Author of the publication

Customer Data Scanner for Hands-Free Mobile Payment.

, , , , , and . IEICE Trans. Commun., 98-B (11): 2291-2299 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Auditing for Intelligent Network Security Monitoring., , and . IEEE Commun. Mag., 61 (3): 74-79 (March 2023)Detecting Stealthy Spreaders by Random Aging Streaming Filters., and . IEICE Trans. Commun., 94-B (8): 2274-2281 (2011)Fit a Compact Spread Estimator in Small High-Speed Memory., , , and . IEEE/ACM Trans. Netw., 19 (5): 1253-1264 (2011)Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls., , and . IEEE Trans. Computers, 59 (2): 218-230 (2010)A modeling of security management system for electronic data interchange., , , , and . ISCC, page 518-522. IEEE Computer Society, (1997)Whitelisting for Critical IT-Based Infrastructure., , , , and . IEICE Trans. Commun., 96-B (4): 1070-1074 (2013)When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications., , , and . IEEE/ACM Trans. Netw., 24 (6): 3326-3339 (2016)A grand spread estimator using a graphics processing unit., , and . J. Parallel Distributed Comput., 74 (2): 2039-2047 (2014)Compact feature hashing for machine learning based malware detection., , and . ICT Express, 8 (1): 124-129 (2022)Generative Intrusion Detection and Prevention on Data Stream., and . USENIX Security Symposium, page 4319-4335. USENIX Association, (2023)