The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Masakatu Morii: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masakatu Morii, Yuzo Takamatsu
    Exponetiation in Finite Fields Using Dual Basis Multiplier. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:354-366 [Conf]
  2. Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
    FMS Attack-Resistant WEP Implementation Is Still Broken. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:17-26 [Conf]
  3. Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
    Visual Cryptographic Protocols Using the Trusted Initializer. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:112-122 [Conf]
  4. Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka
    Reversible Watermark with Large Capacity Using the Predictive Coding. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:441-453 [Conf]
  5. Kiyomichi Araki, Masayuki Takada, Masakatu Morii
    On the Efficient Decoding of Reed-Solomon Codes Based on GMD Criterion. [Citation Graph (0, 0)][DBLP]
    ISMVL, 1992, pp:138-145 [Conf]
  6. Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii
    Remote Access VPN with Port Protection Function by Mobile Codes. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:16-26 [Conf]
  7. Masakatu Morii, Masao Kasahara
    Perfect Staircase Profile of Linear Complexity for Finite Sequences. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1992, v:44, n:2, pp:85-89 [Journal]
  8. Masakatu Morii, Kazuhiko Iwasaki
    A Note on Aliasing Probability for Multiple Input Signature Analyzer. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1993, v:42, n:9, pp:1152- [Journal]
  9. Masakatu Morii, Masao Kasahara
    Generalized key-equation of remainder decoding algorithm for Reed-Solomon codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1992, v:38, n:6, pp:1801-0 [Journal]
  10. Masakatu Morii, Masao Kasahara, Douglas L. Whiting
    Efficient bit-serial multiplication and the discrete-time Wiener-Hopf equation over finite fields. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:6, pp:1177-1183 [Journal]
  11. Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii
    Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:28-43 [Conf]

  12. Effective detection method for CDMA-based fingerprinting scheme. [Citation Graph (, )][DBLP]


  13. Iterative Detection Method for CDMA-Based Fingerprinting Scheme. [Citation Graph (, )][DBLP]


  14. On the systematic generation of Tardos's fingerprinting codes. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002