Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Inomata, Atsuo
add a person with the name Inomata, Atsuo
 

Other publications of authors with the same name

Uncompressed 4K2K and HD live transmission on global internet., , , , and . SIGGRAPH ASIA Posters, page 28:1. ACM, (2009)Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks., , , , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 140-149. Springer, (2006)Location tracking prevention with dummy messages for vehicular communications., , , , and . ITST, page 56-61. IEEE, (2013)A Secure Cloud-centric IoT Framework for Smart Device Registration., , and . J. Inf. Process., (2021)Migrating to Zero Trust Architecture: Reviews and Challenges., , and . Secur. Commun. Networks, (2021)A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing., , , and . AINA Workshops, page 749-756. IEEE Computer Society, (2013)Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks., , , and . Inf. Media Technol., 1 (2): 1191-1203 (2006)A Proposal of Short Proxy Signature using Pairing., , and . ITCC (1), page 631-635. IEEE Computer Society, (2005)Proposal of Smooth Switching Mechanism on P2P Streaming., , , , , and . DCAI, volume 79 of Advances in Intelligent and Soft Computing, page 181-184. Springer, (2010)The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing., , , and . ICISSP, page 440-449. SCITEPRESS, (2021)