Author of the publication

Improved Subset Difference Method with Ternary Tree.

, , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2034-2044 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential wireless technologies in mobile communications., , , , and . ICC, page 1121-1125. IEEE, (1999)Performance of real-time video transmission using error control over Rayleigh and Rician fading channels., , and . PIMRC, page 1061-1065. IEEE, (1998)Improved Subset Difference Method with Ternary Tree., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2034-2044 (2010)A New Tree-structure-specified Multisignature Scheme for a Document Circulation System., , , , and . SECRYPT, page 362-369. SciTePress, (2011)A New (k, n)-Threshold Secret Sharing Scheme and Its Extension., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 455-470. Springer, (2008)Augmented Reality (AR) Application Superimposing the Falling Risks of Older Adults in Residential Settings and Coping Strategies: Building an Image-Based Scene Detection Model., , , , , , and . HCI (49), volume 14055 of Lecture Notes in Computer Science, page 117-124. Springer, (2023)Anonymous Prepaid Content Viewing System with Mobile Terminal., , , , and . SECRYPT, page 281-288. INSTICC Press, (2007)A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework., , , and . Security and Management, page 323-329. CSREA Press, (2010)Implementation of remote system using touchless palmprint recognition algorithm., , , , and . MoMM, page 33-41. ACM, (2010)Side-Channel Analysis of the K2 Stream Cipher., , , , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 53-73. Springer, (2010)