Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 166-170 (2013)Homogeneity Characterization of Lattice Spacing of Silicon Single Crystals., , , , and . IEEE Trans. Instrumentation and Measurement, 64 (6): 1692-1695 (2015)Density comparison measurement of silicon by pressure of flotation method., and . IEEE Trans. Instrumentation and Measurement, 50 (2): 604-607 (2001)Uniformity Evaluation of Lattice Spacing of 28Si Single Crystals., , , , and . IEEE Trans. Instrumentation and Measurement, 66 (6): 1304-1308 (2017)Density Comparison of Isotopically Purified Silicon Single Crystals by the Pressure-of-Flotation Method., and . IEEE Trans. Instrumentation and Measurement, 60 (7): 2539-2543 (2011)Density Evaluation of Silicon Thermal-Oxide Layers on Silicon Crystals by the Pressure-of-Flotation Method., and . IEEE Trans. Instrumentation and Measurement, 56 (2): 628-631 (2007)An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and Responses., , , , , , , and . ICACT, page 423-430. IEEE, (2022)A reassessment of the molar volume of silicon and of the Avogadro constant., , , , , , , , , and 4 other author(s). IEEE Trans. Instrumentation and Measurement, 50 (2): 593-597 (2001)Analyzing Randomized Response Mechanisms Under Differential Privacy., and . ISC, volume 9866 of Lecture Notes in Computer Science, page 271-282. Springer, (2016)Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses., , , and . ICACT, page 1521-1533. IEEE, (2024)