Author of the publication

A Traceable and Pseudonymous P2P Information Distribution System.

, and . COMPSAC Workshops, page 67-72. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coflow-Like Online Data Acquisition from Low-Earth-Orbit Datacenters., , , , and . IEEE Trans. Mob. Comput., 19 (12): 2743-2760 (2020)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)Identifying link layer home network topologies using HTIP., , , , and . CCNC, page 891-898. IEEE, (2017)Quality-aware energy routing toward on-demand home energy networking: (Position paper)., and . CCNC, page 1041-1044. IEEE, (2011)Improving Attack Detection Performance in NIDS Using GAN., , and . COMPSAC, page 817-825. IEEE, (2020)Centralized Control of Account Migration at Single Sign-On in Shibboleth., and . COMPSAC, page 1597-1603. IEEE, (2020)Parallel Computational Complexity of Logic Programs and Alternating Turing Machines., and . FGCS, page 356-363. OHMSHA Ltd. Tokyo and Springer-Verlag, (1988)A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)Pipelined Parallelization in HPF Programs on the Earth Simulator., and . ISHPC, volume 4759 of Lecture Notes in Computer Science, page 365-373. Springer, (2005)A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1282-1291 (2008)