koutarou Suzuki
    Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:255-261 [Journal]
  58. Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
    Unlinkable Delivery System for Interactive Dramas. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:262-269 [Journal]
  59. Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai
    A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:270-279 [Journal]
  60. Akio Ogihara, Hitoshi Unno, Akira Shiozaki
    Discrimination Method of Synthetic Speech Using Pitch Frequency against Synthetic Speech Falsification. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:280-286 [Journal]
  61. Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
    Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:287-295 [Journal]
  62. Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
    On Collusion Security of Random Codes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:296-304 [Journal]
  63. Xiangyong Zeng, Lei Hu
    Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:305-310 [Journal]
  64. Takayasu Kaida
    A Typical Profile of the k-Error Linear Complexity for Balanced Binary Sequences with Period 2n. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:311-313 [Journal]
  65. Yan Liu, Dong Zheng, Jiying Zhao
    A Rectification Scheme for RST Invariant Image Watermarking. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:314-318 [Journal]
  66. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
    Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:319-321 [Journal]
  67. Kouya Tochikubo, Tomohiko Uyematsu, Ryutaroh Matsumoto
    Efficient Secret Sharing Schemes Based on Authorized Subsets. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:322-326 [Journal]
  68. Wook Shin, Jeong-Gun Lee, Hong Kook Kim, Kouichi Sakurai
    Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:327-330 [Journal]
  69. Dong-Wook Lee, Dong-Soo Har
    An Area Efficient Approach to Design Self-Timed Cryptosystems Combatting DPA Attack. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:331-333 [Journal]
  70. Hernán E. Aguirre, Kiyoshi Tanaka
    Random Bit Climbers on Multiobjective MNK-Landscapes: Effects of Memory and Population Climbing. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:334-345 [Journal]
  71. Ming-Chien Yang, Tseng-Kuei Li, Jimmy J. M. Tan, Lih-Hsing Hsu
    Fault-Tolerant Pancyclicity of the Möbius Cubes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:346-352 [Journal]
  72. Haibin Kan, Hong Shen
    Trellis Properties of Product Codes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:353-358 [Journal]
  73. Ching-Lung Chr, Szu-Lin Su, Shao-Wei Wu
    A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:359-365 [Journal]
  74. Fumihito Sasamori, Shiro Handa, Shinjiro Oshita
    A Simple Method of BER Calculation in DPSK/OFDM Systems over Fading Channels. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:366-373 [Journal]
  75. Guo-rui Feng, Ling-ge Jiang, Chen He
    Permutation-Based Semi-Fragile Watermark Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:374-377 [Journal]
  76. Young-Hwan You, Min-goo Kang, Han-Jong Kim, Pan-Yuh Joo, Hyoung-Kyu Song
    Crest Factor Reduction for Complex Multi-Carrier Signal Processing. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:378-380 [Journal]
  77. Hing-Cheung So, Chi-Tim Leung
    A Simple Improvement to Tufts-Kumaresan Method for Multiple Sinusoidal Frequency Estimation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:381-383 [Journal]
  78. Won-Sup Chung, Hyeong-Woo Cha, Sang-Hee Son
    A Low-Voltage Low-Power Bipolar Transconductor with High-Linearity. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:384-386 [Journal]
  79. Seung Ho Jang, Sang Woo Kim
    A New Sliding Surface Design Method of Linear Systems with Mismatched Uncertainties. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:387-391 [Journal]
  80. Enjian Bai, Xiaotong Fu, Guozhen Xiao
    On the Linear Complexity of Generalized Cyclotomic Sequences of Order Four Over Zpq. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:392-395 [Journal]
  81. Wen Ping Ma, Moon Ho Lee
    Complex Hadamard Codes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:396-398 [Journal]
  82. Akira Muraya, Tadashi Matsumoto, Seiichiro Moro, Haruo Hasegawa
    All Fundamental Particular Solutions are Needed to Express an Arbitrary Firing Count Vector in Petri Nets. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:399-404 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002