The SCEAS System
Navigation Menu

Search the dblp DataBase


Atsushi Kara: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Atsushi Kara, Takahiro Suzuki, Kenta Takahashi, Masayuki Yoshikaw
    A DoS-Vulnerability Analysis of L2TP-VPN. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:397-402 [Conf]
  2. Yaser M. Asem, Atsushi Kara
    A Scalable Group Rekeying Scheme using Secret Mask Patterns. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:190-195 [Conf]
  3. Yaser Mohamed, Atsushi Kara
    Secret Keys Multiplication for Scalable Group Re-Keying. [Citation Graph (0, 0)][DBLP]
    CITA, 2003, pp:247-251 [Conf]
  4. Martin Hofmann 0006, Anne Usha, Souri Das, Kazuhiko Kawamura, Atsushi Kara, Ravi Rastogi
    Module: A Modular Programming Environment in Prolog. [Citation Graph (0, 0)][DBLP]
    ISMIS, 1987, pp:73-80 [Conf]
  5. Atsushi Kara
    Protecting Privacy in Remote-Patient Monitoring. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:5, pp:24-27 [Journal]
  6. Atsushi Kara
    Private-to-Private Communications over the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:5, pp:53-59 [Journal]

  7. Computing the Availability and MTTF of Shared Protection Systems. [Citation Graph (, )][DBLP]

  8. User-Perceived Reliability of Shared Protection Systems with a Finite Number of Repairers. [Citation Graph (, )][DBLP]

Search in 0.012secs, Finished in 0.012secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002