The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Toshiaki Tanaka: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Satoshi Hada, Toshiaki Tanaka
    On the Existence of 3-Round Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:408-423 [Conf]
  2. Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka
    Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:650-655 [Conf]
  3. Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka
    Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. [Citation Graph (0, 0)][DBLP]
    MDM, 2006, pp:17- [Conf]
  4. Satoshi Hada, Toshiaki Tanaka
    A Relationship between One-Wayness and Correlation Intractability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:82-96 [Conf]
  5. Kenji Rikitake, Hiroki Nogawa, Toshiaki Tanaka, Koji Nakao, Shinji Shimojo
    DNS Transport Size Issues in IPv6 Environment. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:141-145 [Conf]
  6. Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura
    Flexible License Transfer System Using Mobile Terminal. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:397-404 [Conf]
  7. Takeshi Tsuruga, Shuichi Ino, Tohru Ifukube, Mitsuru Sato, Toshiaki Tanaka, Takashi Izumi, Masahiko Muro
    A basic study for a robotic transfer aid system based on human motion analysis. [Citation Graph (0, 0)][DBLP]
    Advanced Robotics, 2001, v:14, n:7, pp:579-595 [Journal]
  8. Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
    Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:287-295 [Journal]
  9. Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
    New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:182-189 [Journal]
  10. Koji Nakao, Sadao Obana, Satoshi Nishiyama, Toshiaki Tanaka
    Feasibility Study for Worldwide Videotex Interworking. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:1, pp:80-92 [Journal]
  11. Toshiaki Tanaka, Tsutomu Kobayashi, Osamu Karatsu
    HARP: FORTRAN to silicon [compilation system]. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1989, v:8, n:6, pp:649-660 [Journal]

  12. Security Verification for Authentication and Key Exchange Protocols, Revisited. [Citation Graph (, )][DBLP]


  13. Denial of Service Attack Resilience on Area Expanded WLAN Services. [Citation Graph (, )][DBLP]


  14. On-the-Fly Automatic Generation of Security Protocols. [Citation Graph (, )][DBLP]


  15. Anonymous attribute authentication scheme using self-blindable certificates. [Citation Graph (, )][DBLP]


  16. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. [Citation Graph (, )][DBLP]


  17. Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. [Citation Graph (, )][DBLP]


  18. How to Bootstrap Security for Ad-Hoc Network: Revisited. [Citation Graph (, )][DBLP]


  19. FPGA-Targeted Hardware Implementations of K2. [Citation Graph (, )][DBLP]


  20. Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. [Citation Graph (, )][DBLP]


  21. K2: A Stream Cipher Algorithm using Dynamic Feedback Control. [Citation Graph (, )][DBLP]


  22. Anonymous Prepaid Content Viewing System with Mobile Terminal. [Citation Graph (, )][DBLP]


  23. Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]


  24. Ternary Subset Difference Method and Its Quantitative Analysis. [Citation Graph (, )][DBLP]


  25. Obfuscation Mechanism in Conjunction with Tamper-Proof Module. [Citation Graph (, )][DBLP]


  26. Anonymous handover mechanism for service mobility in heterogeneous wireless networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002