Author of the publication

Breast tumor diagnostic system using three-dimensional ultrasonic echography.

, , , and . Syst. Comput. Jpn., 30 (2): 1-10 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 3-12 (2010)Automated Detection of Breast Tumors in Ultrasonic Image Using Fuzzy Reasoning., , , , , and . ICIP (3), page 420-423. IEEE Computer Society, (1997)The Human Anatomic Gene Expression Library (H-ANGEL), the H-Inv integrative display of human gene expression across disparate technologies and platforms., , , , , , , , , and 12 other author(s). Nucleic Acids Res., 33 (Database-Issue): 567-572 (2005)Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA., , , and . CHES, volume 1965 of Lecture Notes in Computer Science, page 25-40. Springer, (2000)DPA Countermeasure Based on the "Masking Method"., , and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 440-456. Springer, (2001)Improving the Randomized Initial Point Countermeasure Against DPA., , and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 459-469. (2006)DPA Countermeasures by Improving the Window Method., , , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 303-317. Springer, (2002)New Privacy-Preserving Method for Matching Location Data., , , and . IMIS, page 594-599. IEEE Computer Society, (2014)A Fast RSA Implementation on Itanium 2 Processor., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 507-518. Springer, (2006)Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201., , , , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 61-72. Springer, (1999)