|
Search the dblp DataBase
Toshiaki Tanaka:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Satoshi Hada, Toshiaki Tanaka
On the Existence of 3-Round Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:408-423 [Conf]
- Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:650-655 [Conf]
- Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. [Citation Graph (0, 0)][DBLP] MDM, 2006, pp:17- [Conf]
- Satoshi Hada, Toshiaki Tanaka
A Relationship between One-Wayness and Correlation Intractability. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:82-96 [Conf]
- Kenji Rikitake, Hiroki Nogawa, Toshiaki Tanaka, Koji Nakao, Shinji Shimojo
DNS Transport Size Issues in IPv6 Environment. [Citation Graph (0, 0)][DBLP] SAINT Workshops, 2004, pp:141-145 [Conf]
- Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura
Flexible License Transfer System Using Mobile Terminal. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:397-404 [Conf]
- Takeshi Tsuruga, Shuichi Ino, Tohru Ifukube, Mitsuru Sato, Toshiaki Tanaka, Takashi Izumi, Masahiko Muro
A basic study for a robotic transfer aid system based on human motion analysis. [Citation Graph (0, 0)][DBLP] Advanced Robotics, 2001, v:14, n:7, pp:579-595 [Journal]
- Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:287-295 [Journal]
- Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:182-189 [Journal]
- Koji Nakao, Sadao Obana, Satoshi Nishiyama, Toshiaki Tanaka
Feasibility Study for Worldwide Videotex Interworking. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1990, v:8, n:1, pp:80-92 [Journal]
- Toshiaki Tanaka, Tsutomu Kobayashi, Osamu Karatsu
HARP: FORTRAN to silicon [compilation system]. [Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 1989, v:8, n:6, pp:649-660 [Journal]
Security Verification for Authentication and Key Exchange Protocols, Revisited. [Citation Graph (, )][DBLP]
Denial of Service Attack Resilience on Area Expanded WLAN Services. [Citation Graph (, )][DBLP]
On-the-Fly Automatic Generation of Security Protocols. [Citation Graph (, )][DBLP]
Anonymous attribute authentication scheme using self-blindable certificates. [Citation Graph (, )][DBLP]
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. [Citation Graph (, )][DBLP]
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. [Citation Graph (, )][DBLP]
How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]
FPGA-Targeted Hardware Implementations of K2. [Citation Graph (, )][DBLP]
Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. [Citation Graph (, )][DBLP]
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. [Citation Graph (, )][DBLP]
Anonymous Prepaid Content Viewing System with Mobile Terminal. [Citation Graph (, )][DBLP]
Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]
Ternary Subset Difference Method and Its Quantitative Analysis. [Citation Graph (, )][DBLP]
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. [Citation Graph (, )][DBLP]
Anonymous handover mechanism for service mobility in heterogeneous wireless networks. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.009secs
|