Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 87-A (1): 182-189 (2004)Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack., , , , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 3-18. Springer, (2019)A system for measuring the photosynthetic activity of water plants based on carbon dioxide absorption., and . MHS, page 29-31. IEEE, (2012)Expansion of a linear range of the ion-concentration measurement system using microfluidic device with ISFET sensors., , , and . MHS, page 1-3. IEEE, (2015)Supporting MAC layer multicast in IEEE 802.11n: issues and solutions., , , , and . WCNC, page 1179-1184. IEEE, (2009)Nash implementation in production economies with unequal skills: a characterization., and . Soc. Choice Welf., 53 (1): 113-134 (2019)Discrete BP Polar Decoder Using Information Bottleneck Method., and . IEEE Access, (2021)Triple implementation by sharing mechanisms in production economies with unequal labor skills., and . Int. J. Game Theory, 36 (1): 85-106 (2007)Designing a Location Trace Anonymization Contest., , , , , , , , , and 6 other author(s). CoRR, (2021)Starved wireless LAN device identifying scheme using beacon signals., , , , , , , , , and . WPMC, page 459-463. IEEE, (2016)