Journals in DBLP
Akira Hayashi Foreword. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:1- [Journal ] Shinji Watanabe , Yasuhiro Minami , Atsushi Nakamura , Naonori Ueda Selection of Shared-State Hidden Markov Model Structure Using Bayesian Criterion. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:1-9 [Journal ] Jun Choi , Deukjo Hong , Seokhie Hong , Sangjin Lee Linear Attack Using Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:2-8 [Journal ] Kaoru Kurosawa , Tetsu Iwata , Quang Viet Duong How to Improve Interpolation Attack. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:9-15 [Journal ] Tetsuro Nishino , Yasuhiko Takenaga Foreword. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:10-11 [Journal ] Hiroshi Nagamochi On 2-Approximation to the Vertex-Connectivity in Graphs. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:12-16 [Journal ] Hiroki Sekine , Tetsuro Nosaka , Yasuo Hatano , Masaki Takeda , Toshinobu Kaneko A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:16-24 [Journal ] Kazuhiko Ushio , Hideaki Fujimoto Balanced Quatrefoil Decomposition of Complete Multigraphs. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:17-22 [Journal ] Md. Saidur Rahman , Noritsugu Egi , Takao Nishizeki No-Bend Orthogonal Drawings of Subdivisions of Planar Triconnected Cubic Graphs. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:23-30 [Journal ] Tetsu Iwata , Kaoru Kurosawa On the Security of a MAC by Mitchell. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:25-32 [Journal ] Hisao Hirakawa , Katsushi Inoue , Akira Ito Three-Way Two-Dimensional Deterministic Finite Automata with Rotated Inputs. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:31-38 [Journal ] Shoichi Hirose Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:33-38 [Journal ] Kazuo Iwama , Akinori Kawachi , Shigeru Yamashita Quantum Sampling for Balanced Allocations. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:39-46 [Journal ] Wonil Lee , Mridul Nandi , Palash Sarkar , Donghoon Chang , Sangjin Lee , Kouichi Sakurai PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:39-48 [Journal ] Kazuo Iwama , Akinori Kawachi Compact Routing with Stretch Factor of Less Than Three. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:47-52 [Journal ] Wonil Lee , Donghoon Chang , Sangjin Lee , Soo Hak Sung , Mridul Nandi Construction of UOWHF: Two New Parallel Methods. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:49-58 [Journal ] Yuki Kato , Hiroyuki Seki , Tadao Kasami On the Generative Power of Grammars for RNA Secondary Structure. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:53-64 [Journal ] Xiangyong Zeng , Lei Hu Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:59-66 [Journal ] Katsuhiko Nakamura Real-Time Recognition of Cyclic Strings by One-Way and Two-Way Cellular Automata. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:65-71 [Journal ] Kenji Hamano The Distribution of the Spectrum for the Discrete Fourier Transform Test Included in SP800-22. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:67-73 [Journal ] Taisuke Izumi , Toshimitsu Masuzawa Timed Uniform Atomic Broadcast in Presence of Crash and Timing Faults. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:72-81 [Journal ] Masao Kasahara , Ryuichi Sakai A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:74-80 [Journal ] Chisato Konoma , Masahiro Mambo , Hiroki Shizuya The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:81-88 [Journal ] Susumu Matsumae An Efficient Scaling-Simulation Algorithm of Reconfigurable Meshes by Meshes with Statically Partitioned Buses. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:82-88 [Journal ] Masaki Gonda , Kazuto Matsuo , Kazumaro Aoki , Jinhui Chao , Shigeo Tsujii Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:89-96 [Journal ] Shingo Omura , Hua Zheng , Koichi Wada Neighborhood Broadcasting in Undirected de Bruijn and Kautz Networks. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:89-95 [Journal ] Satoshi Inoue , Katsushi Inoue , Akira Ito , Yue Wang Path-Bounded One-Way Multihead Finite Automata. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:96-99 [Journal ] Tsutomu Iijima , Mahoro Shimura , Jinhui Chao , Shigeo Tsujii An Extension of GHS Weil Descent Attack. