Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delivering CRL with Low Bit Rate Network Coded Communication for ITS., , , and . IEICE Trans. Inf. Syst., 100-D (10): 2440-2448 (2017)A Probabilistic Algorithm for Computing the Weight Distribution of LDPC Codes., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (7): 1677-1689 (2009)Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection., , , and . IEEE Access, (2020)LCE in-network caching on vehicular networks for content distribution in urban environments., , , , and . ICUFN, page 551-556. IEEE, (2015)Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices., , , , and . AsiaJCIS, page 127-133. IEEE, (2019)Understanding Attack Trends from Security Blog Posts Using Guided-topic Model., , , , , , , and . J. Inf. Process., (2019)Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV., , , and . Future Internet, 14 (1): 12 (2022)A Malicious Web Site Identification Technique Using Web Structure Clustering., , , , , , and . IEICE Trans. Inf. Syst., 102-D (9): 1665-1672 (2019)Authentication Scheme Using Pre-Registered Information on Blockchain., , , , , and . IEICE Trans. Inf. Syst., 102-D (9): 1676-1678 (2019)Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description., , , , , , , , , and . IEICE Trans. Inf. Syst., 102-D (9): 1679-1682 (2019)