Author of the publication

A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining.

, , , and . Inf. Media Technol., 2 (3): 821-834 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Takata, Toyoo
add a person with the name Takata, Toyoo
 

Other publications of authors with the same name

An Effective Distributed Privacy-Preserving Data Mining Algorithm., , , and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 320-325. Springer, (2004)Confront Phishing Attacks - from a Perspective of Security Education., and . iCAST, page 1-4. IEEE, (2019)Supporting Communication in Time of Disaster., , , , and . BWCCA, page 379-384. IEEE, (2012)Enhancing Sensor Network Security by Reducing Radio-Wave Leakage., , , and . BWCCA, page 339-344. IEEE Computer Society, (2011)Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis., , , and . IEEE Trans. Inf. Theory, 39 (4): 1204-1218 (1993)The motion capturing of female divers under water and the trial production of motion viewers for developing a virtual diving experience learning system., , , , and . Artif. Life Robotics, 22 (3): 346-356 (2017)A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS., , , and . NBiS, page 261-267. IEEE Computer Society, (2012)A Distributed Approach to Constructing k-Hop Connected Dominating Set in Ad Hoc Networks., , , and . ICPADS, page 357-364. IEEE Computer Society, (2013)An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing., , and . ICDCS Workshops, page 514-518. IEEE Computer Society, (2003)A Defense Method against Distributed Slow HTTP DoS Attack., , , and . NBiS, page 152-158. IEEE Computer Society, (2016)