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:97-104 [Journal ] Akihiro Matsuura A Note on Approximating Inclusion-Exclusion for k -CNF Formulas. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:100-102 [Journal ] Marcel Crâsmaru On the Degree of Multivariate Polynomials over Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:103-108 [Journal ] Noboru Kunihiro Exact Analyses of Computational Time for Factoring in Quantum Computers. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:105-111 [Journal ] Michihiro Koibuchi , Akiya Jouraku , Hideharu Amano MMLRU Selection Function: A Simple and Efficient Output Selection Function in Adaptive Routing. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:109-118 [Journal ] Akito Monden , Antoine Monsifrot , Clark D. Thomborson Tamper-Resistant Software System Based on a Finite State Machine. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:112-122 [Journal ] Ruey-Shun Chen , Duen-Kai Chen , Szu-Yin Lin ACTAM: Cooperative Multi-Agent System Architecture for Urban Traffic Signal Control. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:119-126 [Journal ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume On the Importance of Protecting in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:123-131 [Journal ] Gang Chen , Zhonghua Yang , Hao He , Kiah Mok Goh Maintaining System State Information in a Multiagent Environment for Effective Learning. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:127-134 [Journal ] Toru Akishita , Tsuyoshi Takagi Zero-Value Register Attack on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:132-139 [Journal ] Kazunori Iwata , Kazushi Ikeda , Hideaki Sakai On the Effects of Domain Size and Complexity in Empirical Distribution of Reinforcement Learning. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:135-142 [Journal ] Toru Akishita , Tsuyoshi Takagi On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:140-146 [Journal ] Jin-Woo Bae , Seung-Hyun Lee , Ji-Sang Yoo An Efficient Wavelet-Based Motion Estimation Algorithm. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:143-149 [Journal ] Yuuki Tomoeda , Hideyuki Miyake , Atsushi Shimbo , Shin-ichi Kawamura An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:147-153 [Journal ] Won Seug Choi , Harksoo Kim , Jungyun Seo An Integrated Dialogue Analysis Model for Determining Speech Acts and Discourse Structures. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:150-157 [Journal ] Yasuyuki Sakai , Kouichi Sakurai On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:154-160 [Journal ] Hideyuki Ichihara , Michihiro Shintani , Tomoo Inoue Huffman-Based Test Response Coding. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:158-161 [Journal ] Tetsuya Izu , Tsuyoshi Takagi Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:161-171 [Journal ] Hu Xiaofeng , Ye Qingtai Adaptive Thresholding for Degraded Call Number Images. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:162-163 [Journal ] Chul-Gyu Song , Deok Won Kim The Application of Bioelectrical Impedance to Monitor Leg Movement. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:164-168 [Journal ] Jun Furukawa Efficient and Verifiable Shuffling and Shuffle-Decryption. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:172-188 [Journal ] Ryo Nojima , Yuichi Kaji Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:189-194 [Journal ] Norio Adachi , Satoshi Aoki , Yuichi Komano , Kazuo Ohta Solutions to Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:195-202 [Journal ] Tomoyuki Asano Reducing Receiver's Storage in CS, SD and LSD Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:203-210 [Journal ] Koji Chida , Masayuki Abe Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:211-221 [Journal ] Yasuhiro Ohtaki , Masaru Kamada , Kaoru Kurosawa A Scheme for Partial Disclosure of Transaction Log. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:222-229 [Journal ] Natsuki Ishida , Shin'ichiro Matsuo , Wakaha Ogata Efficient Divisible Voting Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:230-238 [Journal ] Kunihiko Miyazaki , Mitsuru Iwamura , Tsutomu Matsumoto , Ryôichi Sasaki , Hiroshi Yoshiura , Satoru Tezuka , Hideki Imai Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal ] Satoshi Koga , Kouichi Sakurai Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:247-254 [Journal ] Makoto Yokoo , Koutarou Suzuki Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:255-261 [Journal ] Shingo Okamura , Yoshiyuki Konishi , Maki Yoshida , Toru Fujiwara Unlinkable Delivery System for Interactive Dramas. