|
Search the dblp DataBase
Shintaro Ueda:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada
ACTM: Anomaly Connection Tree Method to detect Silent Worms. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:901-908 [Conf]
- Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada
An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:253-256 [Conf]
- Shintaro Ueda, Shin-ichiro Kaneko, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada
Authenticating Video Streams. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:863-868 [Conf]
- Shintaro Ueda, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada
Stream Authentication Scheme for the use over the IP Telephony. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:164-169 [Conf]
Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|