Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of Secured Medical Network with TCP2 for Telemedicine., , , , and . MIE, volume 116 of Studies in Health Technology and Informatics, page 397-402. IOS Press, (2005)Trans-Pacific Demonstration of Visible Human (TPD-VH)., , , , , and . Space Communications, 17 (4): 303-311 (2001)Open Issues toward Successful Deployment of Electronic Health Information Exchange in Japan - Analysis of Regional Health Information Network in Kagawa Prefecture., and . SAINT, page 583-586. IEEE Computer Society, (2011)Fluid flow computation based on physical model., , , , , , and . Syst. Comput. Jpn., 30 (4): 41-50 (1999)AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -., , and . IACR Cryptology ePrint Archive, (2011)Autonomous distributed secret sharing storage system., , , and . Syst. Comput. Jpn., 37 (6): 55-63 (2006)UDP Large-Payload Capability Detection for DNSSEC., , , and . IEICE Trans. Inf. Syst., 91-D (5): 1261-1273 (2008)DNS Transport Size Issues in IPv6 Environment., , , , and . SAINT Workshops, page 141-145. IEEE Computer Society, (2004)Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation., , , , , and . IEICE Trans. Inf. Syst., 92-D (5): 955-966 (2009)Telemedicine for evaluation of brain function by a metacomputer., , , , , , , , , and 4 other author(s). IEEE Trans. Inf. Technol. Biomed., 4 (2): 165-172 (2000)