Author of the publication

Implementation method of high speed protocol as transport library.

, , and . ICNP, page 172-179. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Implementation of KCipher-2 for Software and Hardware., , , , , , and . IEICE Trans. Inf. Syst., 97-D (1): 43-52 (2014)Remote Attestation for HDD Files Using Kernel Protection Mechanism., , , and . ICC, page 1-6. IEEE, (2010)Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data., , , and . IoTBDS, page 78-87. SCITEPRESS, (2020)Secure Host Name Resolution Infrastructure for Overlay Networks., , and . IEICE Trans. Commun., 89-B (9): 2434-2439 (2006)A new timing extraction method and data interpolation for block demodulation., , and . ICASSP, page 1223-1226. IEEE, (1989)Interoperability Testing System of TCP/IP Based Systems in Operational Environment., , , , , and . TestCom, volume 176 of IFIP Conference Proceedings, page 143-. Kluwer, (2000)Cross-Domain Access Control via PKI., , and . POLICY, page 202-205. IEEE Computer Society, (2002)Identification of an IoT Device Model in the Home Domain Using IPFIX Records., , , and . COMPSAC, page 583-592. IEEE, (2022)On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters., , and . TrustCom, page 1755-1762. IEEE Computer Society, (2012)Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure., , , , , , and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 169-183. Springer, (2013)