The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shintaro Ueda: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada
    ACTM: Anomaly Connection Tree Method to detect Silent Worms. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:901-908 [Conf]
  2. Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada
    An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:253-256 [Conf]
  3. Shintaro Ueda, Shin-ichiro Kaneko, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada
    Authenticating Video Streams. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:863-868 [Conf]
  4. Shintaro Ueda, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada
    Stream Authentication Scheme for the use over the IP Telephony. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:164-169 [Conf]

  5. Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002