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:262-269 [Journal ] Hyung Chan Kim , R. S. Ramakrishna , Kouichi Sakurai A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:270-279 [Journal ] Akio Ogihara , Hitoshi Unno , Akira Shiozaki Discrimination Method of Synthetic Speech Using Pitch Frequency against Synthetic Speech Falsification. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:280-286 [Journal ] Haruki Ota , Shinsaku Kiyomoto , Toshiaki Tanaka Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:287-295 [Journal ] Katsunari Yoshioka , Junji Shikata , Tsutomu Matsumoto On Collusion Security of Random Codes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:296-304 [Journal ] Xiangyong Zeng , Lei Hu Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:305-310 [Journal ] Takayasu Kaida A Typical Profile of the k-Error Linear Complexity for Balanced Binary Sequences with Period 2n. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:311-313 [Journal ] Yan Liu , Dong Zheng , Jiying Zhao A Rectification Scheme for RST Invariant Image Watermarking. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:314-318 [Journal ] Eun-Jun Yoon , Eun-Kyung Ryu , Kee-Young Yoo Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:319-321 [Journal ] Kouya Tochikubo , Tomohiko Uyematsu , Ryutaroh Matsumoto Efficient Secret Sharing Schemes Based on Authorized Subsets. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:322-326 [Journal ] Wook Shin , Jeong-Gun Lee , Hong Kook Kim , Kouichi Sakurai Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:327-330 [Journal ] Dong-Wook Lee , Dong-Soo Har An Area Efficient Approach to Design Self-Timed Cryptosystems Combatting DPA Attack. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:331-333 [Journal ] Hernán E. Aguirre , Kiyoshi Tanaka Random Bit Climbers on Multiobjective MNK-Landscapes: Effects of Memory and Population Climbing. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:334-345 [Journal ] Ming-Chien Yang , Tseng-Kuei Li , Jimmy J. M. Tan , Lih-Hsing Hsu Fault-Tolerant Pancyclicity of the Möbius Cubes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:346-352 [Journal ] Haibin Kan , Hong Shen Trellis Properties of Product Codes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:353-358 [Journal ] Ching-Lung Chr , Szu-Lin Su , Shao-Wei Wu A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:359-365 [Journal ] Fumihito Sasamori , Shiro Handa , Shinjiro Oshita A Simple Method of BER Calculation in DPSK/OFDM Systems over Fading Channels. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:366-373 [Journal ] Guo-rui Feng , Ling-ge Jiang , Chen He Permutation-Based Semi-Fragile Watermark Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:374-377 [Journal ] Young-Hwan You , Min-goo Kang , Han-Jong Kim , Pan-Yuh Joo , Hyoung-Kyu Song Crest Factor Reduction for Complex Multi-Carrier Signal Processing. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:378-380 [Journal ] Hing-Cheung So , Chi-Tim Leung A Simple Improvement to Tufts-Kumaresan Method for Multiple Sinusoidal Frequency Estimation. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:381-383 [Journal ] Won-Sup Chung , Hyeong-Woo Cha , Sang-Hee Son A Low-Voltage Low-Power Bipolar Transconductor with High-Linearity. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:384-386 [Journal ] Seung Ho Jang , Sang Woo Kim A New Sliding Surface Design Method of Linear Systems with Mismatched Uncertainties. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:387-391 [Journal ] Enjian Bai , Xiaotong Fu , Guozhen Xiao On the Linear Complexity of Generalized Cyclotomic Sequences of Order Four Over Zpq. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:392-395 [Journal ] Wen Ping Ma , Moon Ho Lee Complex Hadamard Codes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:396-398 [Journal ] Akira Muraya , Tadashi Matsumoto , Seiichiro Moro , Haruo Hasegawa All Fundamental Particular Solutions are Needed to Express an Arbitrary Firing Count Vector in Petri Nets. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:399-404 [Journal ]