Author of the publication

An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other.

, , , , and . COMPSAC Workshops, page 202-207. IEEE Computer Society, (2016)978-1-4673-8845-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Computational Complexity of Logic Programs and Alternating Turing Machines., and . FGCS, page 356-363. OHMSHA Ltd. Tokyo and Springer-Verlag, (1988)A Mail Transfer System Selectively Restricting a Huge Amount of E-Mails., , , , and . SITIS, page 896-900. IEEE Computer Society, (2013)A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes., , and . COMPSAC (2), page 769-776. IEEE Computer Society, (2018)978-1-5386-2667-2.Pipelined Parallelization in HPF Programs on the Earth Simulator., and . ISHPC, volume 4759 of Lecture Notes in Computer Science, page 365-373. Springer, (2005)A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query., , , , , and . SAINT, page 90-93. IEEE Computer Society, (2006)A Traceable and Pseudonymous P2P Information Distribution System., and . COMPSAC Workshops, page 67-72. IEEE Computer Society, (2015)Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network., , and . COMPSAC, page 220-225. IEEE Computer Society, (2013)Identifying link layer home network topologies using HTIP., , , , and . CCNC, page 891-898. IEEE, (2017)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)