|
Search the dblp DataBase
Masakatu Morii:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Masakatu Morii, Yuzo Takamatsu
Exponetiation in Finite Fields Using Dual Basis Multiplier. [Citation Graph (0, 0)][DBLP] AAECC, 1990, pp:354-366 [Conf]
- Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
FMS Attack-Resistant WEP Implementation Is Still Broken. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:17-26 [Conf]
- Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
Visual Cryptographic Protocols Using the Trusted Initializer. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:112-122 [Conf]
- Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka
Reversible Watermark with Large Capacity Using the Predictive Coding. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:441-453 [Conf]
- Kiyomichi Araki, Masayuki Takada, Masakatu Morii
On the Efficient Decoding of Reed-Solomon Codes Based on GMD Criterion. [Citation Graph (0, 0)][DBLP] ISMVL, 1992, pp:138-145 [Conf]
- Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii
Remote Access VPN with Port Protection Function by Mobile Codes. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:16-26 [Conf]
- Masakatu Morii, Masao Kasahara
Perfect Staircase Profile of Linear Complexity for Finite Sequences. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1992, v:44, n:2, pp:85-89 [Journal]
- Masakatu Morii, Kazuhiko Iwasaki
A Note on Aliasing Probability for Multiple Input Signature Analyzer. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1993, v:42, n:9, pp:1152- [Journal]
- Masakatu Morii, Masao Kasahara
Generalized key-equation of remainder decoding algorithm for Reed-Solomon codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1992, v:38, n:6, pp:1801-0 [Journal]
- Masakatu Morii, Masao Kasahara, Douglas L. Whiting
Efficient bit-serial multiplication and the discrete-time Wiener-Hopf equation over finite fields. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1989, v:35, n:6, pp:1177-1183 [Journal]
- Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:28-43 [Conf]
Effective detection method for CDMA-based fingerprinting scheme. [Citation Graph (, )][DBLP]
Iterative Detection Method for CDMA-Based Fingerprinting Scheme. [Citation Graph (, )][DBLP]
On the systematic generation of Tardos's fingerprinting codes. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|